Author:
Ali Atif,Jadoon Yasir Khan,Qasim Muhammad,Iqbal Muhammad Shahid,Asma ,Nazir Muhammad Usama
Publisher
Springer International Publishing
Reference21 articles.
1. Ali, A., Hafeez, Y., Hussain, S., Yang, S.: Role of requirement prioritization technique to improve the quality of highly-configurable systems. IEEE Access 8, 2754927573 (2020)
2. Borsukovskyi, Y.: Defining requirements to develop information security concept N hybrid threats conditions. Part 2. Cybersecurity, Educ., Sci., Tech. 2(6), 112121 (2019). https://doi.org/10.28925/2663-4023.2019.6.112121
3. Changazi, S.A., Shafi, I., Saleh, K., Islam, M.H., Hussainn, S.M., Ali, A.: Performance enhancement of snort IDS through kernel modification. In: 2019 8th International Conference on Information and Communication Technologies (ICICT), pp. 155–161. IEEE (2019)
4. Ali, A., Hafeez, Y., Abbas, S.F., Sarwar, A.: Requirements prioritization: a comparison between traditional and agile (SCRUM AND FDD). In: 16th International Conference on Statistical Sciences, p. 77 (2018)
5. Hussain, S.M., Islam, M.H., Ali, A., Nazir, M.U.: Threat modeling framework for security of unified storages in private data centers. In: 2020 IEEE 22nd Conference on Business Informatics (CBI), vol. 2, pp. 111–120. IEEE (2020)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Analysis of Browser and Machine Fingerprinting Techniques;2023 International Conference on Business Analytics for Technology and Security (ICBATS);2023-03-07
2. Post-Covid-19 Pandemic IT Project Management Skills and Challenges;2023 International Conference on Business Analytics for Technology and Security (ICBATS);2023-03-07