Metric based testability model for object oriented design (MTMOOD) RA Khan, K Mustafa ACM SIGSOFT Software Engineering Notes 34 (2), 1-6, 2009 | 65 | 2009 |
A Comparative Study of Risk Assessment Methodologies for Information Systems PSK Mustafa K Bulletin of Electrical Engineering and Informatics 1 (2), 111-122, 2012 | 40 | 2012 |
Software quality: Concepts and practices RA Khan, K Mustafa, SI Ahson Alpha Science, 2006 | 35 | 2006 |
A metrics based model for understandability quantification M Nazir, RA Khan, K Mustafa arXiv preprint arXiv:1004.4463, 2010 | 34 | 2010 |
Research on software design level security vulnerabilities S Rehman, K Mustafa ACM SIGSOFT Software Engineering Notes 34 (6), 1-5, 2009 | 33 | 2009 |
An empirical validation of object oriented design quality metrics RA Khan, K Mustafa, SI Ahson Journal of King Saud University-Computer and Information Sciences 19, 1-16, 2007 | 31 | 2007 |
Security threats taxonomy: Smart-home perspective MN Anwar, M Nazir, K Mustafa 2017 3rd International conference on advances in computing, communication …, 2017 | 27 | 2017 |
Quality Metric Development Framework (qMDF) K Mustafa, RA Khan Journal of Computer Science 1 (3), 437-444, 2005 | 27 | 2005 |
A systematic review and analytical evaluation of security requirements engineering approaches MN Anwar Mohammad, M Nazir, K Mustafa Arabian Journal for Science and Engineering 44, 8963-8987, 2019 | 22 | 2019 |
Software testing: concepts and practices K Mustafa Alpha Science International, Ltd, 2007 | 22 | 2007 |
A Critical appraisal on Password based Authentication AA Kaur, KK Mustafa International Journal of Computer Network and Information Security 11 (1), 47, 2019 | 19 | 2019 |
Software design level vulnerability classification model S Rehman, K Mustafa International Journal of Computer Science and Security (IJCSS) 6 (4), 238, 2012 | 18 | 2012 |
Operation profile-a key factor for reliability estimation RA Khan, K Mustafa, SI Ahson Universitiespress, Gautam Das & VP Gulati, CIT, 347-354, 2004 | 18 | 2004 |
A systematic literature review on sensitive data protection in blockchain applications S Khanum, K Mustafa Concurrency and Computation: Practice and Experience 35 (1), e7422, 2023 | 16 | 2023 |
Security assurance against cybercrime ransomware H Rehman, E Yafi, M Nazir, K Mustafa Intelligent Computing & Optimization 1, 21-34, 2019 | 15 | 2019 |
Testability estimation framework M Nazir, RA Khan, K Mustafa International Journal of Computer Applications 2 (5), 9-14, 2010 | 15 | 2010 |
From threat to security indexing: a causal chain RA Khan, K Mustafa Computer Fraud & Security 2009 (5), 9-12, 2009 | 15 | 2009 |
Recent advances in sre research S Pandey, K Mustafa Recent Advances in SRE Research 2 (04), 1079-1085, 2010 | 12 | 2010 |
A Model for Object Oriented Design Quality Assessment RA Khan, K Mustafa Process Technology Symposium, Kusadasi, Izmir, Turkey, June, 2004 | 12 | 2004 |
Design specifications for a generic Intelligent Tutoring System RK Barbhuiya, K Mustafa, S Jabin Proceedings of the International Conference on e-Learning, e-Business …, 2011 | 11* | 2011 |