Alka Agrawal

Orcid: 0000-0001-5503-7917

According to our database1, Alka Agrawal authored at least 50 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A neutrosophic AHP-based computational technique for security management in a fog computing network.
J. Supercomput., 2023

Enhancing Healthcare Management during COVID-19: A Patient-Centric Architectural Framework Enabled by Hyperledger Fabric Blockchain.
Inf., 2023

P2ADF: a privacy-preserving attack detection framework in fog-IoT environment.
Int. J. Inf. Sec., 2023

Security Test Case Prioritization through Ant Colony Optimization Algorithm.
Comput. Syst. Sci. Eng., 2023

Blockchain Application in Healthcare Domain: Industry 5.0 Perspective.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

2022
DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

RSA based encryption approach for preserving confidentiality of big data.
J. King Saud Univ. Comput. Inf. Sci., 2022

Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario.
J. King Saud Univ. Comput. Inf. Sci., 2022

Multi-level Fuzzy system for usable-security assessment.
J. King Saud Univ. Comput. Inf. Sci., 2022

Securing healthcare information system through fuzzy based decision-making methodology.
Health Informatics J., 2022

Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic.
Comput. Syst. Sci. Eng., 2022

Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective.
Comput. Syst. Sci. Eng., 2022

Healthcare Device Security Assessment through Computational Methodology.
Comput. Syst. Sci. Eng., 2022

A Usability Management Framework for Securing Healthcare Information System.
Comput. Syst. Sci. Eng., 2022

Analytical Study of Intelligent controller with different objective function to control a complex non-linear system.
Proceedings of the 13th International Conference on Computing Communication and Networking Technologies, 2022

2021
Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method.
Int. J. Syst. Dyn. Appl., October, 2021

Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems.
Symmetry, 2021

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods.
KSII Trans. Internet Inf. Syst., 2021

Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia.
Comput. Syst. Sci. Eng., 2021

An Ensemble Approach to Identify Firearm Listing on Tor Hidden-Services.
Comput. Syst. Sci. Eng., 2021

A Systematic Analysis on Blockchain Integration With Healthcare Domain: Scope and Challenges.
IEEE Access, 2021

Exploring the Topological Properties of the Tor Dark Web.
IEEE Access, 2021

2020
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security.
Symmetry, 2020

Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS.
Symmetry, 2020

Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
Symmetry, 2020

A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications.
Symmetry, 2020

Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective.
PeerJ Comput. Sci., 2020

A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development.
BMC Medical Informatics Decis. Mak., 2020

Security Issues in Fog Environment: A Systematic Literature Review.
Int. J. Wirel. Inf. Networks, 2020

Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records.
IEEE Access, 2020

Key Issues in Healthcare Data Integrity: Analysis and Recommendations.
IEEE Access, 2020

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications.
IEEE Access, 2020

A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications.
IEEE Access, 2020

A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software.
IEEE Access, 2020

Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective.
IEEE Access, 2020

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis.
IEEE Access, 2020

Security Assessment in Foggy Era through Analytical Hierarchy Process.
Proceedings of the 11th International Conference on Computing, 2020

2019
Security durability assessment through fuzzy analytic hierarchy process.
PeerJ Comput. Sci., 2019

Cost estimation of cellularly deployed IoT-enabled network for flood detection.
Iran J. Comput. Sci., 2019

Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process.
Int. J. Comput. Intell. Syst., 2019

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS.
IEEE Access, 2019

2018
A Novel Drainage System Using Cellular Automata to Avoid Urban Flood.
Int. J. Appl. Evol. Comput., 2018

Emergency Alert Networks for Disaster Management: Applications Perspective.
Proceedings of the 2018 IEEE International Conference on Research in Intelligent and Computing in Engineering (RICE 2018), 2018

2016
Security Integration in Big Data Life Cycle.
Proceedings of the Advances in Computing and Data Sciences, 2016

2014
Applicability of Software Defined Networking in Campus Network.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

2010
A Vulnerability Metric for the Design Phase of Object Oriented Software.
Proceedings of the Contemporary Computing - Third International Conference, 2010

2009
Impact of inheritance on vulnerability propagation at design phase.
ACM SIGSOFT Softw. Eng. Notes, 2009

Security Estimation Framework: Design Phase Perspective.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Software Security Factors in Design Phase - (Extended Abstract).
Proceedings of the Information Systems, Technology and Management, 2009

An Efficient Measurement of Object Oriented Design Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009


  Loading...