Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions S Ahmad, I Shakeel, S Mehfuz, J Ahmad Computer Science Review 49, 100568, 2023 | 84 | 2023 |
esrcTool: a tool to estimate the software risk and cost M Sadiq, A Rahman, S Ahmad, M Asim, J Ahmad 2010 Second International Conference on Computer Research and Development …, 2010 | 16 | 2010 |
Fuzzy logic driven security requirements engineering process M Sadiq, V Susheela Devi, J Ahmad, CW Mohammad Journal of Information and Optimization Sciences 42 (7), 1685-1707, 2021 | 6 | 2021 |
Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies JO Ogala, S Ahmad, I Shakeel, J Ahmad, S Mehfuz SN Computer Science 4 (5), 530, 2023 | 5 | 2023 |
Identification of security requirements from the selected set of requirements under fuzzy environment J Ahmad, CW Mohammad, M Sadiq 2021 International Conference on Computing, Communication, and Intelligent …, 2021 | 3 | 2021 |
More on Adding Threat during SoftwareRequirements Elicitation and Prioritization M Sadiq, J Ahmad, A Rahman, R Suman, S Khandelwal International Journal of Engineering and Technology 2 (3), 286, 2010 | 3 | 2010 |
Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms J Ahmad, CW Mohammad, M Sadiq Proceedings of International Conference on Recent Trends in Computing: ICRTC …, 2022 | 1 | 2022 |
Enhancing Software Requirements Selection Process Using Genetic Algorithm M Nazim, J Ahmad, W Farhan, MW Ansari, S Hoda, V Bhaskar ICIDSSD 2022: Proceedings of the 3rd International Conference on ICT for …, 2023 | | 2023 |
On Software Security Requirements Elicitation and Analysis Methods J Ahmad, CW Mohammad, M Sadiq IT in Industry 9 (1), 24-36, 2021 | | 2021 |