Blind source camera identification K Mehdi, HT Sencar, N Memon Image Processing, 2004. ICIP'04. 2004 International Conference on 1, 709-712, 2004 | 455* | 2004 |
Image steganography and steganalysis: Concepts and practice R Chandramouli, M Kharrazi, N Memon Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004 | 373 | 2004 |
Image steganalysis with binary similarity measures M Kharrazi, N Memon EURASIP Journal on Advances in Signal Processing, 2749-2757, 2005 | 330* | 2005 |
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval. T Suel, C Mathur, JW Wu, J Zhang, A Delis, M Kharrazi, X Long, ... WebDB 3, 67-72, 2003 | 238 | 2003 |
Image steganography: Concepts and practice M Kharrazi, HT Sencar, N Memon Lecture Note Series, Institute for Mathematical Sciences, National …, 2004 | 205 | 2004 |
Performance study of common image steganography and steganalysis techniques M Kharrazi, HT Sencar, N Memon Journal of Electronic Imaging 15 (4), 041104-041104-16, 2006 | 140 | 2006 |
Benchmarking steganographic and steganalysis techniques M Kharrazi, HT Sencar, N Memon Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005 | 94 | 2005 |
Cover selection for steganographic embedding M Kharrazi, HT Sencar, N Memon 2006 International Conference on Image Processing, 117-120, 2006 | 86 | 2006 |
Data masking: A new approach for steganography? R Radhakrishnan, M Kharrazi, N Memon The Journal of VLSI Signal Processing 41 (3), 293-303, 2005 | 70 | 2005 |
Improving steganalysis by fusion techniques: A case study with image steganography M Kharrazi, HT Sencar, N Memon Transactions on Data Hiding and Multimedia Security I, 123-137, 2006 | 66 | 2006 |
An anomaly-based botnet detection approach for identifying stealthy botnets S Arshad, M Abbaspour, M Kharrazi, H Sanatkar 2011 IEEE International Conference on Computer Applications and Industrial …, 2011 | 47 | 2011 |
Back to static analysis for kernel-level rootkit detection SA Musavi, M Kharrazi IEEE Transactions on Information Forensics and Security 9 (9), 1465-1476, 2014 | 35 | 2014 |
Sencar, and Nasir Memon." M Kharrazi, T Husrev Benchmarking steganographic, 2004 | 28 | 2004 |
Improving a computer networks course using the Partov simulation engine B Momeni, M Kharrazi IEEE Transactions on Education 55 (3), 436-443, 2012 | 24 | 2012 |
Detection of fast-flux botnets through DNS traffic analysis E Soltanaghaei, M Kharrazi Scientia Iranica 22 (6), 2389-2400, 2015 | 19 | 2015 |
Nabs: A system for detecting resource abuses via characterization of flow content type K Shanmugasundaram, M Kharrazi, N Memon Computer Security Applications Conference, 2004. 20th Annual, 316-325, 2004 | 19* | 2004 |
Payload Attribution via Character Dependent Multi-Bloom Filters MH Haghighat, M Tavakoli, M Kharrazi | 16 | 2013 |
2ploc: Preserving privacy in location-based services AS Amoli, M Kharrazi, R Jalili 2010 IEEE Second International Conference on Social Computing, 707-712, 2010 | 14 | 2010 |
PSTEG: steganographic embedding through patching [image steganography] K Petrowski, M Kharrazi, HT Sencar, N Memon Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005 | 14 | 2005 |
Passive worm and malware detection in peer-to-peer networks S Fahimian, A Movahed, M Kharrazi 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 8 | 2010 |