Associate Dean Computer Science & Associate Professor of Cybersecurity
Cybersecurity
Phone: 201.559.3324
Email: ZamaniM@felician.edu
Academic Accomplishments
- Ph.D, Computer Science, Universiti Teknologi Malaysia, Malaysia. 2007-2010.
Biography
Dr. Mazdak Zamani received his PhD in Computer Science at Universiti Teknologi Malaysia (UTM) in 2011. He was a Senior Lecturer at Advanced Informatics School (an International Graduate School) at UTM from 2011 to 2015. As a full-time Assistant Professor of Department of Computer Science, Dr. Zamani joined Wenzhou-Kean University in 2015 semester. WKU is a full style American university and a branch of Kean University at Union, NJ. In the beginning of the Fall 2017 semester, Dr. Zamani joined Felician University (FU) as Assistant Professor of Cybersecurity and Computer Science. FU has two campuses located in Lodi and Rutherford, NJ. Dr. Zamani assumed his role as Associate Dean of Computer Science and Cybersecurity in 2019. He was promoted to Associate Professor of Cybersecurity in 2020.
Field(s) of Interest/Expertise
- Cybersecurity
- Artificial Intelligence
Courses Taught at Felician University
- Network Security
- Digital Forensics and Investigation
- Information Assurance and Security
- Operating System Security
- Advanced Cryptography
- Network and Telecommunication
- Cryptography Technologies
- Introduction to Advanced Computer Applications
- Introduction to Programming I
- Python I
- The Intro to Mobile Forensics
Publications/Research
- Arab, F., Zamani, M., Poger, S., Manigault, C., & Yu, S. (2019). A Framework to Evaluate the Performance of Video Watermarking Techniques. Paper presented at IEEE 2nd International Conference on Information and Computer Technologies. Hawaii.
- Hafezi, R., Akhavan, A., Zamani, M., Pakseresht, S., Shamshirband, S. (2019). Developing a data mining based model to extract predictor factors in energy systems: Application of global natural gas demand. Energies, MDPI.
- Tanwar, R., Singh, K., Zamani, M., Verma, A., and Kumar, P. (2019). An Optimized Approach for Secure Data Transmission using Spread Spectrum Audio Steganography, Chaos Theory and Social Impact Theory Optimizer. Journal of Computer Networks and Communications. Hindawi.
- Kavianpour, S., Shanmugam, B., Azam, S., Zamani, M., Samy, G. N., and De Boer, F. (2019). A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices. Journal of Computer Networks and Communications. Hindawi.
- Chaeikar, S. S., Zamani, M., Manaf, A. B. A., & Zeki, A. M. (2018). PSW Statistical LSB Image Steganalysis. Multimedia Tools and Applications, 77(1), 1-31.
- Arab, F., & Zamani, M. (2018). VW16F: A Robust Video Watermarking Using Simulated Block Based Spatial Domain Technique. Paper presented at the International Conference on Security and Management. Las Vegas.
- Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., . . . Khan, M. K. (2017). Comments and improvements of “HOTA: Handover optimized ticket-based authentication in network-based mobility management. Paper presented at the 20th Conference on Innovations in Clouds, Internet and Networks, Paris.
- Arab, F., & Zamani, M. (2017). VW16E: A Robust Video Watermarking Technique Using Simulated Blocks Multimedia Forensics and Security (Vol. 115, pp. 193-221).
- Javadianasl, Y., Manaf, A. A., & Zamani, M. (2017). A Practical Procedure for Collecting More Volatile Information in Live Investigation of Botnet Attack Multimedia Forensics and Security (Vol. 115 pp. 381-414).
- Karamizadeh, S., Abdullah, S. M., Shayan, J., Zamani, M., & Nooralishahi, P. (2017). Taxonomy of Filtering Based Illumination Normalization for Face Recognition. Journal of Telecommunication, Electronic and Computer Engineering, 9(1-5), 135-139.
- Karamizadeh, S., Abdullah, S. M., Zamani, M., Shayan, J., & Nooralishahi, P. (2017). Face Recognition via Taxonomy of Illumination Normalization Multimedia Forensics and Security (Vol. 115, pp. 139-160).
