A review of quantum cybersecurity: threats, risks and opportunities

MJH Faruk, S Tahora, M Tasnim… - … Conference on AI in …, 2022 - ieeexplore.ieee.org
The promise of quantum computing is not speeding up conventional computing rather
delivering an exponential advantage for certain classes of problems, with profound …

A taxonomy of challenges for self-sovereign identity systems

A Satybaldy, MS Ferdous, M Nowostawski - IEEE Access, 2024 - ieeexplore.ieee.org
Creating and utilizing digital identities are fundamental steps towards accessing online
services. In order to facilitate the management of user identities, the concept of identity …

Software cost and effort estimation: Current approaches and future trends

CH Rashid, I Shafi, J Ahmad, EB Thompson… - IEEE …, 2023 - ieeexplore.ieee.org
Software cost and effort estimation is one of the most significant tasks in the area of software
engineering. Research conducted in this field has been evolving with new techniques that …

A survey on secure metadata of agile software development process using blockchain technology

P Nayaka Sheetakallu Krishnaiah… - Security and …, 2024 - Wiley Online Library
Scrum is an important and essential technique for develo** software. Scrum framework is
a project management technique that can emphasize software development teamwork. If …

Software engineering approaches adopted by blockchain developers

S Khalid, C Brown - 2023 Tenth International Conference on …, 2023 - ieeexplore.ieee.org
The adoption of blockchain technology has witnessed a rapid surge in recent years,
revolutionizing various industries. As blockchain-based solutions continue to gain …

[PDF][PDF] Framework for smart contract blockchain in halal traceability, integrity, and transparency

M Munawar, A Mugiono - Int. J. Electr. Comput. Eng.(IJECE), 2024 - researchgate.net
Currently, the halal status of a product may only be determined by the halal certificate or
halal label displayed on the product packaging. Simply put, several halal-related issues, like …

A contracted container-based code component collaboration model with reusable but invisible right management

W Wang, Z **e - Information Processing & Management, 2025 - Elsevier
Existing methodologies for the code collaboration are facing challenges such as leakage of
privacy data and insecure centralized management. To alleviate these challenges, we …

A review of dark web: Trends and future directions

S Sobhan, T Williams, MJH Faruk… - 2022 IEEE 46th …, 2022 - ieeexplore.ieee.org
The dark web is often discussed in taboo by many who are unfamiliar with the subject.
However, this paper takes a dive into the skeleton of what constructs the dark web by …

Systematic analysis of deep learning model for vulnerable code detection

MTB Nazim, MJH Faruk, H Shahriar… - 2022 IEEE 46th …, 2022 - ieeexplore.ieee.org
Software vulnerabilities have become a serious problem with the emergence of new
applications that contain potentially vulnerable or malicious code that can compromise the …

Blockchain-based decentralized verifiable credentials: Leveraging smart contracts for privacy-preserving authentication mechanisms to enhance data security in …

MJH Faruk, J Basney, JQ Cheng - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Managing and exchanging sensitive information securely is a paramount concern for
different domains such as scientific, finance, cybersecurity, and healthcare. The increasing …