Items where Author is "Safdar, S."

Group by: Item Type | No Grouping
Number of items: 28.

Article

Kumar, R. and Hassan, M.F. and Adnan, M.H.M. and Shukla, S. and Safdar, S. and Qureshi, M.A. and Abdel-Aty, A.-H. (2023) A User-Priorities-Based Strategy for Three-Phase Intelligent Recommendation and Negotiating Agents for Cloud Services. IEEE Access, 11. pp. 26932-26944.

Qureshi, M.A. and Asif, M. and Hassan, M.F. and Abid, A. and Kamal, A. and Safdar, S. and Akber, R. (2022) Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study. IEEE Access, 10. pp. 24945-24954. ISSN 21693536

Beer Mohamed, M.I. and Hassan, M.F. and Safdar, S. and Saleem, M.Q. (2021) Adaptive security architectural model for protecting identity federation in service oriented computing. Journal of King Saud University - Computer and Information Sciences, 33 (5). pp. 580-592. ISSN 13191578

Rehman, A. and Hassan, M.F. and Hooi, Y.K. and Qureshi, M.A. and Chung, T.D. and Akbar, R. and Safdar, S. (2021) Context and machine learning based trust management framework for internet of vehicles. Computers, Materials and Continua, 68 (3). pp. 4125-4142. ISSN 15462218

Akbar, R. and Hassan, M.F. and Abdullah, A. and Babar, M.E. and Safdar, S. (2012) A road map for implementing service oriented agricultural information management system. Journal of Animal and Plant Sciences, 22 (3). pp. 802-805. ISSN 10187081

Safdar, S. and Hassan, Mohd.F. (2011) Analyzing framework for alternate execution of workflows for different types of intrusion threats. Communications in Computer and Information Science, 180 CC (PART 2). pp. 361-375. ISSN 18650929

Akbar, R. and Hassan, M.F. and Abdullah, A. and Safdar, S. and Qureshi, M.A. (2011) Directions and advancements in global software development: A summarized review of GSD and agile methods. Research Journal of Information Technology, 3 (2). pp. 69-80. ISSN 18157432

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2011) Effective methods for secure authentication in vulnerable workflows using n�n passwords. Information Technology Journal, 10 (6). pp. 1161-1169. ISSN 18125638

Qureshi, M.A. and Hassan, M.F. and Sammi, R. and Safdar, S. and Akbar, R. (2011) Shortest path tree with embedded backups - An exhaustive link failure recovery algorithm. Journal of Artificial Intelligence, 4 (2). pp. 143-155. ISSN 19945450

Akbar, R. and Hassan, M.F. and Qureshi, M.A. and Safdar, S. (2011) Structured role based interaction model for agile based outsourced IT projects: Client's composite structure. Information Technology Journal, 10 (5). pp. 1009-1016. ISSN 18125638

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. (2011) A framework to recover single link failure on shortest path in shortest path tree. Journal of Applied Sciences, 11 (16). pp. 2916-2923. ISSN 18125654

Conference or Workshop Item

Safdar, S. and Akbar, R. and Hassan, M.F. and Sharef, B.T. and Hajjar, K. and Qureshi, M.A. (2017) Mechanism to continue system availability during cyber threat scenario. In: UNSPECIFIED.

Rehman, M. and Safdar, S. and Mahmood, A.K. and Amin, A. and Salleh, R. (2017) Personality traits and knowledge sharing behavior of software engineers. In: UNSPECIFIED.

Akbar, R. and Safdar, S. and Hassan, M.F. and Abdullah, A. (2014) Software development process tailoring for small and medium sized companies. In: UNSPECIFIED.

Akbar, R. and Safdar, S. and Qureshi, M.A. and Hassan, M.F. and Abdullah, A. (2013) Software development project states and project behavior. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. and Akbar, R. and Qureshi, M.A. (2012) Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. (2012) Two dimensional password based hybrid authentication methods in vulnerable workflows. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2011) Data hibernation framework in workflows under intrusion threat. In: UNSPECIFIED.

Akbar, R. and Hassan, M.F. and Abdullah, A. and Safdar, S. and Qureshi, M.A. (2011) The client as a real option in successful software project management (The CPPM model). In: UNSPECIFIED.

Akbar, R. and Hassan, M.F. and Abdullah, A. and Safdar, S. and Qureshi, M.A. (2011) An insight into real software industry paradigms and software engineering research. In: UNSPECIFIED.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. (2011) A near linear shortest path algorithm for weighted undirected graphs. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. and Aamir, R. (2010) Authentication model based on reformation mapping method. In: UNSPECIFIED.

Akbar, R. and Hassan, M.F. and Safdar, S. and Qureshi, M.A. (2010) Client's perspective: Realization as a new generation process for software project development and management. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2010) Framework for alternate execution of workflows under threat. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. (2010) Moving towards two dimensional passwords. In: UNSPECIFIED.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. and Sammi, R. (2010) Shortest path algorithm with pre-calculated single link failure recovery for non-negative weighted undirected graphs. In: UNSPECIFIED.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. (2010) Two phase shortest path algorithm for non-negative weighted undirected graphs. In: UNSPECIFIED.

Aasim Qureshi, M. and Hassan, M.F. and Safdar, S. and Akbar, R. and Sammi, R. (2009) An edge-wise linear shortest path algorithm for non negative weighted undirected graphs. In: UNSPECIFIED.

This list was generated on Thu Dec 19 09:06:49 2024 +08.