The role of information communication technology (ICT) in agriculture V Singh, S Sankhwar, D Pandey Global Journal of Multidisciplinary Studies 3 (4), 2-10, 2015 | 43 | 2015 |
Trends in malware attacks: Identification and mitigation strategies AK Pandey, AK Tripathi, G Kapil, V Singh, MW Khan, A Agrawal, R Kumar, ... Critical Concepts, Standards, and Techniques in Cyber Forensics, 47-60, 2020 | 22 | 2020 |
Requirement engineering paradigm S Sankhwar, V Singh, D Pandey Global Journal of Multidisciplinary Studies 3 (3), 1-8, 2014 | 16 | 2014 |
Current challenges of digital forensics in cyber security AK Pandey, AK Tripathi, G Kapil, V Singh, MW Khan, A Agrawal, R Kumar, ... Critical Concepts, Standards, and Techniques in Cyber Forensics, 31-46, 2020 | 10 | 2020 |
A framework for requirement elicitation V Singh, S Sankhwar, D Pandey Global Journal of Multidisciplinary Studies 2 (2), 1-7, 2014 | 10 | 2014 |
Problems associated with requirement elicitation process: An overview V Singh, S Sankhwar, D Pandey International Journal of Advanced Research in Computer Science 8 (5), 2637-2639, 2017 | 4 | 2017 |
Optimizingthe Impact of Security Attributes in Requirement Elicitation Techniques using FAHP V Singh, D Pandey, K Sahu, MW Khan International Journal of Innovative Technology and Exploring Engineering …, 2020 | 2 | 2020 |
Quantitative Analysis of Requirement Elicitation Techniques through FANP: Security Perspective V Singh, D Pandey, MW Khan, K Sahu International Journal of Recent Technology and Engineering (IJRTE) 8 (5 …, 2020 | 1 | 2020 |
Security Testing Profile: An Introduction MW Khan, S Sankhwar, V Singh National conference on Information Security Challenges (NCISC-2016), 24th Feb, 2016 | 1 | 2016 |
Social Informatics: An Emerging Issue V Singh, S Sankhwar, D Pandey Asian Journal of Technology & Management Research [ISSN: 2249–0892] 4 (01), 2014 | | 2014 |