Durability challenges in software engineering R Kumar, SA Khan, RA Khan CrossTalk 42 (4), 29-31, 2016 | 52 | 2016 |
Revisiting software security: Durability perspective R Kumar, SA Khan, RA Khan International Journal of Hybrid Information Technology 8 (2), 311-322, 2015 | 52 | 2015 |
Evaluating performance of software durability through an integrated fuzzy-based symmetrical method of ANP and TOPSIS SA Khan, M Alenezi, A Agrawal, R Kumar, RA Khan Symmetry 12 (4), 493, 2020 | 51 | 2020 |
Multi-level fuzzy system for usable-security assessment A Agrawal, M Alenezi, SA Khan, R Kumar, RA Khan Journal of King Saud University-Computer and Information Sciences 34 (3 …, 2022 | 44 | 2022 |
Analytical network process for software security: A design perspective R Kumar, SA Khan, RA Khan CSI transactions on ICT 4, 255-258, 2016 | 38 | 2016 |
W-GeoR: Weighted geographical routing for VANET’s health monitoring applications in urban traffic networks P Singh, RS Raw, SA Khan, MA Mohammed, AA Aly, DN Le IEEE Access 10, 38850-38869, 2021 | 37 | 2021 |
Durable security in software development: Needs and importance R Kumar, SA Khan, RA Khan CSI Communication 39 (7), 34-36, 2015 | 35 | 2015 |
Measuring the security attributes through fuzzy analytic hierarchy process: Durability perspective R Kumar, SA Khan, A Agrawal, RA Khan ICIC Express Letters 12 (6), 615-620, 2018 | 32 | 2018 |
Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective J Kaur, AI Khan, YB Abushark, MM Alam, SA Khan, A Agrawal, R Kumar, ... Risk Management and Healthcare Policy, 355-371, 2020 | 28 | 2020 |
Link risk degree aided routing protocol based on weight gradient for health monitoring applications in vehicular ad-hoc networks P Singh, RS Raw, SA Khan Journal of Ambient Intelligence and Humanized Computing 13 (12), 5779-5801, 2022 | 27 | 2022 |
Software security testing: A pertinent framework R Kumar, SA Khan, RA Khan Journal of Global Research in Computer Science 5 (3), 23-27, 2014 | 24 | 2014 |
Revisiting software security risks R Kumar, SA Khan, RA Khan British Journal of Mathematics & Computer Science 11 (6), 1-10, 2015 | 23 | 2015 |
A Roadmap for Security RA Khan, SA Khan International Journal of Computer Science & Emerging Technology 1 (1), 5-8, 2010 | 20* | 2010 |
Development of novel framework for patient health monitoring system using VANET: an Indian perspective P Singh, RS Raw, SA Khan International Journal of Information Technology 13 (1), 383-390, 2021 | 16 | 2021 |
Multi-level hesitant fuzzy based model for usable-security assessment M Nadeem, JF Al-Amri, AF Subahi, AH Seh, SA Khan, A Agrawal, ... Intell. Autom. Soft Comput 31 (1), 103304, 2022 | 15 | 2022 |
Security assessment through fuzzy-delphi analytic hierarchy process SA Khan | 15 | 2018 |
Securing object oriented design: A complexity perspective SA Khan, RA Khan International Journal of Computer Applications 8 (13), 2010 | 14 | 2010 |
Review on security aspects for cloud architecture S Alam, M Muqeem, SA Khan International Journal of Electrical and Computer Engineering 8 (5), 3129-3139, 2018 | 13 | 2018 |
Fuzzy analytic hierarchy process for software durability: Security risks perspective R Kumar, SA Khan, RA Khan Proceedings of International Conference on Communication and Networks …, 2017 | 13 | 2017 |
A link analysis algorithm for identification of key hidden services SA Khan, A Alharbi, M Faizan, W Alosaimi | 12 | 2021 |