Author of the publication

A Usability Management Framework for Securing Healthcare Information System.

, , , , , and . Comput. Syst. Sci. Eng., 42 (3): 1015-1030 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective., , , , , , , and . Symmetry, 12 (4): 598 (2020)Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique., , , , , and . Comput. Syst. Sci. Eng., 44 (1): 859-872 (2023)A Novel Drainage System Using Cellular Automata to Avoid Urban Flood., , and . Int. J. Appl. Evol. Comput., 9 (2): 38-51 (2018)Applicability of Software Defined Networking in Campus Network., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 619-627. Springer, (2014)Security Assessment in Foggy Era through Analytical Hierarchy Process., , and . ICCCNT, page 1-6. IEEE, (2020)Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS., , , and . IEEE Access, (2019)Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method., , , , , , and . Int. J. Syst. Dyn. Appl., 10 (4): 1-24 (October 2021)RSA based encryption approach for preserving confidentiality of big data., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (5): 2088-2097 (2022)Atrocious Impinging of COVID-19 Pandemic on Software Development Industries., , , , , and . Comput. Syst. Sci. Eng., 36 (2): 323-338 (2021)Reengineering Legacy Source Code to Model Driven Architecture., , and . ACIS-ICIS, page 262-267. IEEE Computer Society, (2005)