Author of the publication

Atrocious Impinging of COVID-19 Pandemic on Software Development Industries.

, , , , , and . Comput. Syst. Sci. Eng., 36 (2): 323-338 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique., , , , , and . Comput. Syst. Sci. Eng., 44 (1): 859-872 (2023)Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective., , , , , , , and . Symmetry, 12 (4): 598 (2020)Applicability of Software Defined Networking in Campus Network., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 619-627. Springer, (2014)Security Assessment in Foggy Era through Analytical Hierarchy Process., , and . ICCCNT, page 1-6. IEEE, (2020)A Novel Drainage System Using Cellular Automata to Avoid Urban Flood., , and . Int. J. Appl. Evol. Comput., 9 (2): 38-51 (2018)Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS., , , and . IEEE Access, (2019)RSA based encryption approach for preserving confidentiality of big data., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (5): 2088-2097 (2022)Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method., , , , , , and . Int. J. Syst. Dyn. Appl., 10 (4): 1-24 (October 2021)Reengineering Legacy Source Code to Model Driven Architecture., , and . ACIS-ICIS, page 262-267. IEEE Computer Society, (2005)Atrocious Impinging of COVID-19 Pandemic on Software Development Industries., , , , , and . Comput. Syst. Sci. Eng., 36 (2): 323-338 (2021)