Negation and entropy: Effectual knowledge management equipment for learning organizations K Anjaria Expert Systems with Applications 157, 113497, 2020 | 70 | 2020 |
Knowledge derivation from Likert scale using Z-numbers K Anjaria Information Sciences 590, 234-252, 2022 | 65 | 2022 |
Applications of game theory in deep learning: a survey KA Tanmoy Hazra Multimedia Tools and Applications, 2022 | 50 | 2022 |
Relating Wiener’s cybernetics aspects and a situation awareness model implementation for information security risk management K Anjaria, A Mishra Kybernetes 47 (1), 58-79, 2018 | 17 | 2018 |
Thread scheduling using ant colony optimization: An intelligent scheduling approach towards minimal information leakage K Anjaria, A Mishra Karbala International Journal of Modern Science 3 (4), 241-258, 2017 | 16 | 2017 |
Quantitative analysis of information leakage in service-oriented architecture-based Web services K Anjaria, A Mishra Kybernetes 46 (3), 479-500, 2017 | 13 | 2017 |
Dempster-shafer theory and linguistic intuitionistic fuzzy number-based framework for blending knowledge from knowledge repositories: An approach for knowledge management K Anjaria Expert Systems with Applications 199, 117142, 2022 | 11 | 2022 |
Relating interactive system design and information theory from information leakage perspective K Anjaria, A Mishra International Journal of Engineering and Manufacturing 7 (1), 1, 2017 | 11 | 2017 |
Information leakage analysis of software: How to make it useful to IT industries? K Anjaria, A Mishra Future Computing and Informatics Journal 2 (1), 10-18, 2017 | 8 | 2017 |
Relation between cybernetics and information security: from Norbert Wiener’s perspectives K Anjaria, A Mishra Kybernetes 46 (10), 1654-1673, 2017 | 5 | 2017 |
A framework for ethical artificial intelligence - from social theories to cybernetics-based implementation K Anjaria International Journal of Social and Humanistic Computing 4 (1), 1-28, 2021 | 4 | 2021 |
Computational implementation and formalism of FAIR data stewardship principles KA Anjaria Data Technologies and Applications 54 (2), 193-214, 2020 | 4 | 2020 |
Dynamic Source ACO algorithm for energy-aware cloudlet-based mobile cloud computing architecture A Kushal, P Raj, P Naitik, P Tapan, T Anjali 2019 3rd International Conference on Computing Methodologies and …, 2019 | 4 | 2019 |
Relating Maxwell’s demon and quantitative analysis of information leakage for practical imperative programs K Anjaria, A Mishra Chinese Physics B 26 (10), 100507, 2017 | 4 | 2017 |
Attainment of green computing in cloudlet-based mobile cloud computing model using squirrel search algorithm K Anjaria, N Patel Proceedings of 6th International Conference on Recent Trends in Computing …, 2021 | 3 | 2021 |
Theoretical framework of quantitative analysis based information leakage warning system K Anjaria, A Mishra Karbala International Journal of Modern Science 4 (1), 151-163, 2018 | 3 | 2018 |
Enhancing sustainability integration in Sustainable Enterprise Resource Planning (S-ERP) system: Application of Transaction Cost Theory and case study analysis K Anjaria International Journal of Information Management Data Insights 4 (2), 100243, 2024 | 2 | 2024 |
Information Processing and Security Analysis of Shared System Resource Based Architectures K Anjaria, A Mishra International Journal of Cooperative Information Systems 27 (04), 1850009, 2018 | 2 | 2018 |
Neuroevolution for effective information security training K Anjaria, A Mishra 2017 International Conference on Soft Computing and its Engineering …, 2017 | 2 | 2017 |
OS verification-a survey as a source of future challenges K Anjaria, A Mishra International Journal of Computer Science and Engineering Survey (IJCSES) 6 …, 2015 | 2 | 2015 |