咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 15 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 软件工程
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 4 篇 fuzzy logic
  • 3 篇 machine learning
  • 2 篇 covid-19 monitor...
  • 2 篇 ahp-topsis
  • 2 篇 safety
  • 2 篇 healthcare indus...
  • 2 篇 smart healthcare
  • 2 篇 social impact
  • 2 篇 dark web
  • 2 篇 software securit...
  • 2 篇 security
  • 2 篇 usability
  • 2 篇 sars-cov-2
  • 2 篇 coronavirus
  • 1 篇 information priv...
  • 1 篇 durability of se...
  • 1 篇 ahp
  • 1 篇 web application ...
  • 1 篇 pistols
  • 1 篇 precautions

机构

  • 9 篇 department of co...
  • 9 篇 department of in...
  • 8 篇 department of in...
  • 5 篇 department of in...
  • 4 篇 department of in...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of el...
  • 3 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 college of compu...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 security forces ...
  • 1 篇 department of in...

作者

  • 20 篇 alka agrawal
  • 16 篇 raees ahmad khan
  • 12 篇 rajeev kumar
  • 7 篇 abdulmohsen alma...
  • 7 篇 asif irshad khan
  • 6 篇 yoosef b.abushar...
  • 5 篇 fawaz jaber also...
  • 4 篇 mohd faizan
  • 4 篇 abhishek kumar p...
  • 4 篇 abdulaziz attaal...
  • 3 篇 hosam alhakami
  • 3 篇 wael alosaimi
  • 3 篇 md mottahir alam
  • 3 篇 abdullah baz
  • 3 篇 hashem alyami
  • 3 篇 abdullah alharbi
  • 3 篇 sabita khatri
  • 3 篇 adil hussain seh
  • 3 篇 mohd nadeem
  • 3 篇 abdullah saad al...

语言

  • 20 篇 英文
检索条件"作者=Alka agrawal"
20 条 记 录,以下是1-10 订阅
排序:
Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic
收藏 引用
Computer Systems Science & Engineering 2022年 第2期40卷 691-702页
作者: Mohammed Baz Sabita Khatri Abdullah Baz Hosam Alhakami alka agrawal Raees Ahmad Khan Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif 21944Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India Department of Computer Engineering College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia
The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020,provide critical research criteria to assess the vulnerabilities of our cur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第1期126卷 419-436页
作者: Abdulaziz Attaallah Masood Ahmad Adil Hussain Seh alka agrawal Rajeev Kumar Raees Ahmad Khan Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India Department of Computer Application Shri Ramswaroop Memorial UniversityBarabanki225003India
Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and *** present study describes the exploratory analysis of all COVID cases in Saudi ***,the study has executed the forecas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Usability Management Framework for Securing Healthcare Information System
收藏 引用
Computer Systems Science & Engineering 2022年 第9期42卷 1015-1030页
作者: Hosam Alhakami Abdullah Baz Wajdi Alhakami Abhishek Kumar Pandey alka agrawal Raees Ahmad Khan Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Engineering College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India
Transformation from conventional business management systems tosmart digital systems is a recurrent trend in the current era. This has led to digitalrevolution, and in this context, the hardwired technologies in the s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia
收藏 引用
Computer Systems Science & Engineering 2021年 第6期37卷 313-329页
作者: Abdulaziz Attaallah Sabita Khatri Mohd Nadeem Syed Anas Ansar Abhishek Kumar Pandey alka agrawal Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Kingdom of Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia
A significant increase in the number of coronavirus cases can easily be noticed in most of the countries around the *** of the consistent preventive initiatives being taken to contain the spread of this virus,the unab... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Framework for Securing Saudi Arabian Hospital Industry: Vision-2030 Perspective
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2773-2786页
作者: Hosam Alhakami Abdullah Baz Mohammad Al-shareef Rajeev Kumar alka agrawal Raees Ahmad Khan Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955SaudiArabia Department of Computer Engineering College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Security Forces Hospital Makkah21955Saudi Arabia Department of Computer Science and Engineering Babu Banarasi Das UniversityLucknow226028Uttar PradeshIndia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia
Recent transformation of Saudi Arabian healthcare sector into a reven-ue producing one has signaled several advancements in healthcare in the *** healthcare management into Smart hospital systems is one of *** hospita... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Evaluating the Impacts of Security-Durability Characteristic:Data Science Perspective
收藏 引用
Computer Systems Science & Engineering 2022年 第5期41卷 557-567页
作者: Abdullah Alharbi Masood Ahmad Wael Alosaimi Hashem Alyami alka agrawal Rajeev Kumar Abdul Wahid Raees Ahmad Khan Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Applications Shri Ramswaroop Memorial UniversityBarabanki225003India Department of Computer Science and Information Technology Maulana Azad National Urdu UniversityHyderabad500032India
Since the beginning of web applications,security has been a critical study *** has been a lot of research done to figure out how to define and identify security goals or ***,high-security web apps have been found to b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Evaluating the Impact of Software Security Tactics: A Design Perspective
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 2283-2299页
作者: Mamdouh Alenezi Abhishek Kumar Pandey Richa Verma Mohd Faizan Shalini Chandra alka agrawal Rajeev Kumar Raees Ahmad Khan College of Computer and Information Sciences Prince Sultan UniversitySaudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknowUttar PradeshIndia Department of Computer Science Babasaheb Bhimrao Ambedkar UniversityLucknowUttar PradeshIndia Department of Computer Application Shri Ramswaroop Memorial UniversityLucknowUttar PradeshIndia
Design architecture is the edifice that strengthens the functionalities as well as the security of web *** order to facilitate architectural security from the web application’s design phase itself,practitioners are n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Link Analysis Algorithm for Identification of Key Hidden Services
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 877-886页
作者: Abdullah Alharbi Mohd Faizan Wael Alosaimi Hashem Alyami Mohd Nadeem Suhel Ahmad Khan alka agrawal Raees Ahmad Khan Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Computer Science Indira Gandhi National Tribal UniversityAmarkantak84886India
The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical *** network has unfortunate... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Healthcare Device Security Assessment through Computational Methodology
收藏 引用
Computer Systems Science & Engineering 2022年 第5期41卷 811-828页
作者: Masood Ahmad Jehad F.Al-Amri Ahmad F.Subahi Sabita Khatri Adil Hussain Seh Mohd Nadeem alka agrawal Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science University College of Al JamoumUmm Al Qura UniversityMakkah21421Saudi Arabia
The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of *** study uses the Hesitant Fuzzy(HF),Analytic Hierarchy Process(AHP)i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 1203-1218页
作者: Yoosef BAbushark Asif Irshad Khan Fawaz Jaber Alsolami Abdulmohsen Almalawi Md Mottahir Alam alka agrawal Rajeev Kumar Raees Ahmad Khan Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India Department of Computer Application Shri Ramswaroop Memorial UniversityBarabanki225003India
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product *** models,frameworks and methodol... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论