Mohammad  Davarpanah Jazi
Mohammad Davarpanah Jazi
Foulad Institute of Technology, Isfahan University of Technonlogy
No verified email - Homepage
Cited by
Cited by
Methodology of wavelet analysis in research of dynamics of phishing attacks
M Dadkhah, VV Lyashenko, ZV Deineko, S Shamshirband, MD Jazi
International Journal of Advanced Intelligence Paradigms 12 (3-4), 220-238, 2019
Characteristics of hijacked journals and predatory publishers: our observations in the academic world
M Dadkhah, T Maliszewski, MD Jazi
Trends in Pharmacological Sciences 37 (6), 415-418, 2016
How can we identify hijacked journals?
M Dadkhah, MM Obeidat, MD Jazi, T Sutikno, MA Riyadi
Bulletin of Electrical Engineering and Informatics 4 (2), 83-87, 2015
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational social networks: security and privacy, 87-113, 2012
Text-independent speaker verification using ant colony optimization-based selected features
S Nemati, ME Basiri
Expert Systems with Applications 38 (1), 620-630, 2011
Deep web content mining
S Ajoudanian, MD Jazi
International Journal of Computer and Information Engineering 3 (1), 63-67, 2009
An introduction to journal phishings and their detection approach
M Dadkhah, T Sutikno, MD Jazi, D Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015
Fake conferences for earning real money
M Dadkhah, MD Jazi, S Pacukaj
Mediterranean Journal os Social Sciences 6, 2015
Detecting hijacked journals by using classification algorithms
M Andoohgin Shahri, MD Jazi, G Borchardt, M Dadkhah
Science and engineering ethics 24, 655-668, 2018
RETRACTED CHAPTER: A Novel Text-Independent Speaker Verification System Using Ant Colony Optimization Algorithm
S Nemati, R Boostani, MD Jazi
Image and Signal Processing: 3rd International Conference, ICISP 2008 …, 2008
CP2: Cryptographic privacy protection framework for online social networks
F Raji, A Miri, MD Jazi
Computers & Electrical Engineering 39 (7), 2282-2298, 2013
Secure payment in E-commerce: Deal with Keyloggers and Phishings
M Dadkhah, MD Jazi
International Journal of Electronics Communication and Computer Engineering …, 2014
An introduction to undetectable keyloggers with experimental testing
M Davarpanah Jazi, AM Ciobotaru, E Barati
International Journal of Computer Communications and Networks (IJCCN) 4 (3), 1-5, 2014
Online social network with flexible and dynamic privacy policies
F Raji, A Miri, MD Jazi, B Malek
2011 CSI International Symposium on Computer Science and Software …, 2011
Methodology of the Chaos Theory in research of phishing attacks
M Dadkhah, V Lyashenko, M Jazi
International Journal of Academic Research 7 (1), 169-175, 2015
A novel approach to deal with keyloggers
M Dadkhah, MD Jazi
Oriental Journal of Computer Science & Technology 7 (1), 25-28, 2014
PESCA: a peer‐to‐peer social network architecture with privacy‐enabled social communication and data availability
F Raji, M Davarpanah Jazi, A Miri
IET Information Security 9 (1), 73-80, 2015
Prediction of phishing websites using classification algorithms based on weight of web pages characteristics
M Dadkhah, M Jazi, V Lyashenko
Baku, Azerbaijan, 2014
Developing expert system in order to detect the journal phishing attacks
M Dadkhah, MD Jazi, MS Mobarakeh, V Lyashenko
Journal of Mathematics and Technology 6 (1), 70-73, 2015
A new challenge in the academic world: earning real money and eminence by paper publishing
M Dadkhah, N Elias, MD Jazi, V Christova-Bagdassarian, KH Abu-Elteen
Jordan Journal of Biological Sciences Guest Editorial 8 (2), 2015
The system can't perform the operation now. Try again later.
Articles 1–20