default search action
Marzieh Ahmadzadeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2005
- [b1]Marzieh Ahmadzadeh:
How patterns in programming can assist in improving analytical skills. University of Nottingham, UK, 2005
Journal Articles
- 2020
- [j4]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. IEEE Trans. Emerg. Top. Comput. 8(2): 341-351 (2020) - 2019
- [j3]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, Kim-Kwang Raymond Choo, David Ellis Newton:
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. Future Gener. Comput. Syst. 90: 94-104 (2019) - 2014
- [j2]Marzieh Doroudian, Reza Akbari, Marzieh Ahmadzadeh:
Using Ontologies for Developing a Search Mechanism in Social Networks. Int. J. Web Appl. 6(3): 114-120 (2014) - 2011
- [j1]Marzieh Ahmadzadeh, Elham Mahmoudabadi, Farzad Khodadadi:
Pattern of Plagiarism in Novice Students' Generated Programs: An Experimental Approach. J. Inf. Technol. Educ. Innov. Pract. 10: 195-201 (2011)
Conference and Workshop Papers
- 2020
- [c10]Marian Petre, Kate Sanders, Robert McCartney, Marzieh Ahmadzadeh, Cornelia Connolly, Sally Hamouda, Brian Harrington, Jérémie O. Lumbroso, Joseph Maguire, Lauri Malmi, Monica M. McGill, Jan Vahrenhold:
Mapping the Landscape of Peer Review in Computing Education Research. ITiCSE-WGR 2020: 173-209 - [c9]Marian Petre, Kate Sanders, Robert McCartney, Marzieh Ahmadzadeh, Cornelia Connolly, Sally Hamouda, Brian Harrington, Jérémie O. Lumbroso, Joseph Maguire, Lauri Malmi, Monica M. McGill, Jan Vahrenhold:
Reviewing Computing Education Papers. ITiCSE 2020: 514 - 2019
- [c8]Brian Harrington, Jingyiran Li, Mohamed Moustafa, Marzieh Ahmadzadeh, Nick Cheng:
On the Effect of Question Ordering on Performance and Confidence in Computer Science Examinations. SIGCSE 2019: 620-626 - [c7]Rachel D'souza, Mahima Bhayana, Marzieh Ahmadzadeh, Brian Harrington:
A Mixed-Methods Study of Novice Programmer Interaction with Python Error Messages. WCCCE 2019: 15:1-15:2 - 2013
- [c6]Kate Sanders, Marzieh Ahmadzadeh, Tony Clear, Stephen H. Edwards, Michael Goldweber, Chris Johnson, Raymond Lister, Robert McCartney, Elizabeth Ann Patitsas, Jaime Spacco:
The Canterbury QuestionBank: building a repository of multiple-choice CS1 and CS2 questions. ITiCSE-WGR 2013: 33-52 - 2012
- [c5]Marzieh Ahmadzadeh, Elham Mahmoudabadi:
A feasibility study on using clustering algorithms in programming education research. SIGITE Conference 2012: 145-150 - 2011
- [c4]Armin Kamfiroozie, Marzieh Ahmadzadeh:
Personalized ATMs: Improve ATMs Usability. HCI (22) 2011: 161-166 - [c3]Soheila Khodaparasti, Marzieh Ahmadzadeh:
A New Method for Designing a Sitemap. HCI (22) 2011: 580-583 - 2010
- [c2]Marzieh Ahmadzadeh, Mansoore Soltani:
JavaMarker: an eclipse plug-in to mark students' Java exercises. ITiCSE 2010: 324 - 2005
- [c1]Marzieh Ahmadzadeh, Dave Elliman, Colin Higgins:
An analysis of patterns of debugging among novice computer science students. ITiCSE 2005: 84-88
Informal and Other Publications
- 2018
- [i4]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. CoRR abs/1808.01957 (2018) - 2014
- [i3]Nahid Hajizadeh, Marzieh Ahmadzadeh:
Analysis of factors that affect the students academic performance - Data Mining Approach. CoRR abs/1409.2222 (2014) - [i2]Nahid Hajizadeh, Manijeh Keshtgary, Marzieh Ahmadzadeh:
Assessment of classification techniques on predicting success or failure of Software reusability. CoRR abs/1409.2223 (2014) - 2013
- [i1]Adel Alinezhad Kolaei, Marzieh Ahmadzadeh:
The Optimization of Running Queries in Relational Databases Using ANT-Colony Algorithm. CoRR abs/1311.4088 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint