Items where Author is "Akbar, R."
Article
Rehman, M. and Akbar, R. and Omar, M. and Gilal, A.R. (2024) A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks. Communications in Computer and Information Science, 2001 C. pp. 80-95.
Shukla, S. and Hassan, M.F. and Tran, D.C. and Akbar, R. and Paputungan, I.V. and Khan, M.K. (2023) Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR). Cluster Computing, 26 (5). pp. 2657-2680.
Abbas, Q. and Hina, S. and Sajjad, H. and Zaidi, K.S. and Akbar, R. (2023) Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems. PeerJ Computer Science, 9.
Adnan, K. and Akbar, R. and Wang, K.S. (2023) Usability enhancement model for unstructured text in big data. Journal of Big Data, 10 (1). ISSN 21961115
Amin, A. and Rehman, M. and Basri, S. and Capretz, L.F. and Goraya, M.A.S. and Akbar, R. (2023) The impact of stressors on the relationship between personality traits, knowledge collection behaviour and programmer creativity intention in software engineering. Information and Software Technology, 163. ISSN 09505849
Saboor, A. and Hassan, M.F. and Akbar, R. and Shah, S.N.M. and Hassan, F. and Magsi, S.A. and Siddiqui, M.A. (2022) Article Containerized Microservices Orchestration and Provisioning in Cloud Computing: A Conceptual Framework and Future Perspectives. Applied Sciences (Switzerland), 12 (12). ISSN 20763417
Tahayna, B.M.A. and Ayyasamy, R.K. and Akbar, R. (2022) Automatic Sentiment Annotation of Idiomatic Expressions for Sentiment Analysis Task. IEEE Access, 10. pp. 122234-122242. ISSN 21693536
Khan, S.A. and Iqbal, K. and Mohammad, N. and Akbar, R. and Ali, S.S.A. and Siddiqui, A.A. (2022) A Novel Fuzzy-Logic-Based Multi-Criteria Metric for Performance Evaluation of Spam Email Detection Algorithms. Applied Sciences (Switzerland), 12 (14). ISSN 20763417
Saboor, A. and Hassan, M.F. and Akbar, R. and Susanto, E. and Shah, S.N.M. and Siddiqui, M.A. and Magsi, S.A. (2022) Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing. Computers, Materials and Continua, 73 (2). pp. 2223-2239. ISSN 15462218
Rehman, A. and Hassan, M.F. and Hooi, Y.K. and Qureshi, M.A. and Chung, T.D. and Akbar, R. and Safdar, S. (2021) Context and machine learning based trust management framework for internet of vehicles. Computers, Materials and Continua, 68 (3). pp. 4125-4142. ISSN 15462218
Akbar, R. and Hassan, M.F. and Abdullah, A. (2017) A meta-model of software development project states behavioral study of software projects. Journal of Software: Evolution and Process, 29 (4). ISSN 20477481
Akbar, R. and Hassan, M.F. and Abdullah, A. and Babar, M.E. and Safdar, S. (2012) A road map for implementing service oriented agricultural information management system. Journal of Animal and Plant Sciences, 22 (3). pp. 802-805. ISSN 10187081
Akbar, R. and Hassan, M.F. and Abdullah, A. and Safdar, S. and Qureshi, M.A. (2011) Directions and advancements in global software development: A summarized review of GSD and agile methods. Research Journal of Information Technology, 3 (2). pp. 69-80. ISSN 18157432
Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2011) Effective methods for secure authentication in vulnerable workflows using n�n passwords. Information Technology Journal, 10 (6). pp. 1161-1169. ISSN 18125638
Qureshi, M.A. and Hassan, M.F. and Sammi, R. and Safdar, S. and Akbar, R. (2011) Shortest path tree with embedded backups - An exhaustive link failure recovery algorithm. Journal of Artificial Intelligence, 4 (2). pp. 143-155. ISSN 19945450
Akbar, R. and Hassan, M.F. and Qureshi, M.A. and Safdar, S. (2011) Structured role based interaction model for agile based outsourced IT projects: Client's composite structure. Information Technology Journal, 10 (5). pp. 1009-1016. ISSN 18125638
Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. (2011) A framework to recover single link failure on shortest path in shortest path tree. Journal of Applied Sciences, 11 (16). pp. 2916-2923. ISSN 18125654
Akbar, R. and Hassan, M.F. and Abdullah, A. (2011) A review of prominent work on agile processes software process improvement and process tailoring practices. Communications in Computer and Information Science, 181 CC (PART 3). pp. 571-585. ISSN 18650929
Conference or Workshop Item
Wadho, S.A. and Yichiet, A. and Gan, M.L. and Kang, L.C. and Akbar, R. and Kumar, R. (2023) Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review. In: UNSPECIFIED.
