ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Browse by Author

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 5.

Conference Paper

Ahmad, J and Mohammad, CW and Sadiq, M (2022) Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms. In: 9th International Conference on Recent Trends in Computing, 4-5 Jun 2021, Ghaziabad, pp. 627-640.

Ahmad, J and Mohammad, CW and Sadiq, M (2021) Identification of security requirements from the selected set of requirements under fuzzy environment. In: 2021 IEEE International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021, 19-20 Feb 2020, Greater Noida, pp. 58-63.

Nazim, M and Mohammad, CW and Sadiq, M (2020) Generating datasets for software requirements prioritization research. In: 2020 IEEE International Conference on Computing, Power and Communication Technologies, GUCON 2020, 2-4 October 2020, Greater Noida; India, pp. 344-349.

Arif, M and Mohammad, CW and Sadiq, M (2020) Software requirements modeling: A systematic literature review. In: 2020 IEEE International Conference on Computing, Power and Communication Technologies, GUCON 2020, 2-4 October 2020, Greater Noida; India, pp. 194-200.

Journal Article

Sadiq, M and Khan, S and Mohammad, CW (2020) Selection of software requirements using TOPSIS under fuzzy environment. In: International Journal of Computers and Applications . (In Press)

This list was generated on Tue Jan 14 01:39:10 2025 IST.