Blockchain technology for electoral process in Africa: a short review M Alam, MO Yusuf, NA Sani International Journal of Information Technology 12 (3), 861-867, 2020 | 21 | 2020 |
Software security requirements checklist M Alam International Journal of Software Engineering, IJSE 3 (1), 53-62, 2010 | 21 | 2010 |
Information security policy architecture M Alam, MU Bokhari International Conference on Computational Intelligence and Multimedia …, 2007 | 16 | 2007 |
Map reduce clustering in incremental Big Data processing M Khan, A Malviya, M Alam International Journal of Innovative Technology and Exploring Engineering …, 2019 | 8 | 2019 |
Customer satisfaction of internet banking and theory of big push: An analytical study with special reference to selected customers in Vadodara City M Alam, AM Soni Ninth AIMS International Conference on Management 8 (4), 941-947, 2012 | 8 | 2012 |
Salami attacks and their mitigation—An overview NS Alhassan, MO Yusuf, AR Karmanje, M Alam Proceedings of the 5th International Conference on Computing for Sustainable …, 2018 | 7 | 2018 |
Web based XSS and SQL attacks on cloud and mitigation N Sharma, M Alam, M Singh Journal of Computer Science Engineering and Software Testing 1 (2), 1-10, 2015 | 5 | 2015 |
Pedaling out of poverty: social impact of a manual irrigation technology in South Asia (Research Report 45) T Shah, M Alam, MD Kumar, RK Nagar, M Singh International Water Management Institute, Colombo, Sri Lanka, 2000 | 5 | 2000 |
Big Data Analytics to Authenticate Bank Notes Using K-Means Clustering M Khan, M Alam Helix-The Scientific Explorer| Peer Reviewed Bimonthly International Journal …, 2021 | 4 | 2021 |
Object oriented software security: goal questions metrics approach M Alam International journal of Information technology 12 (1), 175-179, 2020 | 4 | 2020 |
Maritime safety and security in the Bay of Bengal MK Alam Bangladesh Maritime Journal 3 (1), 25-31, 2019 | 4 | 2019 |
Denial of service: Techniques of attacks and mitigation N Sharma, M Alam, M Singh Journal of Computer Science Engineering and Software Testing 1, 11-14, 2015 | 4 | 2015 |
A MapReduce clustering approach for sentiment analysis using big data M Khan, M Alam, S Basheer, MD Ansari, N Kumar Proceedings of the International Conference on Cognitive and Intelligent …, 2022 | 3 | 2022 |
Malicious node isolation under black hole attack in wireless mobile ad hoc network M Alam | 2 | 2019 |
Threat Model: A Path of Secure Design MU Bokhari, M Alam Intl Journal of Technology and Applied Science 1, 0 | 2 | |
Emerging Maritime Development in the Bay of Bengal MK Alam BMJ, 77-84, 2022 | 1 | 2022 |
Multiview classification with missing-views through adversarial representation and inductive transfer learning MO Yusuf, D Srivastava, SS Singh, M Alam International Advanced Computing Conference, 305-317, 2021 | 1 | 2021 |
Enriched J-Bit encrypting technique using data compression algorithms in data warehouse N Sharma, MO Hussain, M Alam Journal of Information and Optimization Sciences 41 (3), 813-822, 2020 | 1 | 2020 |
Design and Performance Evaluation of Shape Memory Alloy (SMA) Cross-Wire Configured High Damping Rubber Bearing K Spencer, F Hedayati Dezfuli, M Alam Leadership in Sustainable Infrastructure, 1-10, 2017 | 1 | 2017 |
Seismic performance of beam-column joint reinforced with different shape memory alloy alternatives MR Kabir, S Rizvi, M Alam 6th International Conference on Engineering Mechanics and Materials, 2017 | 1 | 2017 |