Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency… More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must meticulously follow the Multi-Criteria… More >

  • Open Access

    ARTICLE

    Impact of Tools and Techniques for Securing Consultancy Services

    Wael Alosaimi1, Abdullah Alharbi1, Hashem Alyami2, Masood Ahmad3, Abhishek Kumar Pandey3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 347-360, 2021, DOI:10.32604/csse.2021.015284

    Abstract In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants tend to focus more on… More >

  • Open Access

    ARTICLE

    Analyzing the Implications of COVID-19 Pandemic: Saudi Arabian Perspective

    Shakeel Ahmed*, Abdulaziz Alhumam

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 835-851, 2021, DOI:10.32604/iasc.2021.015789

    Abstract Most of the patients diagnosed with COVID-19 pandemic usually suffer from mild-to-serious respiratory illness and become stable without any specific care. In fact, in some countries like India the mortality rate is as low. Those who are amongst the most vulnerable groups are the elderly and the ones with chronic ailments like diabetes, heart ailments, and respiratory ailments. However, apart from the impact on the physical health of the patients, this disease has had a more debilitating affect on the mental as well as emotional well-being of the people. Due to continuous watching and protection programs to fight the pandemic,… More >

  • Open Access

    ARTICLE

    Efficient MCDM Model for Evaluating the Performance of Commercial Banks: A Case Study

    Mohamed Abdel-Basset1, Rehab Mohamed1, Mohamed Elhoseny2, Mohamed Abouhawash2,3, Yunyoung Nam4,*, Nabil M. AbdelAziz1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2729-2746, 2021, DOI:10.32604/cmc.2021.015316

    Abstract Evaluation of commercial banks (CBs) performance has been a significant issue in the financial world and deemed as a multi-criteria decision making (MCDM) model. Numerous research assesses CB performance according to different metrics and standers. As a result of uncertainty in decision-making problems and large economic variations in Egypt, this research proposes a plithogenic based model to evaluate Egyptian commercial banks’ performance based on a set of criteria. The proposed model evaluates the top ten Egyptian commercial banks based on three main metrics including financial, customer satisfaction, and qualitative evaluation, and 19 sub-criteria. The proportional importance of the selected criteria… More >

  • Open Access

    ARTICLE

    Integrity Assessment of Medical Devices for Improving Hospital Services

    Fahad A. Alzahrani1, Masood Ahmad2, Mohd Nadeem2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3619-3633, 2021, DOI:10.32604/cmc.2021.014869

    Abstract The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or the procedures of integrity assessment… More >

  • Open Access

    ARTICLE

    Unified Computational Modelling for Healthcare Device Security Assessment

    Shakeel Ahmed*, Abdulaziz Alhumam

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 1-18, 2021, DOI:10.32604/csse.2021.015775

    Abstract This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Prediction Techniques: Software Reliability Perspective

    Kavita Sahu1, Fahad A. Alzahrani2, R. K. Srivastava1, Rajeev Kumar3,4,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1471-1488, 2021, DOI:10.32604/cmc.2021.014868

    Abstract Maintaining software reliability is the key idea for conducting quality research. This can be done by having less complex applications. While developers and other experts have made significant efforts in this context, the level of reliability is not the same as it should be. Therefore, further research into the most detailed mechanisms for evaluating and increasing software reliability is essential. A significant aspect of growing the degree of reliable applications is the quantitative assessment of reliability. There are multiple statistical as well as soft computing methods available in literature for predicting reliability of software. However, none of these mechanisms are… More >

  • Open Access

    ARTICLE

    Device Security Assessment of Internet of Healthcare Things

    Abdulaziz Attaallah1, Masood Ahmad2, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 593-603, 2021, DOI:10.32604/iasc.2021.015092

    Abstract Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients’ data. Infringement of patients’ data is not only a violation of privacy but can also jeopardize patients’ health if the health records are tampered with. Once the device has been intruded upon, attackers can not only change the… More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field of the medical industry as… More >

Displaying 31-40 on page 4 of 47. Per Page