Raees Ahmad Khan

Orcid: 0000-0002-9454-1312

According to our database1, Raees Ahmad Khan authored at least 63 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An optimized neural network for prediction of security threats on software testing.
Comput. Secur., February, 2024

2023
A neutrosophic AHP-based computational technique for security management in a fog computing network.
J. Supercomput., 2023

P2ADF: a privacy-preserving attack detection framework in fog-IoT environment.
Int. J. Inf. Sec., 2023

Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique.
Comput. Syst. Sci. Eng., 2023

Blockchain Application in Healthcare Domain: Industry 5.0 Perspective.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

Prioritization of Medical Image Security Features: Fuzzy AHP Approaches.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

2022
DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

RSA based encryption approach for preserving confidentiality of big data.
J. King Saud Univ. Comput. Inf. Sci., 2022

Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario.
J. King Saud Univ. Comput. Inf. Sci., 2022

Multi-level Fuzzy system for usable-security assessment.
J. King Saud Univ. Comput. Inf. Sci., 2022

Hybrid Binary Butterfly Optimization Algorithm and Simulated Annealing for Feature Selection Problem.
Int. J. Appl. Metaheuristic Comput., 2022

Analyzing the Implications of COVID-19 Pandemic through an Intelligent-Computing Technique.
Comput. Syst. Sci. Eng., 2022

Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic.
Comput. Syst. Sci. Eng., 2022

Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective.
Comput. Syst. Sci. Eng., 2022

A Usability Management Framework for Securing Healthcare Information System.
Comput. Syst. Sci. Eng., 2022

2021
Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method.
Int. J. Syst. Dyn. Appl., October, 2021

Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems.
Symmetry, 2021

An anti-phishing enterprise environ model using feed-forward backpropagation and Levenberg-Marquardt method.
Secur. Priv., 2021

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods.
KSII Trans. Internet Inf. Syst., 2021

An Ensemble Approach to Identify Firearm Listing on Tor Hidden-Services.
Comput. Syst. Sci. Eng., 2021

Impact of Tools and Techniques for Securing Consultancy Services.
Comput. Syst. Sci. Eng., 2021

Atrocious Impinging of COVID-19 Pandemic on Software Development Industries.
Comput. Syst. Sci. Eng., 2021

A Systematic Analysis on Blockchain Integration With Healthcare Domain: Scope and Challenges.
IEEE Access, 2021

Exploring the Topological Properties of the Tor Dark Web.
IEEE Access, 2021

2020
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security.
Symmetry, 2020

Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS.
Symmetry, 2020

Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective.
Symmetry, 2020

Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
Symmetry, 2020

A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications.
Symmetry, 2020

Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective.
PeerJ Comput. Sci., 2020

Security Issues in Fog Environment: A Systematic Literature Review.
Int. J. Wirel. Inf. Networks, 2020

Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records.
IEEE Access, 2020

Key Issues in Healthcare Data Integrity: Analysis and Recommendations.
IEEE Access, 2020

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications.
IEEE Access, 2020

A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications.
IEEE Access, 2020

A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software.
IEEE Access, 2020

Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective.
IEEE Access, 2020

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis.
IEEE Access, 2020

Security Assessment in Foggy Era through Analytical Hierarchy Process.
Proceedings of the 11th International Conference on Computing, 2020

2019
Email Phishing: An Enhanced Classification Model to Detect Malicious URLs.
EAI Endorsed Trans. Scalable Inf. Syst., 2019

Security durability assessment through fuzzy analytic hierarchy process.
PeerJ Comput. Sci., 2019

Cost estimation of cellularly deployed IoT-enabled network for flood detection.
Iran J. Comput. Sci., 2019

Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process.
Int. J. Comput. Intell. Syst., 2019

Exploring and analyzing the dark Web: A new alchemy.
First Monday, 2019

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS.
IEEE Access, 2019

2018
A Novel Drainage System Using Cellular Automata to Avoid Urban Flood.
Int. J. Appl. Evol. Comput., 2018

Emergency Alert Networks for Disaster Management: Applications Perspective.
Proceedings of the 2018 IEEE International Conference on Research in Intelligent and Computing in Engineering (RICE 2018), 2018

2016
Security Integration in Big Data Life Cycle.
Proceedings of the Advances in Computing and Data Sciences, 2016

2015
An Analysis of Software Reliability Assessment with Neuro-Fuzzy based Expert Systems.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

2014
Applicability of Software Defined Networking in Campus Network.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

2012
Integrity quantification model for object oriented design.
ACM SIGSOFT Softw. Eng. Notes, 2012

2011
Availability state transition model.
ACM SIGSOFT Softw. Eng. Notes, 2011

2010
A Metrics Based Model for Understandability Quantification
CoRR, 2010

A Vulnerability Metric for the Design Phase of Object Oriented Software.
Proceedings of the Contemporary Computing - Third International Conference, 2010

2009
Metric based testability model for object oriented design (MTMOOD).
ACM SIGSOFT Softw. Eng. Notes, 2009

Impact of inheritance on vulnerability propagation at design phase.
ACM SIGSOFT Softw. Eng. Notes, 2009

Security Estimation Framework: Design Phase Perspective.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Software Security Factors in Design Phase - (Extended Abstract).
Proceedings of the Information Systems, Technology and Management, 2009

An Efficient Measurement of Object Oriented Design Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009

2008
WBIS for Computer Programming.
Proceedings of the 2008 International Conference on E-Learning, 2008

2007
An Empirical Validation of Object Oriented Design Quality Metrics.
J. King Saud Univ. Comput. Inf. Sci., 2007

2005
Reengineering Legacy Source Code to Model Driven Architecture.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
High Level Design Quality Assessment of Object Oriented Codes.
Proceedings of the Verification and Validation of Enterprise Information Systems, 2004


  Loading...