Follow
Dr. Mohd Waris Khan
Dr. Mohd Waris Khan
Assistant Professor,
Verified email at iul.ac.in - Homepage
Title
Cited by
Cited by
Year
Trends in malware attacks: Identification and mitigation strategies
AK Pandey, AK Tripathi, G Kapil, V Singh, MW Khan, A Agrawal, R Kumar, ...
Critical Concepts, Standards, and Techniques in Cyber Forensics, 47-60, 2020
222020
Enhancement of two-tier ATM security mechanism: towards providing a real-time solution for network issues
SA Ansar, S Kumar, MW Khan, A Yadav, RA Khan
International Journal of Advanced Computer Science and Applications 11 (7), 2020
132020
Evaluating intelligent methods for detecting covid-19 fake news on social media platforms
H Alhakami, W Alhakami, A Baz, M Faizan, MW Khan, A Agrawal
Electronics 11 (15), 2417, 2022
122022
Current challenges of digital forensics in cyber security
AK Pandey, AK Tripathi, G Kapil, V Singh, MW Khan, A Agrawal, R Kumar, ...
Critical Concepts, Standards, and Techniques in Cyber Forensics, 31-46, 2020
102020
Interactions of Meloidogyne incognita, Rotylenchulus reniformis and Tylenchorhynchus brassicae as cohabitants on eggplant
RM Khan, MW Khan, AM Khan
Nematologia Mediterranea, 1986
91986
Estimation of Software Security Risks through CVSS: A Design Phase Perspective.
SA Ansar, SP Srivastava, J Yadav, M Khan, A Yadav, RA Khan
Turkish Online Journal of Qualitative Inquiry 12 (4), 2021
82021
Paradigms of smart education with IoT approach
D Pandey, N Singh, V Singh, MW Khan
Internet of Things and its applications, 223-233, 2022
72022
A comparative study on data mining approach using machine learning techniques: prediction perspective
A Mishra, MH Khan, W Khan, MZ Khan, NK Srivastava
Pervasive Healthcare: A Compendium of Critical Factors for Success, 153-165, 2022
62022
A novel paradigm: cloud-fog integrated IoT approach
SK Dwivedi, J Yadav, SA Ansar, MW Khan, D Pandey, RA Khan
2022 3rd International Conference on Computation, Automation and Knowledge …, 2022
52022
TEST PLAN SPECIFICATION USING SECURITY ATTRIBUTES: A DESIGN PERSPECTIVE
MW Khan, D Pandey, SA Khan
ICIC Express Letters 12 (10), 1061-1069, 2018
32018
Critical Review on Software Testing: Security Perspective
Mohd Waris khan, Dhirendra Pandey, Suhel Ahmad Khan
International Conference on Smart Trends for Information Technology and …, 2016
3*2016
Effective requirement engineering process by incorporating risk management approach
N Singh, D Pandey, V Pandey, MW Khan
Solid State Technology 63 (5), 814-822, 2020
22020
Optimizing the impact of security attributes in requirement elicitation techniques using FAHP
V Singh, D Pandey, K Sahu, MW Khan
communications 14, 15, 2020
22020
MEASURING THE SECURITY TESTING ATTRIBUTES THROUGH FUZZY ANALYTIC NETWORK PROCESS: A DESIGN PERSPECTIVE
SA M. W. Khan, D. Pandey
Journal of Advanced Research in Dynamical and Control Systems, 1514-1523, 2018
2*2018
REVISITING SOFTWARE SECURITY MODELS: A DESIGN PERSPECTIVE
Mohd Waris Khan, Dhirendra Pandey
Academic Social Research 2 (1), 79-88, 2016
2*2016
Mohd. Waris Khan, Vandana Pandey “Role of Requirement Validation in Requirement Development”
D Pandey
Proc. of International Conference on Recent Development in Engineering and …, 2012
22012
Security Test Case Prioritization through Ant Colony Optimization Algorithm
A Attaallah, K al-Sulbi, A Alasiry, M Marzougui, MW Khan, M Faizan, ...
Computer Systems Science & Engineering 47 (3), 2023
12023
Adaptation of Digital Twins as a methodology for management and development of Secure Software Systems
S Satyarthi, D Pandey, MW Khan
NeuroQuantology 19 (7), 300, 2021
12021
A Review on Some Pertinent Software Security Risk Management Frameworks
SA Ansar, M Faizan, MW Khan
12020
Quantitative analysis of requirement elicitation techniques through FANP: security perspective
V Singh, D Pandey, MW Khan, K Sahu
Int J Recent Technol Eng 8 (5), 3550-3558, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20