Applying data mining techniques in cyber crimes MA Khan, SK Pradhan, H Fatima 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 213-216, 2017 | 28 | 2017 |
Dynamic web service composition with QoS clustering AK Tripathy, MR Patra, MA Khan, H Fatima, P Swain 2014 IEEE International Conference on Web Services, 678-679, 2014 | 23 | 2014 |
Survey on reverse-engineering tools for android mobile devices A Albakri, H Fatima, M Mohammed, A Ahmed, A Ali, A Ali, NM Elzein Mathematical Problems in Engineering 2022, 1-7, 2022 | 16 | 2022 |
Potentialities and priorities for higher educational development in Saudi Arabia for the next decade: Critical reflections of the vision 2030 framework K Mohiuddin, OA Nasr, MN Miladi, H Fatima, S Shahwar, QN Naveed Heliyon 9 (5), 2023 | 10 | 2023 |
Enhanced algorithmic modelling and architecture in deep reinforcement learning based on wireless communication Fintech technology K Upreti, MH Syed, MA Khan, H Fatima, MS Alam, AK Sharma Optik 272, 170309, 2023 | 8 | 2023 |
Data fusion & visualization application for network forensic investigation-a case study H Fatima, S Satpathy, S Mahapatra, GN Dash, SK Pradhan 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 252-256, 2017 | 8 | 2017 |
Mobile learning evolution and emerging computing paradigms: An edge-based cloud architecture for reduced latencies and quick response time K Mohiuddin, H Fatima, MA Khan, MA Khaleel, OA Nasr, S Shahwar Array 16, 100259, 2022 | 6 | 2022 |
An efficient technique for Apriori algorithm in medical data mining MA Khan, SK Pradhan, H Fatima Innovations in Computer Science and Engineering: Proceedings of the Fifth …, 2019 | 5 | 2019 |
Soft Computing applications in Cyber crimes H Fatima, GN Dash, SK Pradhan 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 66-69, 2017 | 3 | 2017 |
Information security: Artificial immune detectors in neural networks H Fatima, SM Al-Turki, SK Pradhan, GN Dash 2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015 | 3 | 2015 |
Applying data mining techniques in business intelligence MA Khan, SK Pradhan, H Fatima International Journal of Computer Science and Information Security 14 (11), 699, 2016 | 1 | 2016 |
Deployment of Intelligent Agents in Cognitive Networks H Fatima, S Pradhan, MA Khan, GN Dash International Journal of Computer Science and Information Security 8 (6), 2010 | 1 | 2010 |
Machine Learning-Based Structure Prediction for QM9 Quantum Datasets HF Nahla K, Maimoona Ansari, Salah Eldeen F. Hegazi, Anjali Appukuttan ... SSRG International Journal of Electrical and Electronics Engineering 11 (4 …, 2024 | | 2024 |
Design of a Novel Edge-Centric Cloud Architecture for m-Learning Performance Effectiveness by Leveraging Distributed Computing Paradigms’ Potentials K Mohiuddin, H Fatima, MA Khan, MA Khaleel, Z Begum, SA Khan, ... SAGE Open 13 (3), 21582440231190337, 2023 | | 2023 |
Survey on Reverse-Engineering Tools for Android Mobile Devices HF Ashwag Bakri Hindawi, 2022 | | 2022 |
Determining Mobile Learning Potentialities in Emerging Computing Paradigms: an Exploratory Approach for Performance Optimization K Mohiuddin, MA Islam, MA Khaleel, MN Miladi, OA Nasr, SA Khan, ... | | 2021 |