Skip to content

Hamed Taherdoost

Make Your BIG ON!

  • C.V
  • Biography
  • Publication
  • Contact
Search

Hamed Taherdoost

Make Your BIG ON!

Close menu
  • C.V
  • Biography
  • Publication
  • Contact

Hamed Taherdoost

Make Your BIG ON!

Search Toggle menu

Category: Artificial Intelligence

November 17, 2017February 9, 2020Artificial Intelligence, Information Security, Project Management, Technology Acceptance

Understanding of E-service Security Dimensions and its effect of Quality and Intention to Use

Understanding of E-service Security Dimensions and its effect of Quality and Intention to Use Abstract Hamed Taherdoost Keywords: Analytical hierarchy process, Structural equation modelling, E-service quality, E-service security, Intention to use E-service, Security dimensions

October 20, 2016February 9, 2020Artificial Intelligence, Information Security, Steganography

A Secure Audio Steganography Approach

A Secure Audio Steganography Approach Abstract Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost

October 7, 2016February 9, 2020Artificial Intelligence, Web Mining

Proposing a Framework for Exploration of Crime Data Using Web Structure and Content Mining

Proposing a Framework for Exploration of Crime Data Using Web Structure and Content Mining Abstract Amin Shahraki Moghaddam, Javad Hosseinkhani, Suriayati Chuprat, Hamed Taherdoost and Hadi Barani Baravati Keywords:- Criminal Network, Crime Web Mining, Forensics Analysis, Social Network, Terrorist Network, Universal Crawler

September 15, 2016February 9, 2020Artificial Intelligence, Information Security, Steganography

Robust Audio Steganography via Genetic Algorithm

Robust Audio Steganography via Genetic Algorithm Abstract Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, and Akram M. Zeki

April 9, 2016February 9, 2020Artificial Intelligence, E-service, Information Security

How Security Issues Can Influence on Usage of Electronic Services

How Security Issues Can Influence on Usage of Electronic Services Abstract Hamed Taherdoost, Shamsul Sahibuddin, and Neda Jalaliyoon Keywords:- Web – Based Service, Electronic Service, Security Factor, Adoption, Acceptance, Security and Exploratory Factor Analysis

February 11, 2016February 9, 2020Artificial Intelligence, Steganography

An Artificial-Intelligence-Based Approach for Audio Steganography

An Artificial-Intelligence-Based Approach for Audio Steganography Abstract Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, and Akram M. Zeki Keywords:- Data Hiding, Substitution Techniques, Audio Steganography, Artificial Intelligence, Genetic Algorithm

July 20, 2015February 9, 2020Artificial Intelligence, Information Security, Semantic Web Service

Taxonomy of Semantic Web Service Development: Model-Driven Approaches

Taxonomy of Semantic Web Service Development: Model-Driven Approaches Abstract Alaeddin Kalantari, Suhaimi Ibrahim, Hamed Taherdoost, Mojtaba Khezrian Keywords:- Web Service, Semantic Web Service, Model Driven Architecture, Mda, Semantic Web Service Description

January 27, 2015February 9, 2020Artificial Intelligence, Information Security, Web Mining

Criminal Network Mining by Web Structure and Content Mining

Criminal Network Mining by Web Structure and Content Mining Abstract Javad Hosseinkhani, Suriayati Chaprut, and Hamed Taherdoost Keywords:- Crime Web Mining, Terrorist Network, Criminal Network, Social Network, Forensics Analysis, Framework

March 6, 2012February 9, 2020Artificial Intelligence, Computer Ethics, Information Security, Smart Card Technology, Technology Acceptance

Evaluating Measurement Models for the Acceptance of Smart Card Technology: Security Aspects

Evaluating Measurement Models for the Acceptance of Smart Card Technology: Security Aspects Abstract Maslin Masrom, Zuraini Ismail, Rabiah Ahmad , Hamed Taherdoost Keywords:- Smart Card, Technology, Security, Measurement Model, Structural Equation Modeling

© 2025 Hamed Taherdoost. Proudly powered by Sydney