922 results on '"Muhammad Ali Babar"'
Search Results
152. Automated Interpretation and Integration of Security Tools Using Semantic Knowledge.
153. An ontology-driven approach to automating the process of integrating security software systems.
154. Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation.
155. Robust Estimator for Lens-based Hybrid MIMO with Low-Resolution Sampling.
156. An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics.
157. How Developers Discuss Architecture Smells? An Exploratory Study on Stack Overflow.
158. A Framework for Internet of Things Search Engines Engineering.
159. Millimeter Wave Hybrid Beamforming with Rotman Lens: Performance with Hardware Imperfections.
160. Aggressive RF Circuit Reduction Techniques in Millimeter Wave Cellular Systems.
161. Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification.
162. Alignment Aspects of OAM Signal Reception Using Rotman Lens Based Circular Array.
163. High Directivity Beamformer for Millimeter-wave 5G Base Stations.
164. Mixed coupled quarter-wavelength resonator filter utilizing J/K inverters and coupling-path phases.
165. Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study.
166. Architectural Resilience in Cloud, Fog and Edge Systems: A Survey.
167. Dual-Polarized Frequency-Diverse Metaimager for Computational Polarimetric Imaging
168. A Comprehensive Review of Direction-of-Arrival Estimation and Localization Approaches in Mixed-Field Sources Scenario
169. A Wideband Frequency Beam-Scanning Antenna Array for Millimeter-Wave Industrial Wireless Sensing Applications
170. Frequency-Diverse Reflection Metasurface Antenna Design for Computational Microwave Imaging
171. Electromagnetic informed data model considerations for near-field DOA and range estimates.
172. Synthesizing qualitative research in software engineering: a critical review.
173. An empirical investigation of transferring research to software technology innovation: a case of data-driven national security software.
174. Cost Sharing Security Information with Minimal Release Delay.
175. An Empirical Study of Security Issues Posted in Open Source Projects.
176. Automatically exploiting implicit design knowledge when solving the class responsibility assignment problem.
177. Hardware Constraints in Compressive Sensing Based Antenna Array.
178. Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline.
179. KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration.
180. A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures.
181. Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities.
182. On the Scalability of Big Data Cyber Security Analytics Systems.
183. A Qualitative Study of Architectural Design Issues in DevOps.
184. End-Users' Knowledge and Perception about Security of Mobile Health Apps: An Empirical Study.
185. Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption.
186. The Impact of Traceability on Software Maintenance and Evolution: A Mapping Study.
187. An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources.
188. Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review.
189. A Survey on Data-driven Software Vulnerability Assessment and Prioritization.
190. Automated Software Vulnerability Assessment with Concept Drift.
191. Challenges and solutions when adopting DevSecOps: A systematic review.
192. ReinforceBug: A Framework to Generate Adversarial Textual Examples.
193. Systematic Literature Review on Cyber Situational Awareness Visualizations.
194. An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages.
195. Relationships between Software Architecture and Source Code in Practice: An Exploratory Survey and Interview.
196. An empirical study of architecting for continuous delivery and deployment.
197. Game Theoretical Modelling of Network/Cybersecurity.
198. An Empirical Study of the Effectiveness of Software Architecture Evaluation Meetings.
199. Internet of things search engine.
200. A Survey on Self-Adaptive Security for Large-scale Open Environments.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.