Extended decision support matrix for selection of sdlc-models on traditional and agile software development projects PM Khan, MMSS Beg 2013 Third International Conference on Advanced Computing and Communication …, 2013 | 51 | 2013 |
A simple and efficient key-dependent S-box design using fisher-yates shuffle technique M Ahmad, PM Khan, MZ Ansari Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014 | 43 | 2014 |
A new chaotic substitution box design for block ciphers M Ahmad, H Haleem, PM Khan 2014 International Conference on Signal Processing and Integrated Networks …, 2014 | 38 | 2014 |
Measuring cost of quality (CoQ) on SDLC projects is indispensible for effective software quality assurance PM Khan, MM Beg arXiv preprint arXiv:1405.4824, 2014 | 32 | 2014 |
Impact of RACI on delivery and outcome of software development projects PM Khan, KA Quraishi 2014 Fourth International Conference on Advanced Computing & Communication …, 2014 | 31 | 2014 |
IT-business alignment strategy for business growth AA Alsolamy, UA Khan, PM Khan 2014 International Conference on Computing for Sustainable Global …, 2014 | 22 | 2014 |
Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation PK Sharma, M Ahmad, PM Khan Security in Computing and Communications: Second International Symposium …, 2014 | 18 | 2014 |
Commonly used simulation tools for cloud computing research MA Kaleem, PM Khan 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 16 | 2015 |
Driving business value through an effective IT strategy development KS Albeladi, UA Khan, PM Khan 2014 International Conference on Computing for Sustainable Global …, 2014 | 16 | 2014 |
Policies, Techno-economic Analysis and Future Perspective of Green Diesel KB Ansari, SZ Hassan, SA Farooqui, R Hasib, P Khan, ARS Rahman, ... Green Diesel: An Alternative to Biodiesel and Petrodiesel, 351-375, 2022 | 8 | 2022 |
Challenges of Cloud Computing & Big Data Analytics A Gupta, A Mehrotra, PM Khan http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7088896, 1112 - 1115, 2015 | 8 | 2015 |
A survey on different encryption techniques for image, video, audio and docs A Poduval, N Rai, P Khan, A Sane, T Chaudhari International Journal of Engineering Applied Sciences and Technology 5 (11 …, 2021 | 6 | 2021 |
Spamizer: An approach to handle web form spam M Saxena, PM Khan 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 6 | 2015 |
Certificate based security services in adhoc sensor network S Fatima, S Ahmad, PM Khan BIJIT-BVICAM’s Int J Inf Technol 6 (2), 783-790, 2014 | 6 | 2014 |
Application of sizing estimation techniques for business critical software project management PM Khan, MM Beg arXiv preprint arXiv:1405.6335, 2014 | 6 | 2014 |
Cloud Computing Security Threats and Countermeasures D Porwal, PM Khan, DS Ray International journal for innovations in Engineering Science and Management …, 2014 | 5 | 2014 |
Project Management Office (PMO): An Organizational Asset for Value Propositions in Software Development Projects PM Khan, MMS Beg Proc. International Conference on Emerging Trends in Engineering and …, 2012 | 5 | 2012 |
Fuzzy logic based intruder detection system in mobile adhoc network S Siddiqui, PM Khan, MU Khan BVICA M's International Journal of Information Technology 6 (2), 767, 2014 | 4 | 2014 |
Sustaining IT PMOs during cycles of global recession PM Khan, MM Beg, M Ahmad arXiv preprint arXiv:1404.5034, 2014 | 4 | 2014 |
Two-dimensional based hybrid materials for photocatalytic conversion of CO2 into hydrocarbon fuels KB Ansari, A Banerjee, SZ Hassan, M Danish, I Arman, P Khan, ... | 3 | 2022 |