Zahiruddin, H. and Akbar, R. (2023) Performance Management of Information Technology Governance in Malaysian Public Higher Education Institutions. In: UNSPECIFIED.
Ali, A.B.A. and Ayyasamy, R.K. and Akbar, R. and Ponnusamy, V.A. and Heng, L.E. (2022) Cybersecurity Infrastructure adoption Model for Malware Mitigation in Small Medium Enterprises (SME). In: UNSPECIFIED.
Tahayna, B. and Ayyasamy, R.K. and Akbar, R. and Subri, N.F.B. and Sangodiah, A. (2022) Lexicon-based Non-Compositional Multiword Augmentation Enriching Tweet Sentiment Analysis. In: UNSPECIFIED.
Amin, A. and Rehman, M. and Akbar, R. and Basri, S. and Hassan, M.F. (2018) Trait-based personality profile of software programmers: A study on Pakistan's software industry. In: UNSPECIFIED.
Safdar, S. and Akbar, R. and Hassan, M.F. and Sharef, B.T. and Hajjar, K. and Qureshi, M.A. (2017) Mechanism to continue system availability during cyber threat scenario. In: UNSPECIFIED.
Akbar, R. and Safdar, S. and Hassan, M.F. and Abdullah, A. (2014) Software development process tailoring for small and medium sized companies. In: UNSPECIFIED.
Akbar, R. and Safdar, S. and Qureshi, M.A. and Hassan, M.F. and Abdullah, A. (2013) Software development project states and project behavior. In: UNSPECIFIED.
Safdar, S. and Hassan, M.F. and Akbar, R. and Qureshi, M.A. (2012) Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat. In: UNSPECIFIED.
Akbar, R. and Hassan, M.F. and Abdullah, A. (2012) A framework of software process tailoring for small and medium size IT companies. In: UNSPECIFIED.
Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2011) Data hibernation framework in workflows under intrusion threat. In: UNSPECIFIED.
Akbar, R. and Hassan, M.F. and Abdullah, A. and Safdar, S. and Qureshi, M.A. (2011) The client as a real option in successful software project management (The CPPM model). In: UNSPECIFIED.
Akbar, R. and Hassan, M.F. and Abdullah, A. and Safdar, S. and Qureshi, M.A. (2011) An insight into real software industry paradigms and software engineering research. In: UNSPECIFIED.
Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. (2011) A near linear shortest path algorithm for weighted undirected graphs. In: UNSPECIFIED.
Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. and Aamir, R. (2010) Authentication model based on reformation mapping method. In: UNSPECIFIED.
Akbar, R. and Hassan, M.F. and Safdar, S. and Qureshi, M.A. (2010) Client's perspective: Realization as a new generation process for software project development and management. In: UNSPECIFIED.
Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2010) Framework for alternate execution of workflows under threat. In: UNSPECIFIED.
Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. and Sammi, R. (2010) Shortest path algorithm with pre-calculated single link failure recovery for non-negative weighted undirected graphs. In: UNSPECIFIED.
Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. (2010) Two phase shortest path algorithm for non-negative weighted undirected graphs. In: UNSPECIFIED.
Akbar, R. and Hassan, M.F. (2010) A collaborative-interaction model of software project development :An extension to agile based methodologies. In: UNSPECIFIED.
Aasim Qureshi, M. and Hassan, M.F. and Safdar, S. and Akbar, R. and Sammi, R. (2009) An edge-wise linear shortest path algorithm for non negative weighted undirected graphs. In: UNSPECIFIED.
Book
ur Rehman, M. and Akbar, R. and Mujeeb, S. and Janisar, A.A. (2024) Deep-learning enabled early detection of COVID-19 infection in IoMT fog-cloud healthcare in LPWAN. CRC Press, pp. 235-257. ISBN 9781040005750; 9781032530796