Author of the publication

Multi-level Fuzzy system for usable-security assessment.

, , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (3): 657-665 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Evolutionary Multimodal Optimization by Multiobjective Reformulation Without Explicit Niching/Sharing., and . AACC, volume 3285 of Lecture Notes in Computer Science, page 1-8. Springer, (2004)Vowel and non-vowel frame segmentation based digital speech watermarking technique using LPA method., and . J. Inf. Secur. Appl., (2022)A proficient data gathering technique for unmanned aerial vehicle-enabled heterogeneous wireless sensor networks., , , and . Int. J. Commun. Syst., (2021)A novel approach based on nature inspired intelligence for face feature extraction and recognition., , and . IC3, page 149-153. IEEE, (2013)Image Contrast Enhancement Using Hybrid Elitist Ant System, Elitism-Based Immigrants Genetic Algorithm and Simulated Annealing., , , and . CVIP (1), volume 703 of Advances in Intelligent Systems and Computing, page 115-129. Springer, (2017)Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities., , and . ISEC, page 141-142. ACM, (2009)Shape analysis of the neostriatum in frontotemporal lobar degeneration, Alzheimer's disease, and controls., , , , , , , , , and 2 other author(s). NeuroImage, 51 (3): 970-986 (2010)A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications., , , , , and . IEEE Access, (2020)A novel inertial Tseng's method for solving generalized variational inequality problem., , and . J. Appl. Math. Comput., 69 (6): 4525-4551 (December 2023)Exploring the Topological Properties of the Tor Dark Web., , , , , , and . IEEE Access, (2021)