Word of Mouth impact on the adoption of mobile banking in Iran D Mehrad, S Mohammadi Telematics and Informatics 34 (7), 1351-1363, 2017 | 295 | 2017 |
Challenges of higher education related to e-learning in developing countries during COVID-19 spread: a review of the perspectives of students, instructors, policymakers, and … S Zarei, S Mohammadi Environmental science and pollution research 29 (57), 85562-85568, 2022 | 183 | 2022 |
A comparison of link layer attacks on wireless sensor networks S Mohammadi, H Jadidoleslamy arXiv preprint arXiv:1103.5589, 2011 | 112 | 2011 |
An efficient model to improve customer acceptance of mobile banking S Barati, S Mohammadi World Congress on Engineering and Computer Science 2, 20-22, 2009 | 104 | 2009 |
Cloud ERP: Implementation of enterprise resource planning using cloud computing technology EF Kiadehi, S Mohammadi Journal of Basic and Applied Scientific Research 2 (11), 11422-11427, 2012 | 63 | 2012 |
Mining the banking customer behavior using clustering and association rules methods MA Farajian, S Mohammadi International Journal of Industrial Engineering & Production Research 21 (4 …, 2010 | 59 | 2010 |
A comparison of physical attacks on wireless sensor networks S Mohammadi, H Jadidoleslamy International Journal of Peer to Peer Networks 2 (2), 24-42, 2011 | 49 | 2011 |
Review banking on biometric in the world’s banks and introducing a biometric model for Iran’s banking system SS Hosseini, S Mohammadi Journal of Basic and Applied Scientific Research 2 (9), 9152-9160, 2012 | 46 | 2012 |
A new deep learning approach for anomaly base IDS using memetic classifier S Mohammadi, A Namadchian International Journal of Computers Communications & Control 12 (5), 677-688, 2017 | 42 | 2017 |
Technology adoption: an analysis of the major models and theories M Yadegari, S Mohammadi, AH Masoumi Technology Analysis & Strategic Management 36 (6), 1096-1110, 2024 | 40 | 2024 |
Privacy preserving big data mining: association rule hiding using fuzzy logic approach GA Afzali, S Mohammadi IET Information Security 12 (1), 15-24, 2018 | 38 | 2018 |
ECC-based biometric signature: A new approach in electronic banking security S Mohammadi, S Abedi 2008 International Symposium on Electronic Commerce and Security, 763-766, 2008 | 34 | 2008 |
Challenges of user Involvement in Extreme Programming projects S Mohammadi, B Nikkhahan, S Sohrabi International Journal of Software Engineering and Its Applications 3 (1), 19-32, 2009 | 33 | 2009 |
Toward an integrated modeling approach for production and delivery operations in flow shop system: trade-off between direct and routing delivery methods R Ramezanian, S Mohammadi, A Cheraghalikhani Journal of Manufacturing Systems 44, 79-92, 2017 | 31 | 2017 |
A comparison of routing attacks on wireless sensor networks S Mohammadi, RE Atani, H Jadidoleslamy organization 4, 21, 2011 | 31 | 2011 |
Enhancing risk management with an efficient risk identification approach S Barati, S Mohammadi 2008 4th IEEE International Conference on Management of Innovation and …, 2008 | 30 | 2008 |
Understanding the relationship strengths in users' activities, review helpfulness and influence RP Mohammadiani, S Mohammadi, Z Malik Computers in Human Behavior 75, 117-129, 2017 | 28 | 2017 |
A secure E-tendering system S Mohammadi, H Jahanshahi 2009 IEEE International Conference on Electro/Information Technology, 62-67, 2009 | 22 | 2009 |
Compare failure prediction models based on feature selection technique: empirical case from Iran S Ashoori, S Mohammadi Procedia Computer Science 3, 568-573, 2011 | 21 | 2011 |
Honeypots: intrusion deception A Barfar, S Mohammadi ISSA Journal, 28-31, 2007 | 21 | 2007 |