- Sadeghian, A., & Zamani, M. (2017). A Comprehensive Android Evidence Acquisition Framework Multimedia Forensics and Security (Vol. 115, pp. 349-364).
- Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, 59-80.
- Arab, F., Abdullah, S. M., Hashim, S. Z. M., Manaf, A. A., & Zamani, M. (2016). A robust video watermarking technique for the tamper detection of surveillance systems. Multimedia Tools and Applications, 76(18), 10855-10885.
- Araghi, T. K., Manaf, A. B. A., Zamani, M., & Araghi, S. K. (2016). A Survey on Digital Image Watermarking Techniques in Spatial and Transform Domains. International Journal of Advances in Image Processing Techniques, 3(1), 6-10.
- Alizadeh, M., Baharun, S., Zamani, M., Khodadadi, T., Darvishi, M., Gholizadeh, S., & Ahmadi, H. (2015). Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6. Jurnal Teknologi (Sciences & Engineering), 72(5), 31–34.
- Alizadeh, M., Zamani, M., Baharun, S., Hassan, W. H., & Khodadadi, T. (2015). Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6. Jurnal Teknologi (Sciences & Engineering), 72(5), 27–30.
- Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., . . . Khan, M. K. (2015). Cryptanalysis and Improvement of “A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks”. PLoS ONE, 10(11), 1-21.
- Araghi, T. K., Zamani, M., Manaf, A. A., & Araghi, S. K. (2015). An Access Control Framework in an Ad Hoc Network Infrastructure Lecture Notes in Electrical Engineering (Vol. 315, pp. 747-754): Springer Verlag.
- Khodadadi, T., Alizadeh, M., Gholizadeh, S., Zamani, M., & Darvishi, M. (2015). Security Analysis Method of Recognition-Based Graphical Password. Jurnal Teknologi (Sciences & Engineering), 72(5), 57–62.
- Kiani, F., Amiri, E., Zamani, M., Khodadadi, T., & Manaf, A. A. (2015). Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 2014, 1-13.
- Ordi, A., Zamani, M., Idris, N. B., Manaf, A. A., & Abdullah, M. S. (2015). A Novel WLAN Client Puzzle Against DoS Attack based on Pattern Matching. Mathematical Problems in Engineering, 2015, 1-13.
- Zamani, M., & Manaf, A. A. (2015). Genetic Algorithm for Fragile Audio Watermarking. Telecommunication Systems, 59(3), 291–304.
- Amiri, E., Alizadeh, M., Keshavarz, H., Zamani, M., & Khodadadi, T. (2014). Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization. International Journal of Distributed Sensor Networks, 2014, 1-17.
- Ghazizadeh, E., Dolatabadi, Z. S. S., Khaleghparast, R., Zamani, M., Manaf, A. A., & Abdullah, M. S. (2014). Secure OpenID authentication model by using Trusted Computing. Abstract and Applied Analysis, 2014, 1-15.
- Ghazizadeh, E., Zamani, M., Manan, J. L. A., & Alizadeh, M. (2014). Trusted Computing Strengthens Cloud authentication. The Scientific World Journal, 2014, 1-17.
- Karamizadeh, S., Abdullah, M. S., Zamani, M., & Kherikhah, A. (2014). Pattern Recognition Techniques: Studies on Appropriate Classifications. ARPN Journal of Engineering and Applied Sciences, 9(8), 1215-1219.
- Mohebbi, K., Ibrahim, S., Zamani, M., & Khezrian, M. (2014). UltiMatch-NL A Web Service Matchmaker Based on Multiple Semantic Filters. PLoS ONE, 9(8), 1-21.
- Sadeghian, A., & Zamani, M. (2014). Detecting and Preventing DDOS Attacks in Botnets by the Help of Self Triggered Black Holes. Paper presented at the Asia-Pacific Conference on Computer Aided System Engineering, Bali.
- Sadeghian, A., Zamani, M., & Manaf, A. A. (2014). SQL Injection Vulnerability General Patch Using Header Sanitization. Paper presented at the International Conference on Computer, Communication, and Control Technology, Langkawi.