Systematic map** study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications

R Kumar, AI Khan, YB Abushark, MM Alam… - IEEE …, 2020 - ieeexplore.ieee.org
Security and usability are often thought of as being contradictive in nature. One affects the
other negatively. The relation and trade-offs between usability and security must be detected …

[HTML][HTML] Development of sustainable modified sand concrete: An experimental study

MN Akhtar, M Jameel, Z Ibrahim, NM Bunnori… - Ain Shams Engineering …, 2024 - Elsevier
The present study aims to develop 4 types of sustainable modified sand using various
proportions of desert sand, natural crushed sand, and recycled crushed sand. The …

[PDF][PDF] A fuzzy multi-objective covering-based security quantification model for mitigating risk of web based medical image processing system

A Algarni, M Ahmad, A Attaallah… - … Journal of Advanced …, 2020 - researchgate.net
Medical image processing is one of the most active research areas and has big impact on
the health sector. With the arrival of intelligent processes, web based medical image …

A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications

R Kumar, AI Khan, YB Abushark, MM Alam… - IEEE …, 2020 - ieeexplore.ieee.org
There has been a phenomenal increase in the use of web applications in every facet of
human endeavor. From education, healthcare, banking, business to governance and so …

The greenhouse technology in different climate conditions: A comprehensive energy-saving analysis

H Nasrollahi, F Ahmadi, M Ebadollahi, SN Nobar… - Sustainable Energy …, 2021 - Elsevier
One of the most critical barriers for using a greenhouse is the energy consumption for
heating generation, which explains the vital role of energy efficiency. In this study, a model …

[HTML][HTML] A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application

R Kumar, A Baz, H Alhakami, W Alhakami… - Ain Shams Engineering …, 2021 - Elsevier
The present day environment of cyber-attacks is a threat to even the most secure systems.
With each passing day, the attackers are adapting new technologies to infiltrate systems and …

Toward selection of trustworthy and efficient E-learning platform

B Alojaiman - IEEE Access, 2021 - ieeexplore.ieee.org
The e-learning sector continues to evolve, with a growing number of eLearning resources
available to businesses, government agencies, and individual people. With the fastest …

Evaluating the usable-security of healthcare software through unified technique of fuzzy logic, ANP and TOPSIS

FA Al-Zahrani - IEEE Access, 2020 - ieeexplore.ieee.org
The current research efforts in the security domain are essentially inspired by the intention to
ensure both healthcare software's security and usability. Practitioners are continuously …