shahriar mohammadi
shahriar mohammadi
Associate professor at K.N. Toosi University
Verified email at - Homepage
Cited by
Cited by
Word of Mouth impact on the adoption of mobile banking in Iran
D Mehrad, S Mohammadi
Telematics and Informatics 34 (7), 1351-1363, 2017
A comparison of link layer attacks on wireless sensor networks
S Mohammadi, H Jadidoleslamy
arXiv preprint arXiv:1103.5589, 2011
An efficient model to improve customer acceptance of mobile banking
S Barati, S Mohammadi
World Congress on Engineering and Computer Science 2, 20-22, 2009
Cloud ERP: Implementation of enterprise resource planning using cloud computing technology
EF Kiadehi, S Mohammadi
Journal of Basic and Applied Scientific Research 2 (11), 11422-11427, 2012
Mining the banking customer behavior using clustering and association rules methods
MA Farajian, S Mohammadi
International Journal of Industrial Engineering & Production Research 21 (4 …, 2010
Review banking on biometric in the world’s banks and introducing a biometric model for Iran’s banking system
SS Hosseini, S Mohammadi
Journal of Basic and Applied Scientific Research 2 (9), 9152-9160, 2012
A comparison of physical attacks on wireless sensor networks
S Mohammadi, H Jadidoleslamy
International Journal of Peer to Peer Networks 2 (2), 24-42, 2011
Challenges of higher education related to e-learning in developing countries during COVID-19 spread: a review of the perspectives of students, instructors, policymakers, and …
S Zarei, S Mohammadi
Environmental Science and Pollution Research, 1-7, 2021
A new deep learning approach for anomaly base IDS using memetic classifier
S Mohammadi, A Namadchian
International Journal of Computers Communications & Control 12 (5), 677-688, 2017
Challenges of user Involvement in Extreme Programming projects
S Mohammadi, B Nikkhahan, S Sohrabi
International Journal of Software Engineering and Its Applications 3 (1), 19-32, 2009
ECC-based biometric signature: A new approach in electronic banking security
S Mohammadi, S Abedi
2008 International Symposium on Electronic Commerce and Security, 763-766, 2008
A comparison of routing attacks on wireless sensor networks
S Mohammadi, RE Atani, H Jadidoleslamy
organization 4, 21, 2011
Privacy preserving big data mining: association rule hiding using fuzzy logic approach
GA Afzali, S Mohammadi
IET Information Security 12 (1), 15-24, 2018
Enhancing risk management with an efficient risk identification approach
S Barati, S Mohammadi
2008 4th IEEE International Conference on Management of Innovation and …, 2008
Toward an integrated modeling approach for production and delivery operations in flow shop system: trade-off between direct and routing delivery methods
R Ramezanian, S Mohammadi, A Cheraghalikhani
Journal of Manufacturing Systems 44, 79-92, 2017
Compare failure prediction models based on feature selection technique: empirical case from Iran
S Ashoori, S Mohammadi
Procedia Computer Science 3, 568-573, 2011
A study of major Mobile payment systems' functionality In Europe
S Mohammadi, H Jahanshahi
2008 11th International Conference on Computer and Information Technology …, 2008
An analytical survey of" on-site customer" practice in extreme programming
S Mohammadi, B Nikkhahan, S Sohrabi
International Symposium on Computer Science and its Applications, 1-6, 2008
Honeypots: intrusion deception
A Barfar, S Mohammadi
ISSA Journal, 28-31, 2007
New multipath node-disjoint routing based on aodv protocol
V Zangeneh, S Mohammadi
World Academy of Science, Engineering and Technology 5, 04-22, 2011
The system can't perform the operation now. Try again later.
Articles 1–20