A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification
Zeshan, Furkh, dar, Zaineb, Ahmad, Adnan, Malik, Tariq
Published in The Journal of supercomputing (01.11.2024)
Published in The Journal of supercomputing (01.11.2024)
Get full text
Journal Article
An Intelligent Recommender and Decision Support System (IRDSS) for Effective Management of Software Projects
Hamid, Muhammad, Zeshan, Furkh, Ahmad, Adnan, Ahmad, Farooq, Hamza, Muhammad Ali, Khan, Zuhaib Ashfaq, Munawar, Saima, Aljuaid, Hanan
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article
An intelligent decision support system for effective handling of IT projects
Hamid, Muhammad, Zeshan, Furkh, Ahmad, Adnan, Munawar, Saima, Aimeur, Esma, Ahmed, Sohaib, Abu Elsoud, Mohamed, Yousif, Mohammed
Published in Journal of intelligent & fuzzy systems (01.01.2020)
Published in Journal of intelligent & fuzzy systems (01.01.2020)
Get full text
Journal Article
A systematic composite service design modeling method using graph-based theory
Elhag, Arafat Abdulgader Mohammed, Mohamad, Radziah, Aziz, Muhammad Waqar, Zeshan, Furkh
Published in PloS one (30.04.2015)
Published in PloS one (30.04.2015)
Get full text
Journal Article
A methodology for sender-oriented anti-spamming
Ahmad, Adnan, Azhar, Anique, Naqvi, Sajid, Nawaz, Asif, Arshad, Samia, Zeshan, Furkh, Yousif, Mohammed, Salih, Ali O. M.
Published in Journal of intelligent & fuzzy systems (01.01.2020)
Published in Journal of intelligent & fuzzy systems (01.01.2020)
Get full text
Journal Article
Requirement Change Prediction Model for Small Software Systems
Fatima, Rida, Zeshan, Furkh, Ahmad, Adnan, Hamid, Muhamamd, Filali, Imen, Alhussan, Amel Ali, Abdallah, Hanaa A.
Published in Computers (Basel) (01.08.2023)
Published in Computers (Basel) (01.08.2023)
Get full text
Journal Article
A relation-aware multiparty access control
Ahmad, Adnan, Whitworth, Brian, Zeshan, Furkh, Janczewski, Lech, Ali, Munwar, Chaudary, Muhammad Hasanain, Friedman, Robert
Published in Journal of intelligent & fuzzy systems (01.01.2019)
Published in Journal of intelligent & fuzzy systems (01.01.2019)
Get full text
Journal Article
A Comparative Analysis of Quality Assurance of Mobile Applications using Automated Testing Tools
Anjum, Haneen, Imran, Muhammad, Jehanzeb, Muhammad, Khan, Maham, Chaudhry, Saima, Sultana, Summiyah, Shahid, Zainab, Zeshan, Furkh, Nazir, Shahid
Published in International journal of advanced computer science & applications (01.01.2017)
Published in International journal of advanced computer science & applications (01.01.2017)
Get full text
Journal Article
The Impact of Gamification on Learning Outcomes of Computer Science Majors
Ahmad, Adnan, Zeshan, Furkh, Khan, Muhammad Salman, Marriam, Rutab, Ali, Amjad, Samreen, Alia
Published in ACM transactions on computing education (30.06.2020)
Published in ACM transactions on computing education (30.06.2020)
Get more information
Journal Article
Synews: a synergy-based rumor verification system
Sarfraz, Amber, Ahmad, Adnan, Zeshan, Furkh, Mirza, Hamid Turab
Published in Social network analysis and mining (15.03.2024)
Published in Social network analysis and mining (15.03.2024)
Get full text
Journal Article
Extending social networks with delegation
Ahmad, Adnan, Whitworth, Brian, Zeshan, Furkh, Bertino, Elisa, Friedman, Robert
Published in Computers & security (01.09.2017)
Published in Computers & security (01.09.2017)
Get full text
Journal Article
Identification of trusted IoT devices for secure delegation
Khalil, Ushna, Ahmad, Adnan, Abdel-Aty, Abdel-Haleem, Elhoseny, Mohamed, El-Soud, Mohamed W. Abo, Zeshan, Furkh
Published in Computers & electrical engineering (01.03.2021)
Published in Computers & electrical engineering (01.03.2021)
Get full text
Journal Article