Follow
JAVED AHMAD
Title
Cited by
Cited by
Year
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions
S Ahmad, I Shakeel, S Mehfuz, J Ahmad
Computer Science Review 49, 100568, 2023
312023
esrcTool: a tool to estimate the software risk and cost
M Sadiq, A Rahman, S Ahmad, M Asim, J Ahmad
2010 Second International Conference on Computer Research and Development …, 2010
152010
Fuzzy logic driven security requirements engineering process
M Sadiq, V Susheela Devi, J Ahmad, CW Mohammad
Journal of Information and Optimization Sciences 42 (7), 1685-1707, 2021
62021
Identification of security requirements from the selected set of requirements under fuzzy environment
J Ahmad, CW Mohammad, M Sadiq
2021 International Conference on Computing, Communication, and Intelligent …, 2021
32021
More on Adding Threat during SoftwareRequirements Elicitation and Prioritization
M Sadiq, J Ahmad, A Rahman, R Suman, S Khandelwal
International Journal of Engineering and Technology 2 (3), 286, 2010
32010
Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies
JO Ogala, S Ahmad, I Shakeel, J Ahmad, S Mehfuz
SN Computer Science 4 (5), 530, 2023
22023
Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms
J Ahmad, CW Mohammad, M Sadiq
Proceedings of International Conference on Recent Trends in Computing: ICRTC …, 2022
12022
Enhancing Software Requirements Selection Process Using Genetic Algorithm
M Nazim, J Ahmad, W Farhan, MW Ansari, S Hoda, V Bhaskar
ICIDSSD 2022: Proceedings of the 3rd International Conference on ICT for …, 2023
2023
On Software Security Requirements Elicitation and Analysis Methods
J Ahmad, CW Mohammad, M Sadiq
IT in Industry 9 (1), 24-36, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–9