M
Mazdak Zamani
Researcher at Felician College
Publications - 114
Citations - 2634
Mazdak Zamani is an academic researcher from Felician College. The author has contributed to research in topics: Steganography & Digital watermarking. The author has an hindex of 25, co-authored 112 publications receiving 2217 citations. Previous affiliations of Mazdak Zamani include Amirkabir University of Technology & Kean University.
Papers
More filters
Journal ArticleDOI
An overview of principal component analysis
TL;DR: The principal component analysis is a kind of algorithms in biometrics that covers standard deviation, covariance, and eigenvectors and is a tool to reduce multidimensional data to lower dimensions while retaining most of the information.
Journal ArticleDOI
Authentication in mobile cloud computing
TL;DR: A comprehensive study of authentication methods in MCC to describe MCC authentication and compare it with that of cloud computing and suggests the need for futuristic authentication methods that are designed based on capabilities and limitations of MCC environment.
Journal ArticleDOI
Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems
Chao Liang,Bharanidharan Shanmugam,Sami Azam,Asif Karim,Ashraful Islam,Mazdak Zamani,Sanaz Kavianpour,Norbik Bashah Idris +7 more
TL;DR: The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment.
Proceedings ArticleDOI
A taxonomy of Botnet detection techniques
Hossein Rouhani Zeidanloo,Mohammad Jorjor Zadeh Shooshtari,Payam Vahdani Amoli,M. Safari,Mazdak Zamani +4 more
TL;DR: This survey classifies Botnet detection techniques into two approaches which are based on setting up honeynets and another approach which is based on Intrusion Detection System ( IDS) which has been categorized into signature-based and anomaly-based detection techniques.
Proceedings ArticleDOI
An Introduction to Image Steganography Techniques
TL;DR: This paper intends to give an overview of image steganography, its uses and techniques, and the three most important parameters for audio Steganography are imperceptibility, payload, and robustness.