Rehan Akbar

Orcid: 0000-0002-3703-5974

According to our database1, Rehan Akbar authored at least 18 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Usability enhancement model for unstructured text in big data.
J. Big Data, December, 2023

The impact of stressors on the relationship between personality traits, knowledge collection behaviour and programmer creativity intention in software engineering.
Inf. Softw. Technol., November, 2023

Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR).
Clust. Comput., October, 2023

Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems.
PeerJ Comput. Sci., 2023

2022
Automatic Sentiment Annotation of Idiomatic Expressions for Sentiment Analysis Task.
IEEE Access, 2022

Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study.
IEEE Access, 2022

2021
Development of Usability Enhancement Model for Unstructured Big Data Using SLR.
IEEE Access, 2021

2020
The impact of personality traits and knowledge collection behavior on programmer creativity.
Inf. Softw. Technol., 2020

2019
An analytical study of information extraction from unstructured and multidimensional big data.
J. Big Data, 2019

Tailoring Agile-Based Software Development Processes.
IEEE Access, 2019

2018
Graphical authentication based on anti-shoulder surfing mechanism.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

2017
A meta-model of software development project states behavioral study of software projects.
J. Softw. Evol. Process., 2017

Mechanism to continue system availability during cyber threat scenario.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

2012
Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat.
Proceedings of the IET International Conference on Wireless Communications and Applications, 2012

2011
A Review of Prominent Work on Agile Processes Software Process Improvement and Process Tailoring Practices.
Proceedings of the Software Engineering and Computer Systems, 2011

2009
Biologically Inspired Execution Framework for Vulnerable Workflow Systems
CoRR, 2009

A O(E) Time Shortest Path Algorithm For Non Negative Weighted Undirected Graphs
CoRR, 2009

An edge-wise linear shortest path algorithm for non negative weighted undirected graphs.
Proceedings of the FIT '09, 2009


  Loading...