关注
JAVED AHMAD
标题
引用次数
引用次数
年份
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions
S Ahmad, I Shakeel, S Mehfuz, J Ahmad
Computer Science Review 49, 100568, 2023
362023
esrcTool: a tool to estimate the software risk and cost
M Sadiq, A Rahman, S Ahmad, M Asim, J Ahmad
2010 Second International Conference on Computer Research and Development …, 2010
162010
Fuzzy logic driven security requirements engineering process
M Sadiq, V Susheela Devi, J Ahmad, CW Mohammad
Journal of Information and Optimization Sciences 42 (7), 1685-1707, 2021
52021
Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies
JO Ogala, S Ahmad, I Shakeel, J Ahmad, S Mehfuz
SN Computer Science 4 (5), 530, 2023
32023
Identification of security requirements from the selected set of requirements under fuzzy environment
J Ahmad, CW Mohammad, M Sadiq
2021 International Conference on Computing, Communication, and Intelligent …, 2021
32021
More on Adding Threat during SoftwareRequirements Elicitation and Prioritization
M Sadiq, J Ahmad, A Rahman, R Suman, S Khandelwal
International Journal of Engineering and Technology 2 (3), 286, 2010
32010
Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms
J Ahmad, CW Mohammad, M Sadiq
Proceedings of International Conference on Recent Trends in Computing: ICRTC …, 2022
12022
Enhancing Software Requirements Selection Process Using Genetic Algorithm
M Nazim, J Ahmad, W Farhan, MW Ansari, S Hoda, V Bhaskar
ICIDSSD 2022: Proceedings of the 3rd International Conference on ICT for …, 2023
2023
On Software Security Requirements Elicitation and Analysis Methods
J Ahmad, CW Mohammad, M Sadiq
IT in Industry 9 (1), 24-36, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–9