Shahriar Mohammadi

Orcid: 0000-0002-4236-2857

According to our database1, Shahriar Mohammadi authored at least 27 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
The credibility assessment of Twitter/X users based organization objectives by heterogeneous resources in big data life cycle.
Comput. Hum. Behav., 2025

2024
NFT-based online prescription for data management in healthcare services.
Technol. Anal. Strateg. Manag., November, 2024

Technology adoption: an analysis of the major models and theories.
Technol. Anal. Strateg. Manag., June, 2024

2023
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling.
Int. J. Inf. Sec., October, 2023

2021
A new NFC mobile payment protocol using improved GSM based authentication.
J. Inf. Secur. Appl., 2021

2020
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism.
ISC Int. J. Inf. Secur., 2020

2019
An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks.
Int. J. Comput. Intell. Appl., 2019

2018
Privacy preserving big data mining: association rule hiding using fuzzy logic approach.
IET Inf. Secur., 2018

2017
Word of Mouth impact on the adoption of mobile banking in Iran.
Telematics Informatics, 2017

A New Deep Learning Approach for Anomaly Base IDS using Memetic Classifier.
Int. J. Comput. Commun. Control, 2017

Understanding the relationship strengths in users' activities, review helpfulness and influence.
Comput. Hum. Behav., 2017

2012
Effect of Network Traffic on IPS Performance.
J. Information Security, 2012

Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS.
Int. J. Fuzzy Syst. Appl., 2012

A new scheduling algorithm for server farms load balancing
CoRR, 2012

Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security
CoRR, 2012

2011
Compare failure prediction models based on feature selection technique: empirical case from Iran.
Proceedings of the First World Conference on Information Technology, 2011

A Comparison of Link Layer Attacks on Wireless Sensor Networks.
J. Information Security, 2011

Service Oriented Enterprise and Contracted Profit Sharing.
Int. J. Syst. Serv. Oriented Eng., 2011

Role of common website features on providing a secure news website: an empirical approach.
Int. J. Multim. Intell. Secur., 2011

A Comparison of Link Layer Attacks on Wireless Sensor Networks
CoRR, 2011

2010
Penetration test: A case study on remote command execution security hole.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

2009
A framework for online counter terrorism.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Using an Enterprise Mashup Infrastructure for Just-in-Time Management of Situational Projects.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

2008
Analysis of Revealed Comparative Advantage in the E-service market.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

ECC-Based Biometric Signature: A New Approach in Electronic Banking Security.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Using Logically Hierarchical Meta Web Services to Support Accountability in Mashup Services.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

A New Approach on Interactive SOA Security Model Based on Automata.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008


  Loading...