An introduction to steganography methods M Nosrati, R Karimi, M Hariri World Applied Programming 1 (3), 191-195, 2011 | 162* | 2011 |
Investigation of the*(star) search algorithms: Characteristics, methods and approaches M Nosrati, R Karimi, HA Hasanvand World Applied Programming 2 (4), 251-256, 2012 | 125 | 2012 |
Internet marketing or modern advertising! How? Why M Nosrati, R Karimi, M Mohammadi, K Malekian International Journal of economy, management and social sciences 2 (3), 56-63, 2013 | 97 | 2013 |
Audio steganography: a survey on recent approaches M Nosrati, R Karimi, M Hariri world applied programming 2 (3), 202-205, 2012 | 65 | 2012 |
Heuristic metamorphic malware detection based on statistics of assembly instructions using classification algorithms P Khodamoradi, M Fazlali, F Mardukhi, M Nosrati 2015 18th CSI International Symposium on Computer Architecture and Digital …, 2015 | 60 | 2015 |
Steganography in image segments using genetic algorithm M Nosrati, A Hanani, R Karimi 2015 Fifth International Conference on Advanced Computing & Communication …, 2015 | 49 | 2015 |
Embedding stego-text in cover images using linked list concepts and LSB technique M Nosrati, R Karimi, H Nosrati, A Nosrati Journal of American Science 7 (6), 97-100, 2011 | 33 | 2011 |
Reversible data hiding: principles, techniques, and recent studies M Nosrati, R Karimi, M Hariri World Applied Programming 2 (5), 349-353, 2012 | 29 | 2012 |
Email Marketing as a Popular Type of Small Business Advertisement: A Short Review M Mohammadi, K Malekian, M Nosrati, R Karimi Australian journal of basic and applied sciences 7 (4), 786-790, 2013 | 19 | 2013 |
Detection of circular shapes from impulse noisy images using median and laplacian filter and Circular Hough Transform M Nosrati, R Karimi 2011 8th International Conference on Electrical Engineering, Computing …, 2011 | 17 | 2011 |
Exploring SARS-COV-2 structural proteins to design a multi-epitope vaccine using immunoinformatics approach: An in silico study S Sanami, M Alizadeh, M Nosrati, KA Dehkordi, F Azadegan-Dehkordi, ... Computers in Biology and Medicine 133, 104390, 2021 | 16 | 2021 |
Metamorphic malware detection using opcode frequency rate and decision tree M Fazlali, P Khodamoradi, F Mardukhi, M Nosrati, MM Dehshibi International Journal of Information Security and Privacy 10 (3), 67-86, 2016 | 16 | 2016 |
A survey on usage of genetic algorithms in recent steganography researches M Nosrati, R Karimi World Applied Programming 2 (3), 206-210, 2012 | 15 | 2012 |
Energy efficient and latency optimized media resource allocation M Nosrati, R Karimi International Journal of Web Information Systems 12 (1), 2-17, 2016 | 14 | 2016 |
Artificial intelligence in regenerative medicine: applications and implications H Nosrati, M Nosrati Biomimetics 8 (5), 442, 2023 | 11 | 2023 |
Exact requirements engineering for developing business process models M Nosrati 2017 3th International Conference on Web Research (ICWR), 140-147, 2017 | 10 | 2017 |
Raft consensus algorithm: an effective substitute for paxos in high throughput p2p-based systems M Fazlali, SM Eftekhar, MM Dehshibi, HT Malazi, M Nosrati arXiv preprint arXiv:1911.01231, 2019 | 8 | 2019 |
Using SFLA and LSB for text message steganography in 24-bit RGB color images M Habibi, R Karimi, M Nosrati International Journal of Engineering Sciences 2 (3), 68-75, 2013 | 8 | 2013 |
Investigating a benchmark cloud media resource allocation and optimization M Nosrati, R Karimi World 2222, 2510, 2016 | 7 | 2016 |
Minimization of Boolean functions which include don’t-care statements, using graph data structure M Nosrati, R Karimi, R Aziztabar International Conference on Computer Science, Engineering and Applications …, 2011 | 7 | 2011 |