Up a level |
Ahmad, J and Mohammad, CW and Sadiq, M (2022) Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms. In: 9th International Conference on Recent Trends in Computing, 4-5 Jun 2021, Ghaziabad, pp. 627-640.
Ahmad, J and Mohammad, CW and Sadiq, M (2021) Identification of security requirements from the selected set of requirements under fuzzy environment. In: 2021 IEEE International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021, 19-20 Feb 2020, Greater Noida, pp. 58-63.
Nazim, M and Mohammad, CW and Sadiq, M (2020) Generating datasets for software requirements prioritization research. In: 2020 IEEE International Conference on Computing, Power and Communication Technologies, GUCON 2020, 2-4 October 2020, Greater Noida; India, pp. 344-349.
Arif, M and Mohammad, CW and Sadiq, M (2020) Software requirements modeling: A systematic literature review. In: 2020 IEEE International Conference on Computing, Power and Communication Technologies, GUCON 2020, 2-4 October 2020, Greater Noida; India, pp. 194-200.
Sadiq, M and Khan, S and Mohammad, CW (2020) Selection of software requirements using TOPSIS under fuzzy environment. In: International Journal of Computers and Applications . (In Press)