Role of context in usability evaluations: A review MC Trivedi, MA Khanum arXiv preprint arXiv:1204.2138, 2012 | 53 | 2012 |
Arabic interface analysis based on cultural markers MA Khanum, S Fatima, MA Chaurasia arXiv preprint arXiv:1203.3660, 2012 | 44 | 2012 |
Take care: a study on usability evaluation methods for children MA Khanum, MC Trivedi arXiv preprint arXiv:1212.0647, 2012 | 33 | 2012 |
A study of image spam filtering techniques LM Ketari, M Chandra, MA Khanum 2012 Fourth International Conference on Computational Intelligence and …, 2012 | 22 | 2012 |
Impact of facebook usage on academic grades: A case study LM Ketari, MA Khanum Journal of Computing 5 (1), 44-48, 2013 | 20 | 2013 |
A review of malicious code detection techniques for mobile devices L Ketari, MA Khanum International Journal of Computer Theory and Engineering 4 (2), 212, 2012 | 10 | 2012 |
Software Testability in Requirement Phase: A Review MZ Khan, MA Khanam, MH Khan International Journal of Advanced Research in Computer and Communication …, 2016 | 7 | 2016 |
Word sense disambiguation in software requirement specifications using WordNet and association mining rule MS Husain, MA Khanum Proceedings of the Second International Conference on Information and …, 2016 | 7 | 2016 |
Approach to prioritize the requirements using fuzzy logic N Mishra, MA Khanum, K Agrawal ACEIT Conference Proceeding, 2016 | 7 | 2016 |
Use of social media to drive business advantage in banking MA Khanum, SA Nagrami, MC Trivedi ACEIT Conference Proceeding, 79-82, 2016 | 7 | 2016 |
Exploring verbalization and collaboration during usability evaluation with children in context MA Khanum, MC Trivedi arXiv preprint arXiv:1306.4094, 2013 | 7 | 2013 |
Comparison of testing environments with children for usability problem identification MA Khanum, MC Trivedi International Journal of Engineering and Technology 5 (3), 2048-2053, 2013 | 5 | 2013 |
Cloud computing in E-governance: Indian perspective MS Husain, MA Khanum Securing government information and data in developing countries, 104-114, 2017 | 4 | 2017 |
Trends in Combating Image Spam E-mails MA Khanum, LM Ketari arXiv preprint arXiv:1212.1763, 2012 | 3 | 2012 |
Literature review on software complexity, software usability and software deliverability M Khan, F Ahmad, MA Khanum International Journal of Advanced Research in Computer Science 9 (2), 438-441, 2018 | 2 | 2018 |
A cost effective and performance enhanced deadlock recovery scheme for wormhole routed networks J Ahmad, A Khanum, AA Zilli Intelligent Communication, Control and Devices: Proceedings of ICICCD 2017 …, 2018 | 2 | 2018 |
Security issues and their solutions in cloud technology: A survey MA Siddiqui, MA Khanum International Journal of Advanced Research in Computer Science 9 (2), 71-76, 2018 | 2 | 2018 |
A Review on Minimization of Ambulance Response Time Using Image Processing and Critical path Mapping Based on Traffic Control S Rafiq, MA Khanum Journal of Informatics Electrical and Electronics Engineering (JIEEE) 2 (2), 1-7, 2021 | 1 | 2021 |
Requirement Based Testability Estimation Model of Object Oriented Software MZ Khan, MA Khanam, MH Khan Oriental Journal of Computer Science and Technology 10 (4), 793-801, 2017 | 1 | 2017 |
REQUIREMENT UNDERSTANDABILITY QUANTIFICATION MODEL OF OBJECT ORIENTED SOFTWARE. MZ Khan, MA Khanam, MH Khan International Journal of Advanced Research in Computer Science 8 (7), 2017 | 1 | 2017 |