Healthcare data breaches: insights and implications AH Seh, M Zarour, M Alenezi, AK Sarkar, A Agrawal, R Kumar, ... Healthcare 8 (2), 133, 2020 | 575 | 2020 |
Evaluating the impact of blockchain models for secure and trustworthy electronic healthcare records M Zarour, MTJ Ansari, M Alenezi, AK Sarkar, M Faizan, A Agrawal, ... IEEE Access 8, 157959-157973, 2020 | 147 | 2020 |
Key issues in healthcare data integrity: Analysis and recommendations AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ... IEEE Access 8, 40612-40628, 2020 | 120 | 2020 |
Ensuring data integrity of healthcare information in the era of digital health M Zarour, M Alenezi, MTJ Ansari, AK Pandey, M Ahmad, A Agrawal, ... Healthcare technology letters 8 (3), 66-77, 2021 | 111 | 2021 |
A systematic analysis on blockchain integration with healthcare domain: scope and challenges S Khatri, FA Alzahrani, MTJ Ansari, A Agrawal, R Kumar, RA Khan IEEE Access 9, 84666-84687, 2021 | 103 | 2021 |
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development MTJ Ansari, FA Al-Zahrani, D Pandey, A Agrawal BMC Medical Informatics and Decision Making 20, 1-13, 2020 | 97 | 2020 |
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 50944-50957, 2020 | 90 | 2020 |
A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan Ieee Access 8, 48870-48885, 2020 | 75 | 2020 |
A study of big data characteristics G Kapil, A Agrawal, RA Khan 2016 international conference on communication and electronics systems …, 2016 | 71 | 2016 |
Ransomware: evolution, target and safety measures AK Maurya, N Kumar, A Agrawal, RA Khan International Journal of Computer Sciences and Engineering 6 (1), 80-85, 2018 | 68 | 2018 |
Measuring security durability of software through fuzzy-based decision-making process R Kumar, M Zarour, M Alenezi, A Agrawal, RA Khan International Journal of Computational Intelligence Systems 12 (2), 627-642, 2019 | 66 | 2019 |
Security issues in fog environment: a systematic literature review J Kaur, A Agrawal, RA Khan International Journal of Wireless Information Networks 27, 467-483, 2020 | 63 | 2020 |
Software security estimation using the hybrid fuzzy ANP-TOPSIS approach: Design tactics perspective A Agrawal, AH Seh, A Baz, H Alhakami, W Alhakami, M Baz, R Kumar, ... Symmetry 12 (4), 598, 2020 | 57 | 2020 |
Voice biometric: A technology for voice based authentication N Singh, A Agrawal, RA Khan Advanced Science, Engineering and Medicine 10 (7-8), 754-759, 2018 | 53 | 2018 |
Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security R Kumar, AK Pandey, A Baz, H Alhakami, W Alhakami, A Agrawal, ... Symmetry 12 (4), 664, 2020 | 52 | 2020 |
Measuring the sustainable-security of Web applications through a fuzzy-based integrated approach of AHP and TOPSIS A Agrawal, M Alenezi, R Kumar, RA Khan IEEE Access 7, 153936-153951, 2019 | 52 | 2019 |
Evaluating performance of software durability through an integrated fuzzy-based symmetrical method of ANP and TOPSIS SA Khan, M Alenezi, A Agrawal, R Kumar, RA Khan Symmetry 12 (4), 493, 2020 | 51 | 2020 |
RSA based encryption approach for preserving confidentiality of big data K Sharma, A Agrawal, D Pandey, RA Khan, SK Dinkar Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 49 | 2022 |
A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application R Kumar, A Baz, H Alhakami, W Alhakami, A Agrawal, RA Khan Ain Shams Engineering Journal 12 (2), 2227-2240, 2021 | 48 | 2021 |
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective G Kapil, A Agrawal, A Attaallah, A Algarni, R Kumar, RA Khan PeerJ Computer Science 6, e259, 2020 | 48 | 2020 |