Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

Evaluating the impact of blockchain models for secure and trustworthy electronic healthcare records

M Zarour, MTJ Ansari, M Alenezi, AK Sarkar… - IEEE …, 2020 - ieeexplore.ieee.org
Blockchain technology is among the most significant developments and revolutionary
innovations of the Information Technology industry. It corners a crucial space in the present …

Towards the integration of security practices in agile software development: a systematic mapping review

Y Valdés-Rodríguez, J Hochstetter-Diez… - Applied Sciences, 2023 - mdpi.com
Software development must be based on more than just the experience and capabilities of
your programmers and your team. The importance of obtaining a quality product lies in the …

[PDF][PDF] Analyzing the Big Data Security Through a Unified Decision-Making Approach.

A Attaallah, H Alsuhabi, S Shukla… - … Automation & Soft …, 2022 - pdfs.semanticscholar.org
The use of cloud services, web-based software systems, the Internet of Things (IoT),
Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the …

A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

MTJ Ansari, FA Al-Zahrani, D Pandey… - BMC Medical Informatics …, 2020 - Springer
Background Today's healthcare organizations want to implement secure and quality
healthcare software as cyber-security is a significant risk factor for healthcare data …

Ensuring data integrity of healthcare information in the era of digital health

M Zarour, M Alenezi, MTJ Ansari… - Healthcare …, 2021 - Wiley Online Library
Data integrity continues to be a persistent problem in the current healthcare sector. It
ensures that the data is correct and has not even in any manner been improperly changed …

P-STORE: Extension of STORE methodology to elicit privacy requirements

MTJ Ansari, A Baz, H Alhakami, W Alhakami… - Arabian Journal for …, 2021 - Springer
Implementing security and privacy requirements at every level of the software development
cycle is imperative for ensuring optimum usability as well as the users' satisfaction. Software …

[HTML][HTML] Quantitative assessment of sustainable renewable energy through soft computing: Fuzzy AHP-TOPSIS method

M Alghassab - Energy Reports, 2022 - Elsevier
Green energy resources need to be mobilized at an imminent pace to fulfill the world's
energy requirements that are both sustainable and cost-effective. Utilizing soft computing for …

Effectiveness evaluation of different IDSs using integrated fuzzy MCDM model

H Alyami, MTJ Ansari, A Alharbi, W Alosaimi… - Electronics, 2022 - mdpi.com
Cyber-attacks are becoming progressively complicated; hence, the functional issues of
intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect …

Analysis and ranking of IT risk factors using fuzzy TOPSIS-based approach

HM Alshahrani, SS Alotaibi, MTJ Ansari, MM Asiri… - Applied Sciences, 2022 - mdpi.com
In today's age of information and communication technology (ICT), many companies are
using advanced digital technologies as well as the application of information technology to …