PSW statistical LSB image steganalysis S Shojae Chaeikar, M Zamani, ABA Manaf, AM Zeki Multimedia Tools and Applications 77 (1), 805-835, 2018 | 51 | 2018 |
Definitions and criteria of CIA security triangle in electronic voting system S Shojae Chaeikar, M Jafari, H Taherdoost, N Shojae Chaei Kar International Journal of Advanced Computer Science and Information …, 2013 | 50* | 2013 |
Genetic substitution-based audio steganography for high capacity applications M Zamani, AB Abdul Manaf, HR Zeidanloo, S Shojae Chaeikar International Journal of Internet Technology and Secured Transactions 3 (1 …, 2011 | 42 | 2011 |
A novel approach for genetic audio watermarking M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ... Journal of Information Assurance and Security 5 (1), 102-111, 2010 | 42 | 2010 |
AI-enabled cryptographic key management model for secure communications in the internet of vehicles SS Chaeikar, A Jolfaei, N Mohammad IEEE Transactions on Intelligent Transportation Systems 24 (4), 4589-4598, 2022 | 41 | 2022 |
Ensemble SW image steganalysis: A low dimension method for LSBR detection S Shojae Chaeikar, A Ahmadi Signal Processing: Image Communication 70, 233-245, 2019 | 41 | 2019 |
Correlation between PSNR and bit per sample rate in audio steganography M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar 11th International Conference on Signal Processing (SIP'12), 163-168, 2012 | 38 | 2012 |
A proposed framework for P2P Botnet detection HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, S Shojae Chaeikar International Journal of Engineering and Technology 2 (2), 161, 2010 | 37* | 2010 |
Genetic audio steganography M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ... International Journal on Recent Trends in Engineering & Technology [IJRTET …, 2010 | 37* | 2010 |
Mazdak Technique for PSNR Estimation in Audio Steganography M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar 2012 International Conference on Mechanical and Electrical Technology (ICMET …, 2012 | 35* | 2012 |
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare S Yazdanpanah, SS Chaeikar, A Jolfaei Digital Communications and Networks 9 (2), 393-399, 2023 | 32 | 2023 |
Smart card adoption model: Social and ethical perspectives H Taherdoost, S Sahibuddin, M Namayandeh, N Jalaliyoon, A Kalantari, ... Science 3 (4), 2012 | 31 | 2012 |
Genetic Audio Watermarking M Zamani, ABA Manaf, RB Ahmad, F Jaryani, S Shojae Chaeikar Springer Berlin Heidelberg, 2010 | 31* | 2010 |
SIKM–a smart cryptographic key management framework SS Chaeikar, A Ahmadi, S Karamizadeh, NS Chaeikar Open Computer Science 12 (1), 17-26, 2022 | 25 | 2022 |
PFW: Polygonal Fuzzy Weighted—An SVM Kernel for the Classification of Overlapping Data Groups S Shojae Chaeikar, AA Manaf, AA Alarood, M Zamani ELectronics 9 (4), 2020 | 25 | 2020 |
Interpretative key management (IKM), A novel framework S Shojae Chaeikar, SA Razak, S Honarbakhsh, HR Zeidanloo, M Zamani, ... 2010 Second International Conference on Computer Research and Development …, 2010 | 25 | 2010 |
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems S Shojae Chaeikar, M Alizadeh, MH Tadayon, A Jolfaei International Journal of Intelligent Systems, 2021 | 24* | 2021 |
A Prospective Study of Mobile Cloud Computing M Alizadeh, WH Hassan, M Zamani, T Khodadadi, S Shojae Chaeikar International Journal of Advancements in Computing Technology(IJACT) 5 (11 …, 2013 | 24* | 2013 |
IKM-based Security Usability Enhancement Model S Yazdanpanah, S Shojae Chaeikar IRACST-International Journal of Computer Science and Information Technology …, 2012 | 24 | 2012 |
A Trust Based Clustering Model for Dynamic Monitoring in Ad hoc Network S Honarbakhsh, M Masrom, M Zamani, SS Chaeikar, R Honarbakhsh International Conference on Computer and Computational Intelligence (ICCCI 2010), 2010 | 24 | 2010 |