Software security requirements checklist M Alam International Journal of Software Engineering, IJSE 3 (1), 53-62, 2010 | 21 | 2010 |
Information security policy architecture M Alam, MU Bokhari International Conference on Computational Intelligence and Multimedia …, 2007 | 16 | 2007 |
Blockchain technology for electoral process in Africa: a short review M Alam, MO Yusuf, NA Sani International Journal of Information Technology 12 (3), 861-867, 2020 | 14 | 2020 |
Salami attacks and their mitigation—An overview NS Alhassan, MO Yusuf, AR Karmanje, M Alam Proceedings of the 5th International Conference on Computing for Sustainable …, 2018 | 6 | 2018 |
Web based XSS and SQL attacks on cloud and mitigation N Sharma, M Alam, M Singh Journal of Computer Science Engineering and Software Testing 1 (2), 1-10, 2015 | 5 | 2015 |
Object oriented software security: goal questions metrics approach M Alam International journal of Information technology 12 (1), 175-179, 2020 | 4 | 2020 |
Maritime safety and security in the Bay of Bengal MK Alam Bangladesh Maritime Journal 3 (1), 25-31, 2019 | 4 | 2019 |
Map reduce clustering in incremental Big Data processing M Khan, A Malviya, M Alam International Journal of Innovative Technology and Exploring Engineering …, 2019 | 4 | 2019 |
Denial of service: Techniques of attacks and mitigation N Sharma, M Alam, M Singh Journal of Computer Science Engineering and Software Testing 1, 11-14, 2015 | 4 | 2015 |
A MapReduce clustering approach for sentiment analysis using big data M Khan, M Alam, S Basheer, MD Ansari, N Kumar Proceedings of the International Conference on Cognitive and Intelligent …, 2022 | 3 | 2022 |
Buffer Overrun: Techniques of Attack and Its Prevention M Alam, P Johri, R Rastogi International Journal of Computer Science & Engineering (E-ISSN: 2044-6004 …, 2010 | 3 | 2010 |
Malicious node isolation under black hole attack in wireless mobile ad hoc network M Alam | 2 | 2019 |
Threat Model: A Path of Secure Design MU Bokhari, M Alam Intl Journal of Technology and Applied Science 1, 0 | 2 | |
Emerging Maritime Development in the Bay of Bengal MK Alam BMJ, 77-84, 2022 | 1 | 2022 |
Multiview classification with missing-views through adversarial representation and inductive transfer learning MO Yusuf, D Srivastava, SS Singh, M Alam International Advanced Computing Conference, 305-317, 2021 | 1 | 2021 |
Big Data Analytics to Authenticate Bank Notes Using K-Means Clustering M Khan, M Alam Helix-The Scientific Explorer| Peer Reviewed Bimonthly International Journal …, 2021 | 1 | 2021 |
Enriched J-Bit encrypting technique using data compression algorithms in data warehouse N Sharma, MO Hussain, M Alam Journal of Information and Optimization Sciences 41 (3), 813-822, 2020 | 1 | 2020 |
Data Compression Algorithms: Enhanced J-Bit Encoding Approach N Sharma, M Alam | 1 | |
Energy Optimization for MANET A Kumar Sharma, M Alam Proceedings of the 5th International Conference on Cyber Security & Privacy …, 2019 | | 2019 |
Technological Advancement of Textile Industry: A Spatial Analysis of Mau District, Uttar Pradesh, India M Alam, A Kumar History Research Journal 5 (6), 1218-1232, 2019 | | 2019 |