Requirement Defect Identification: An Early Stage Perspective SK Nayak, RA Khan, MR Beg International Journal of Computer Science Issues (IJCSI) 9 (5), 237, 2012 | 8 | 2012 |
Reliable requirement specification: Defect analysis perspective SK Nayak, RA Khan, MR Beg Global Trends in Information Systems and Software Applications: 4th …, 2012 | 7 | 2012 |
Requirement Defect Identification And Their Mitigation Through Severity And Priority SK Nayak, RA Khan, R Beg International Conference on Communication and Electronics Information …, 2012 | 6 | 2012 |
Plastic card circumvention an infirmity of authenticity and authorization V Khattri, SK Nayak, DK Singh Journal of Financial Crime 27 (3), 959-975, 2020 | 4 | 2020 |
Development of integrated distance authentication and fingerprint authorization mechanism to reduce fraudulent online transaction V Khattri, SK Nayak, DK Singh Intelligent Communication, Control and Devices: Proceedings of ICICCD 2018 …, 2020 | 3 | 2020 |
A framework for crime detection and reduction in digital forensics A Singh Available at SSRN 4082975, 2022 | 2 | 2022 |
Critical analysis on data science and big data avenues MG Baig, SK Nayak International Journal of Scientific and Technology Research 8 (11), 2019 | 2 | 2019 |
Evaluation of Requirement Defects: An Implementation of Identification Technique SK Nayak, RA Khan, MR Beg International Journal of Information and Education Technology 2 (5), 448, 2012 | 2 | 2012 |
A comparative template for reliable requirement specification SK Nayak, RA Khan, MR Beg International Journal of Computer Applications 14 (2), 27-30, 2011 | 2 | 2011 |
The Threat Detection Framework for Securing Semantic Web Services Based on XACML NK Singh, SK Nayak Advances in Computational Intelligence and Communication Technology …, 2021 | 1 | 2021 |
Antivirals W Reis, J Gaio, T Chau, F Ramos, C Reis, W Reis, J Gaio, T Chau, ... Pharmacology in Clinical Neurosciences: A Quick Guide, 499-678, 2020 | 1 | 2020 |
An enhanced authentication technique to mitigate the online transaction fraud V Khattri, SK Nayak, DK Singh Intelligent Communication, Control and Devices: Proceedings of ICICCD 2018 …, 2020 | 1 | 2020 |
The Threat Detection Framework for Securing Semantic Web Services NK Singh, SK Nayak Journal of Computational and Theoretical Nanoscience 16 (12), 5099-5104, 2019 | 1 | 2019 |
Reliability Assessment in Functioning of Requirement Defect Mitigation SK Nayak, RA Khan, MR Beg International Journal of Information and Education Technology 2 (5), 521, 2012 | 1 | 2012 |
Requirement Defect Mitigation Technique: An Early Stage Implementation DSK Nayak International Journal of Computer Science Issues 9 (5), 381-386, 2012 | 1 | 2012 |
A decision tree approach for enhancing real-time response in exigent healthcare unit using edge computing EF Siddiqui, T Ahmed, SK Nayak Measurement: Sensors 32, 100979, 2024 | | 2024 |
Latency Management in Task Offloading from IoT to MEC EF Siddiqui, S Nayak International Journal of Computing and Digital Systems 14 (1), 1-xx, 2023 | | 2023 |
Agitating Sustainability using Fog Computing for Smart Cities EF Siddiqui, SK Nayak 2023 10th International Conference on Computing for Sustainable Global …, 2023 | | 2023 |
An Algorithm for Crime Detection in Digital Forensics A Singh, SK Singh, N Singh, SK Nayak Journal of Survey in Fisheries Sciences 10 (3S), 1281-1290, 2023 | | 2023 |
Latency Evaluation in an IoT-Fog Model EF Siddiqui, SK Nayak, M Faisal Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2 …, 2022 | | 2022 |