Підписатись
JAVED AHMAD
JAVED AHMAD
Підтверджена електронна адреса в jmi.ac.in
Назва
Посилання
Посилання
Рік
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions
S Ahmad, I Shakeel, S Mehfuz, J Ahmad
Computer Science Review 49, 100568, 2023
902023
esrcTool: a tool to estimate the software risk and cost
M Sadiq, A Rahman, S Ahmad, M Asim, J Ahmad
2010 Second International Conference on Computer Research and Development …, 2010
152010
Strengthening KMS security with advanced cryptography, machine learning, deep learning, and IoT technologies
JO Ogala, S Ahmad, I Shakeel, J Ahmad, S Mehfuz
SN Computer Science 4 (5), 530, 2023
82023
Fuzzy logic driven security requirements engineering process
M Sadiq, V Susheela Devi, J Ahmad, CW Mohammad
Journal of Information and Optimization Sciences 42 (7), 1685-1707, 2021
62021
Identification of security requirements from the selected set of requirements under fuzzy environment
J Ahmad, CW Mohammad, M Sadiq
2021 International Conference on Computing, Communication, and Intelligent …, 2021
32021
More on Adding Threat during SoftwareRequirements Elicitation and Prioritization
M Sadiq, J Ahmad, A Rahman, R Suman, S Khandelwal
International Journal of Engineering and Technology 2 (3), 286, 2010
32010
On Software Security Requirements Elicitation and Analysis Methods
J Ahmad, CW Mohammad, M Sadiq
IT in Industry 9 (1), 24-36, 2021
22021
Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms
J Ahmad, CW Mohammad, M Sadiq
Proceedings of International Conference on Recent Trends in Computing: ICRTC …, 2022
12022
Enhancing Software Requirements Selection Process Using Genetic Algorithm
M Nazim, J Ahmad, W Farhan, MW Ansari, S Hoda, V Bhaskar
ICIDSSD 2022: Proceedings of the 3rd International Conference on ICT for …, 2023
2023
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–9