Applying data mining techniques in cyber crimes MA Khan, SK Pradhan, H Fatima 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 213-216, 2017 | 28 | 2017 |
Dynamic web service composition with QoS clustering AK Tripathy, MR Patra, MA Khan, H Fatima, P Swain 2014 IEEE International Conference on Web Services, 678-679, 2014 | 22 | 2014 |
Survey on reverse-engineering tools for android mobile devices A Albakri, H Fatima, M Mohammed, A Ahmed, A Ali, A Ali, NM Elzein Mathematical Problems in Engineering 2022, 1-7, 2022 | 16 | 2022 |
Potentialities and priorities for higher educational development in Saudi Arabia for the next decade: Critical reflections of the vision 2030 framework K Mohiuddin, OA Nasr, MN Miladi, H Fatima, S Shahwar, QN Naveed Heliyon 9 (5), 2023 | 9 | 2023 |
Enhanced algorithmic modelling and architecture in deep reinforcement learning based on wireless communication Fintech technology K Upreti, MH Syed, MA Khan, H Fatima, MS Alam, AK Sharma Optik 272, 170309, 2023 | 8 | 2023 |
Data fusion & visualization application for network forensic investigation-a case study H Fatima, S Satpathy, S Mahapatra, GN Dash, SK Pradhan 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 252-256, 2017 | 8 | 2017 |
Mobile learning evolution and emerging computing paradigms: An edge-based cloud architecture for reduced latencies and quick response time K Mohiuddin, H Fatima, MA Khan, MA Khaleel, OA Nasr, S Shahwar Array 16, 100259, 2022 | 6 | 2022 |
An efficient technique for Apriori algorithm in medical data mining MA Khan, SK Pradhan, H Fatima Innovations in Computer Science and Engineering: Proceedings of the Fifth …, 2019 | 5 | 2019 |
Soft Computing applications in Cyber crimes H Fatima, GN Dash, SK Pradhan 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 66-69, 2017 | 3 | 2017 |
Information security: Artificial immune detectors in neural networks H Fatima, SM Al-Turki, SK Pradhan, GN Dash 2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015 | 3 | 2015 |
Applying data mining techniques in business intelligence MA Khan, SK Pradhan, H Fatima International Journal of Computer Science and Information Security 14 (11), 699, 2016 | 1 | 2016 |
Deployment of Intelligent Agents in Cognitive Networks H Fatima, S Pradhan, MA Khan, GN Dash International Journal of Computer Science and Information Security 8 (6), 2010 | 1 | 2010 |
Design of a Novel Edge-Centric Cloud Architecture for m-Learning Performance Effectiveness by Leveraging Distributed Computing Paradigms’ Potentials K Mohiuddin, H Fatima, MA Khan, MA Khaleel, Z Begum, SA Khan, ... SAGE Open 13 (3), 21582440231190337, 2023 | | 2023 |
Survey on Reverse-Engineering Tools for Android Mobile Devices HF Ashwag Bakri Hindawi, 2022 | | 2022 |
Determining Mobile Learning Potentialities in Emerging Computing Paradigms: an Exploratory Approach for Performance Optimization K Mohiuddin, MA Islam, MA Khaleel, MN Miladi, OA Nasr, SA Khan, ... | | 2021 |