Healthcare data breaches: insights and implications AH Seh, M Zarour, M Alenezi, AK Sarkar, A Agrawal, R Kumar, ... Healthcare 8 (2), 133, 2020 | 411 | 2020 |
Applications of speaker recognition N Singh, RA Khan, R Shree Procedia engineering 38, 3122-3126, 2012 | 96 | 2012 |
Key issues in healthcare data integrity: Analysis and recommendations AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ... IEEE Access 8, 40612-40628, 2020 | 95 | 2020 |
Maintainability estimation model for object-oriented software in design phase (MEMOOD) SWA Rizvi, RA Khan arXiv preprint arXiv:1004.4447, 2010 | 86 | 2010 |
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 50944-50957, 2020 | 82 | 2020 |
A systematic analysis on blockchain integration with healthcare domain: scope and challenges S Khatri, FA Alzahrani, MTJ Ansari, A Agrawal, R Kumar, RA Khan IEEE Access 9, 84666-84687, 2021 | 81 | 2021 |
Ensuring data integrity of healthcare information in the era of digital health M Zarour, M Alenezi, MTJ Ansari, AK Pandey, M Ahmad, A Agrawal, ... Healthcare Technology Letters 8 (3), 66-77, 2021 | 68 | 2021 |
MFCC and prosodic feature extraction techniques: a comparative study N Singh, RA Khan, R Shree International Journal of Computer Applications 54 (1), 9-13, 2012 | 67 | 2012 |
Metric based testability model for object oriented design (MTMOOD) RA Khan, K Mustafa ACM SIGSOFT Software Engineering Notes 34 (2), 1-6, 2009 | 65 | 2009 |
Exploring and analyzing the dark web: a new alchemy M Faizan, RA Khan First Monday, 2019 | 63 | 2019 |
A study of big data characteristics G Kapil, A Agrawal, RA Khan 2016 international conference on communication and electronics systems …, 2016 | 62 | 2016 |
A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 48870-48885, 2020 | 61 | 2020 |
Analyzing the Big Data Security Through a Unified Decision-Making Approach. A Attaallah, H Alsuhabi, S Shukla, R Kumar, BK Gupta, RA Khan Intelligent Automation & Soft Computing 32 (2), 2022 | 60 | 2022 |
Measuring security durability of software through fuzzy-based decision-making process R Kumar, M Zarour, M Alenezi, A Agrawal, RA Khan International Journal of Computational Intelligence Systems 12 (2), 627-642, 2019 | 60 | 2019 |
Security issues in fog environment: a systematic literature review J Kaur, A Agrawal, RA Khan International Journal of Wireless Information Networks 27, 467-483, 2020 | 56 | 2020 |
P-STORE: Extension of STORE methodology to elicit privacy requirements MTJ Ansari, A Baz, H Alhakami, W Alhakami, R Kumar, RA Khan Arabian Journal for Science and Engineering 46, 8287-8310, 2021 | 55 | 2021 |
Measuring the sustainable-security of Web applications through a fuzzy-based integrated approach of AHP and TOPSIS A Agrawal, M Alenezi, R Kumar, RA Khan IEEE Access 7, 153936-153951, 2019 | 53 | 2019 |
Revisiting software security: Durability perspective R Kumar, SA Khan, RA Khan International Journal of Hybrid Information Technology 8 (2), 311-322, 2015 | 53 | 2015 |
Evaluating performance of software durability through an integrated fuzzy-based symmetrical method of ANP and TOPSIS SA Khan, M Alenezi, A Agrawal, R Kumar, RA Khan Symmetry 12 (4), 493, 2020 | 52 | 2020 |
Ransomware: evolution, target and safety measures AK Maurya, N Kumar, A Agrawal, RA Khan International Journal of Computer Sciences and Engineering 6 (1), 80-85, 2018 | 52 | 2018 |