Mohammad Davarpanah Jazi

According to our database1, Mohammad Davarpanah Jazi authored at least 16 papers between 1994 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Methodology of wavelet analysis in research of dynamics of phishing attacks.
Int. J. Adv. Intell. Paradigms, 2019

2018
Detecting Hijacked Journals by Using Classification Algorithms.
Sci. Eng. Ethics, 2018

2016
An overview of phishing attacks and their detection techniques.
Int. J. Internet Protoc. Technol., 2016

Similar names in academic literature as a tools to deceive researchers.
Int. J. Adv. Intell. Paradigms, 2016

2015
PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability.
IET Inf. Secur., 2015

2014
A centralized privacy-preserving framework for online social networks.
ISC Int. J. Inf. Secur., 2014

2013
DEFF: a new architecture for private online social networks.
Secur. Commun. Networks, 2013

CP2: Cryptographic privacy protection framework for online social networks.
Comput. Electr. Eng., 2013

2011
Corrigendum to "Text-independent speaker verification using ant colony optimization-based selected features" [Expert Systems with Applications 38 (1) (2011) 620-630].
Expert Syst. Appl., 2011

Text-independent speaker verification using ant colony optimization-based selected features.
Expert Syst. Appl., 2011

Preserving Privacy in Online Social Networks.
Proceedings of the Foundations and Practice of Security, 2011

2010
A Comparative Study of Critical Success Factors (CSFs) in Implementation of ERP in Developed and Developing Countries.
Int. J. Adv. Comp. Techn., 2010

2008
Improvement of Association-based Gene Mapping Accuracy by Selecting High Rank Features.
Proceedings of the International Conference on Bioinformatics, 2008

1998
Constructing user requirements: a social process for a social context.
Inf. Syst. J., 1998

1997
Can Users Build Requirements Models Themselves?
Proceedings of the Fifth European Conference on Information Systems, 1997

1994
Organisational and Information System Modelling for Information Systems Requirement Determination.
Proceedings of the Entity-Relationship Approach, 1994


  Loading...