An effective requirement engineering process model for software development and requirements management D Pandey, U Suman, AK Ramani 2010 International Conference on Advances in Recent Technologies in …, 2010 | 291 | 2010 |
STORE: Security threat oriented requirements engineering methodology MTJ Ansari, D Pandey, M Alenezi Journal of King Saud University-Computer and Information Sciences 34 (2 …, 2022 | 117 | 2022 |
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development MTJ Ansari, FA Al-Zahrani, D Pandey, A Agrawal BMC Medical Informatics and Decision Making 20, 1-13, 2020 | 86 | 2020 |
The role of information communication technology (ICT) in agriculture V Singh, S Sankhwar, D Pandey Global Journal of Multidisciplinary Studies 3 (4), 2-10, 2015 | 47 | 2015 |
Development of the Asia Pacific Consortium on Osteoporosis (APCO) Framework: clinical standards of care for the screening, diagnosis, and management of osteoporosis in the Asia … M Chandran, PJ Mitchell, T Amphansap, SK Bhadada, M Chadha, ... Osteoporosis International 32, 1249-1275, 2021 | 42 | 2021 |
Importance of requirement management: A requirement engineering concern D Pandey, V Pandey International Journal of Research and Development-A Management Review …, 2012 | 37 | 2012 |
RSA based encryption approach for preserving confidentiality of big data SKD Kanika Sharma , Alka Agrawal , Dhirendra Pandey , R.A. Khan Journal of King Saud University – Computer and Information Sciences, 2019 | 36* | 2019 |
The evaluation of software security through quantum computing techniques: A durability perspective H Alyami, M Nadeem, A Alharbi, W Alosaimi, MTJ Ansari, D Pandey, ... Applied Sciences 11 (24), 11784, 2021 | 34 | 2021 |
A framework for modelling software requirements D Pandey, U Suman, AK Ramani International Journal of Computer Science Issues (IJCSI) 8 (3), 164, 2011 | 32 | 2011 |
A safeguard against ATM fraud S Sankhwar, D Pandey 2016 IEEE 6th International Conference on Advanced Computing (IACC), 701-705, 2016 | 30 | 2016 |
Risks, security, and privacy for HIV/AIDS data: big data perspective MTJ Ansari, D Pandey Big Data Analytics in HIV/AIDS Research, 117-139, 2018 | 26 | 2018 |
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation. TJ Ansari, D Pandey International Journal of Advanced Research in Computer Science 8 (3), 2017 | 24 | 2017 |
Effectiveness evaluation of different IDSs using integrated fuzzy MCDM model H Alyami, MTJ Ansari, A Alharbi, W Alosaimi, M Alshammari, D Pandey, ... Electronics 11 (6), 859, 2022 | 23 | 2022 |
Social-organizational participation difficulties in requirement engineering process: A study D Pandey, U Suman, AK Ramani Software Engineering 1 (1), 1, 2010 | 23 | 2010 |
GIS: scope and benefits D Pandey, AK Shukla, A Shukla International Conference on Advances in Engineering and Technology, 60-65, 2013 | 22 | 2013 |
Security requirement engineering issues in risk management D Pandey, U Suman, AK Ramani International Journal of Computer Applications 17 (5), 12-14, 2011 | 22 | 2011 |
E-commerce transactions: An empirical study D Pandey, V Agarwal International journal of advanced research in computer science and software …, 2014 | 19 | 2014 |
Email phishing: an enhanced classification model to detect malicious urls S Sankhwar, D Pandey, RA Khan EAI Endorsed Transactions on Scalable Information Systems 6 (21), e5-e5, 2019 | 18 | 2019 |
An anti‐phishing enterprise environ model using feed‐forward backpropagation and Levenberg‐Marquardt method S Sankhwar, D Pandey, RA Khan, SN Mohanty Security and Privacy 4 (1), e132, 2021 | 17 | 2021 |
Requirement engineering paradigm S Sankhwar, V Singh, D Pandey Global Journal of Multidisciplinary Studies 3 (3), 1-8, 2014 | 16 | 2014 |