Author of the publication

Atrocious Impinging of COVID-19 Pandemic on Software Development Industries.

, , , , , and . Comput. Syst. Sci. Eng., 36 (2): 323-338 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Variability analysis of self-timed SRAM robustness., , , and . PATMOS, page 24-31. IEEE, (2013)Traffic prediction for 5G: A deep learning approach based on lightweight hybrid attention networks., , , , and . Digit. Signal Process., (2024)A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software., , , , , , and . IEEE Access, (2020)An edge inspired image watermarking approach using compass edge detector and LSB in cybersecurity., , , , , , and . Comput. Electr. Eng., 111 (Part B): 108979 (November 2023)CANAttack: Assessing Vulnerabilities within Controller Area Network., , , , , and . Sensors, 23 (19): 8223 (October 2023)A Usability Management Framework for Securing Healthcare Information System., , , , , and . Comput. Syst. Sci. Eng., 42 (3): 1015-1030 (2022)Performance analysis of NOMA systems over Rayleigh fading channels with successive-interference cancellation., , and . IET Commun., 14 (6): 1065-1072 (2020)SEARCH: An SDN-Enabled Approach for Vehicle Path-Planning., , , , and . IEEE Trans. Veh. Technol., 69 (12): 14523-14536 (2020)Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective., , , , , , , and . Symmetry, 12 (4): 598 (2020)Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning Strategy., , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2021)