Author of the publication

Novel Triplex Procedure for Ranking the Ability of Software Engineering Students Based on Two levels of AHP and Group TOPSIS Techniques.

, , , , , , , , , , , and . Int. J. Inf. Technol. Decis. Mak., 20 (1): 67-135 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model., , , , and . Int. J. Intell. Syst., 37 (9): 5768-5795 (2022)IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges., , , , , and . IEEE Access, (2020)Secure Task Distribution With Verifiable Re-Encryption in Mobile-Crowdsensing-Assisted Emergency IoT System., , and . IEEE Internet Things J., 11 (3): 3896-3908 (February 2024)Detecting malicious behaviour using supervised learning algorithms of the function calls., and . Int. J. Electron. Secur. Digit. Forensics, 5 (2): 90-109 (2013)Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT., , , and . IEEE Trans. Ind. Informatics, 17 (12): 8442-8452 (2021)Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery., , , , , and . IEEE Trans. Ind. Informatics, 19 (4): 5593-5601 (April 2023)Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions., , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3501-3509 (2022)Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities., , and . Microprocess. Microsystems, (2021)Big Data Resource Management & Networks: Taxonomy, Survey, and Future Directions., , , , and . IEEE Commun. Surv. Tutorials, 23 (4): 2098-2130 (2021)From ZeuS to Zitmo: Trends in Banking Malware., , and . TrustCom/BigDataSE/ISPA (1), page 1386-1391. IEEE, (2015)