Trends in malware attacks: Identification and mitigation strategies AK Pandey, AK Tripathi, G Kapil, V Singh, MW Khan, A Agrawal, R Kumar, ... Critical Concepts, Standards, and Techniques in Cyber Forensics, 47-60, 2020 | 22 | 2020 |
Enhancement of two-tier ATM security mechanism: towards providing a real-time solution for network issues SA Ansar, S Kumar, MW Khan, A Yadav, RA Khan International Journal of Advanced Computer Science and Applications 11 (7), 2020 | 13 | 2020 |
Evaluating intelligent methods for detecting covid-19 fake news on social media platforms H Alhakami, W Alhakami, A Baz, M Faizan, MW Khan, A Agrawal Electronics 11 (15), 2417, 2022 | 12 | 2022 |
Current challenges of digital forensics in cyber security AK Pandey, AK Tripathi, G Kapil, V Singh, MW Khan, A Agrawal, R Kumar, ... Critical Concepts, Standards, and Techniques in Cyber Forensics, 31-46, 2020 | 10 | 2020 |
Interactions of Meloidogyne incognita, Rotylenchulus reniformis and Tylenchorhynchus brassicae as cohabitants on eggplant RM Khan, MW Khan, AM Khan Nematologia Mediterranea, 1986 | 9 | 1986 |
Estimation of Software Security Risks through CVSS: A Design Phase Perspective. SA Ansar, SP Srivastava, J Yadav, M Khan, A Yadav, RA Khan Turkish Online Journal of Qualitative Inquiry 12 (4), 2021 | 8 | 2021 |
Paradigms of smart education with IoT approach D Pandey, N Singh, V Singh, MW Khan Internet of Things and its applications, 223-233, 2022 | 7 | 2022 |
A comparative study on data mining approach using machine learning techniques: prediction perspective A Mishra, MH Khan, W Khan, MZ Khan, NK Srivastava Pervasive Healthcare: A Compendium of Critical Factors for Success, 153-165, 2022 | 6 | 2022 |
A novel paradigm: cloud-fog integrated IoT approach SK Dwivedi, J Yadav, SA Ansar, MW Khan, D Pandey, RA Khan 2022 3rd International Conference on Computation, Automation and Knowledge …, 2022 | 5 | 2022 |
TEST PLAN SPECIFICATION USING SECURITY ATTRIBUTES: A DESIGN PERSPECTIVE MW Khan, D Pandey, SA Khan ICIC Express Letters 12 (10), 1061-1069, 2018 | 3 | 2018 |
Critical Review on Software Testing: Security Perspective Mohd Waris khan, Dhirendra Pandey, Suhel Ahmad Khan International Conference on Smart Trends for Information Technology and …, 2016 | 3* | 2016 |
Effective requirement engineering process by incorporating risk management approach N Singh, D Pandey, V Pandey, MW Khan Solid State Technology 63 (5), 814-822, 2020 | 2 | 2020 |
Optimizing the impact of security attributes in requirement elicitation techniques using FAHP V Singh, D Pandey, K Sahu, MW Khan communications 14, 15, 2020 | 2 | 2020 |
MEASURING THE SECURITY TESTING ATTRIBUTES THROUGH FUZZY ANALYTIC NETWORK PROCESS: A DESIGN PERSPECTIVE SA M. W. Khan, D. Pandey Journal of Advanced Research in Dynamical and Control Systems, 1514-1523, 2018 | 2* | 2018 |
REVISITING SOFTWARE SECURITY MODELS: A DESIGN PERSPECTIVE Mohd Waris Khan, Dhirendra Pandey Academic Social Research 2 (1), 79-88, 2016 | 2* | 2016 |
Mohd. Waris Khan, Vandana Pandey “Role of Requirement Validation in Requirement Development” D Pandey Proc. of International Conference on Recent Development in Engineering and …, 2012 | 2 | 2012 |
Security Test Case Prioritization through Ant Colony Optimization Algorithm A Attaallah, K al-Sulbi, A Alasiry, M Marzougui, MW Khan, M Faizan, ... Computer Systems Science & Engineering 47 (3), 2023 | 1 | 2023 |
Adaptation of Digital Twins as a methodology for management and development of Secure Software Systems S Satyarthi, D Pandey, MW Khan NeuroQuantology 19 (7), 300, 2021 | 1 | 2021 |
A Review on Some Pertinent Software Security Risk Management Frameworks SA Ansar, M Faizan, MW Khan | 1 | 2020 |
Quantitative analysis of requirement elicitation techniques through FANP: security perspective V Singh, D Pandey, MW Khan, K Sahu Int J Recent Technol Eng 8 (5), 3550-3558, 2020 | 1 | 2020 |