Items where Author is "Safdar, S."

Group by: Item Type | No Grouping
Number of items: 16.

Qureshi, M.A. and Asif, M. and Hassan, M.F. and Abid, A. and Kamal, A. and Safdar, S. and Akber, R. (2022) Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study. IEEE Access.

Qureshi, M.A. and Asif, M. and Hassan, M.F. and Abid, A. and Kamal, A. and Safdar, S. and Akber, R. (2022) Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study. IEEE Access, 10. pp. 24945-24954.

Rehman, A. and Hassan, M.F. and Hooi, Y.K. and Qureshi, M.A. and Chung, T.D. and Akbar, R. and Safdar, S. (2021) Context and machine learning based trust management framework for internet of vehicles. Computers, Materials and Continua, 68 (3). pp. 4125-4142.

Safdar, S. and Akbar, R. and Hassan, M.F. and Sharef, B.T. and Hajjar, K. and Qureshi, M.A. (2017) Mechanism to continue system availability during cyber threat scenario. Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017.

Rehman, M. and Safdar, S. and Mahmood, A.K. and Amin, A. and Salleh, R. (2017) Personality traits and knowledge sharing behavior of software engineers. ICIT 2017 - 8th International Conference on Information Technology, Proceedings. pp. 6-11.

Akbar, R. and Safdar, S. and Hassan, M.F. and Abdullah, A. (2014) Software development process tailoring for small and medium sized companies. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. (2011) Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords. [Citation Index Journal]

Akhbar, R. and Hassan, M.F. and Qureshi, M.A. and Safdar, S. (2011) Structured Role Based Interaction Model for Agile Based Outsourced IT Projects: Client's Composite Structure. [Citation Index Journal]

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. and Aamir, R. (2010) Authentication Model Based on Reformation Mapping Method. In: International Conference on Information and Emerging Technologies (ICIET 2010), 14-16 June 2010 , Karachi, Pakistan.

Safdar, S. and Hassan, M.F. (2010) Moving Towards Two Dimensional Passwords. In: International Symposium on Information Technology 2010, ITSim, June 2010, Kuala Lumpur.

Safdar, S. and Hassan, M.F. and Qureshi, MA. and Akhbar, R. (2010) Framework for Alternate Execution of Workflows Under Threat. In: IEEE. International Conference of Communication Software and Networks (ICCSN 2010), 28-26 Feb 2010, Singapore.

Qureshi, MA. and Hassan, M.F. and Safdar, S. and Akhbar, R. (2010) Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs. In: IEEE International Conference of Communication Software and Networks (ICCSN 2010), 28-26 Feb 2010, Singapore.

Akbar, R. and Hassan, M.F. and Safdar, S. and Qureshi, M.A. (2010) Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management. In: IEEE International Conference of Communication Software and Networks (ICCSN 2010), 28-26 Feb. 2010, Singapore.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. and Sammi, R. (2010) An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs. In: International Conference on Frontiers of Information Technology, 16th – 18th December 2009, Abbottabad, Pakistan.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akhbar, R. (2010) A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs. International Journal on Computer Science and Information Security (IJSIS), Volume 6 (No 1). pp. 40-46. ISSN 1947-5500

Safdar, S. and Hassan, M.F. and Qureshi, M.A and Akhbar, R. (2009) Biologically Inspired Execution Framework for Vulnerable Workflow Systems. International Journal of Computer Science and Information Security (IJCSIS), Volume 6 (No. 1). pp. 47-51. ISSN 1947-5500

This list was generated on Sun Dec 22 23:30:31 2024 +08.