Mining network data for intrusion detection through naïve bayesian with clustering DM Farid, N Harbi, S Ahmmed, MZ Rahman, CM Rahman International Journal of Computer and Information Engineering 4 (6), 1053-1057, 2010 | 22* | 2010 |
Software risk factors: A survey and software risk mitigation intelligent decision network using rule based technique M Asif, J Ahmed, A Hannan Proceedings of the International MultiConference of Engineers and Computer …, 2014 | 13 | 2014 |
Prioritization of Value Based Services of Software by Using AHP and Fuzzy Kano Model A Bakhtiar, A Hannan, A Basit, J Ahmad Proceedings of 3rd International Conference on computation and Social …, 2015 | 12 | 2015 |
Prediction of dengue disease through data mining by using modified apriori algorithm I Jahangir, A Hannan, S Javed Proceedings of the 4th ACM International Conference of Computing for …, 2018 | 9 | 2018 |
Value Based Requirements Classification of Software Product using Fuzzy Kano Model A Hannan, J Ahmad, A Basit New Horizon 83, 2015 | 7 | 2015 |
Automatic Lung Segmentation from CPTA Images using Particle Swarm Optimization H Jabeen, A Hannan, J Ahmad IEEE Symposium Series on Computational Intelligence (SSCI 2013); 01/2013, 2013 | | 2013 |
Influence of Thickness on the Optical Properties of Vacuum Evaporated CdSe Thin Films M Hossain, J Begum, T Begum, A Hannan SUST, 2012 | | 2012 |
Requirement Analysis Process: Conflict Identification among Non-functional Requirements using Matrix Maps A Hannan VDM Verlag Dr. Muller e. K, 2010 | | 2010 |