Raees Ahmad Khan
Orcid: 0000-0002-9454-1312
According to our database1,
Raees Ahmad Khan
authored at least 67 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Selection of data analytic techniques by using fuzzy AHP TOPSIS from a healthcare perspective.
BMC Medical Informatics Decis. Mak., December, 2024
Survey on identification and prediction of security threats using various deep learning models on software testing.
Multim. Tools Appl., August, 2024
Comput. Secur., February, 2024
2023
A neutrosophic AHP-based computational technique for security management in a fog computing network.
J. Supercomput., 2023
Int. J. Inf. Sec., 2023
Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques.
Int. J. Fuzzy Log. Intell. Syst., 2023
Comput. Syst. Sci. Eng., 2023
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
2022
DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative.
EAI Endorsed Trans. Scalable Inf. Syst., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario.
J. King Saud Univ. Comput. Inf. Sci., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Hybrid Binary Butterfly Optimization Algorithm and Simulated Annealing for Feature Selection Problem.
Int. J. Appl. Metaheuristic Comput., 2022
Analyzing the Implications of COVID-19 Pandemic through an Intelligent-Computing Technique.
Comput. Syst. Sci. Eng., 2022
Comput. Syst. Sci. Eng., 2022
Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective.
Comput. Syst. Sci. Eng., 2022
Comput. Syst. Sci. Eng., 2022
2021
Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method.
Int. J. Syst. Dyn. Appl., October, 2021
Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems.
Symmetry, 2021
An anti-phishing enterprise environ model using feed-forward backpropagation and Levenberg-Marquardt method.
Secur. Priv., 2021
A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods.
KSII Trans. Internet Inf. Syst., 2021
Comput. Syst. Sci. Eng., 2021
Comput. Syst. Sci. Eng., 2021
Comput. Syst. Sci. Eng., 2021
A Systematic Analysis on Blockchain Integration With Healthcare Domain: Scope and Challenges.
IEEE Access, 2021
2020
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security.
Symmetry, 2020
Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS.
Symmetry, 2020
Symmetry, 2020
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
Symmetry, 2020
A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications.
Symmetry, 2020
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective.
PeerJ Comput. Sci., 2020
Int. J. Wirel. Inf. Networks, 2020
Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records.
IEEE Access, 2020
IEEE Access, 2020
An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications.
IEEE Access, 2020
A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications.
IEEE Access, 2020
A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software.
IEEE Access, 2020
Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective.
IEEE Access, 2020
Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis.
IEEE Access, 2020
Proceedings of the 11th International Conference on Computing, 2020
2019
EAI Endorsed Trans. Scalable Inf. Syst., 2019
PeerJ Comput. Sci., 2019
Iran J. Comput. Sci., 2019
Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process.
Int. J. Comput. Intell. Syst., 2019
Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS.
IEEE Access, 2019
2018
Int. J. Appl. Evol. Comput., 2018
Proceedings of the 2018 IEEE International Conference on Research in Intelligent and Computing in Engineering, 2018
2016
Proceedings of the Advances in Computing and Data Sciences, 2016
2015
An Analysis of Software Reliability Assessment with Neuro-Fuzzy based Expert Systems.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015
2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
2012
ACM SIGSOFT Softw. Eng. Notes, 2012
2011
2010
Proceedings of the Contemporary Computing - Third International Conference, 2010
2009
ACM SIGSOFT Softw. Eng. Notes, 2009
ACM SIGSOFT Softw. Eng. Notes, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Information Systems, Technology and Management, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
WBIS for Computer Programming.
Proceedings of the 2008 International Conference on E-Learning, 2008
2007
J. King Saud Univ. Comput. Inf. Sci., 2007
2005
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005
2004
High Level Design Quality Assessment of Object Oriented Codes.
Proceedings of the Verification and Validation of Enterprise Information Systems, 2004