Khurram Mustafa

According to our database1, Khurram Mustafa authored at least 18 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security requirements specification by formal methods: a research metadata analysis.
Multim. Tools Appl., April, 2024

Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review.
J. Netw. Syst. Manag., April, 2024

2023
A systematic literature review on sensitive data protection in blockchain applications.
Concurr. Comput. Pract. Exp., January, 2023

A lattice-based blind ring signature scheme for sensitive data protection in blockchain applications.
Concurr. Comput. Pract. Exp., 2023

2022
A Systematic Literature Review on Learning Apps Evaluation.
J. Inf. Technol. Educ. Res., 2022

A review on security requirements specification by formal methods.
Concurr. Comput. Pract. Exp., 2022

2019
Modelling adaptive hypermedia instructional system: a framework.
Multim. Tools Appl., 2019

Adaptive hypermedia instructional system (AHIS): A model.
Educ. Inf. Technol., 2019

2018
Testing Program Crash Based on Search Based Testing and Exception Injection.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Security Assurance Against Cybercrime Ransomware.
ICO, 2018

2011
Design Perspectives of Intelligent Tutoring System.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

2010
A Metrics Based Model for Understandability Quantification
CoRR, 2010

2009
Research on software design level security vulnerabilities.
ACM SIGSOFT Softw. Eng. Notes, 2009

Metric based testability model for object oriented design (MTMOOD).
ACM SIGSOFT Softw. Eng. Notes, 2009

2008
WBIS for Computer Programming.
Proceedings of the 2008 International Conference on E-Learning, 2008

2007
An Empirical Validation of Object Oriented Design Quality Metrics.
J. King Saud Univ. Comput. Inf. Sci., 2007

2005
Reengineering Legacy Source Code to Model Driven Architecture.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
High Level Design Quality Assessment of Object Oriented Codes.
Proceedings of the Verification and Validation of Enterprise Information Systems, 2004


  Loading...