Author of the publication

Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.

, , , , , , , and . Symmetry, 12 (4): 598 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Evolutionary Multimodal Optimization by Multiobjective Reformulation Without Explicit Niching/Sharing., and . AACC, volume 3285 of Lecture Notes in Computer Science, page 1-8. Springer, (2004)A proficient data gathering technique for unmanned aerial vehicle-enabled heterogeneous wireless sensor networks., , , and . Int. J. Commun. Syst., (2021)Exploring the Topological Properties of the Tor Dark Web., , , , , , and . IEEE Access, (2021)A Systematic Analysis on Blockchain Integration With Healthcare Domain: Scope and Challenges., , , , , and . IEEE Access, (2021)Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling., , , , , and . Symmetry, 13 (6): 1072 (2021)A secure framework for IoT-based healthcare using blockchain and IPFS., , and . Secur. Priv., (March 2024)Multi-level Fuzzy system for usable-security assessment., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (3): 657-665 (2022)Fast Inter-Base Station Ring (FIBR): A New Millimeter Wave Cellular Network Architecture., , , and . IEEE J. Sel. Areas Commun., 37 (12): 2699-2714 (2019)WiLiTV: Reducing Live Satellite TV Costs Using Wireless Relays., , , , and . IEEE J. Sel. Areas Commun., 36 (2): 233-245 (2018)Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities., , and . ISEC, page 141-142. ACM, (2009)