关注
SUHEL AHMAD KHAN
SUHEL AHMAD KHAN
Assistant Professor, Department of Computer Science, Indira Gandhi National Tribal University, MP
在 igntu.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Revisiting software security: Durability perspective
R Kumar, SA Khan, RA Khan
International Journal of Hybrid Information Technology 8 (2), 311-322, 2015
532015
Evaluating performance of software durability through an integrated fuzzy-based symmetrical method of ANP and TOPSIS
SA Khan, M Alenezi, A Agrawal, R Kumar, RA Khan
Symmetry 12 (4), 493, 2020
522020
Durability challenges in software engineering
R Kumar, SA Khan, RA Khan
CrossTalk 42 (4), 29-31, 2016
522016
Multi-level fuzzy system for usable-security assessment
A Agrawal, M Alenezi, SA Khan, R Kumar, RA Khan
Journal of King Saud University-Computer and Information Sciences 34 (3 …, 2022
442022
Analytical network process for software security: A design perspective
R Kumar, SA Khan, RA Khan
CSI transactions on ICT 4, 255-258, 2016
392016
W-GeoR: Weighted geographical routing for VANET’s health monitoring applications in urban traffic networks
P Singh, RS Raw, SA Khan, MA Mohammed, AA Aly, DN Le
IEEE Access 10, 38850-38869, 2021
372021
Durable security in software development: Needs and importance
R Kumar, SA Khan, RA Khan
CSI Communications 10 (10), 34-36, 2015
362015
Measuring the security attributes through fuzzy analytic hierarchy process: Durability perspective
R Kumar, SA Khan, A Agrawal, RA Khan
ICIC Express Letters 12 (6), 615-620, 2018
342018
Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective
J Kaur, AI Khan, YB Abushark, MM Alam, SA Khan, A Agrawal, R Kumar, ...
Risk Management and Healthcare Policy, 355-371, 2020
302020
Link risk degree aided routing protocol based on weight gradient for health monitoring applications in vehicular ad-hoc networks
P Singh, RS Raw, SA Khan
Journal of Ambient Intelligence and Humanized Computing 13 (12), 5779-5801, 2022
272022
Software security testing: A pertinent framework
R Kumar, SA Khan, RA Khan
Journal of Global Research in Computer Science 5 (3), 23-27, 2014
242014
Revisiting software security risks
R Kumar, SA Khan, RA Khan
British Journal of Mathematics & Computer Science 11 (6), 1-10, 2015
232015
A Roadmap for Security
RA Khan, SA Khan
International Journal of Computer Science & Emerging Technology 1 (1), 5-8, 2010
19*2010
Multi-level hesitant fuzzy based model for usable-security assessment
M Nadeem, JF Al-Amri, AF Subahi, AH Seh, SA Khan, A Agrawal, ...
Intelligent Automation & Soft Computing 31 (1), 61-82, 2022
172022
Development of novel framework for patient health monitoring system using VANET: an Indian perspective
P Singh, RS Raw, SA Khan
International Journal of Information Technology 13 (1), 383-390, 2021
162021
Security assessment through fuzzy-delphi analytic hierarchy process
SA Khan
162018
Securing object oriented design: A complexity perspective
SA Khan, RA Khan
International Journal of Computer Applications 8 (13), 2010
152010
Review on security aspects for cloud architecture
S Alam, M Muqeem, SA Khan
International Journal of Electrical and Computer Engineering 8 (5), 3129-3139, 2018
132018
Fuzzy analytic hierarchy process for software durability: Security risks perspective
R Kumar, SA Khan, RA Khan
Proceedings of International Conference on Communication and Networks …, 2017
132017
A link analysis algorithm for identification of key hidden services
SA Khan, A Alharbi, M Faizan, W Alosaimi
122021
系统目前无法执行此操作,请稍后再试。
文章 1–20