Babasaheb bhimrao ambedkar university


Part-I Research Publication of last five years, i.e., 2008-2009 onward



Yüklə 3,69 Mb.
səhifə8/36
tarix24.04.2018
ölçüsü3,69 Mb.
#48994
1   ...   4   5   6   7   8   9   10   11   ...   36
Part-I

Research Publication of last five years, i.e., 2008-2009 onward
A. BOOK PUBLISHED
1. Dr. R. A. Khan

  1. Software Engineering: Concepts and Practices- Khan R A, Lambert Academic Publishing, Germany, ISBN: 978-3-8383-7779-7, https://online.lap-publishing.com//index.php?d0f1478a8b43fb835358aca972f98ac2&.

  2. Testing of Fault Tolerance Techniques- Choudhary R K, Khan R A, Lambert Academic Publishing, Germany, ISBN: 978-3-8383-8592-1, http://www.amazon.com/Testing-Fault-Tolerance-Techniques-Perspective/dp/3838385926/ref=sr_1_2?s=books&ie=UTF8&qid=1282020433&sr=1-2

  3. Maintainability Estimation of an Object-Oriented Software Design- W. Rizvi, Khan R.A., VDM Verlag, Saarbrücken , Germany ISBN: 978-3-639-29601-3, http://www.amazon.com/Maintainability-Estimation-Object-Oriented-Software-Design/dp/363929601X/ref=sr_1_1?ie=UTF8&s=books&qid=1286536934&sr=8-1


B. BOOK CHAPTERS
1. Dr. R. A. Khan

  1. Addressing Analyzability in terms of Object Oriented Design Complexity, Suhel Ahmad Khan, Raees Ahmad Khan, ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II Advances in Intelligent Systems and Computing Volume 249, 2014, pp 371-378, ISBN 978-3-319-03095-1,Springer-Verlag Berlin Heidelberg 2014.

  2. Software Security Testing Process: Phased Approach, Suhel Ahmad Khan, Raees Ahmad Khan, Intelligent Interactive Technologies and Multimedia Communications in Computer and Information Science, A. Agrawal et al. (Eds.), Volume 276, 2013, pp 211-217, ISBN 978-3-642-37462-3,Springer-Verlag Berlin Heidelberg 2013.

  3. Implementing Availability State Transition Model to Quantify Risk Factor, Shalini Chandra and Raees Ahmad Khan, ADVANCES IN COMPUTER SCIENCE, ENGINEERING & APPLICATIONS, Advances in Intelligent and Soft Computing, 2012, Springer-Verlag, Volume 167/2012, pp. 937-952, DOI: 10.1007/978-3-642-30111-7_91.

  4. Reliability Quantification of Object Oriented Design: Complexity Perspective: A Yadav & R.A.Khan, ADVANCES IN COMPUTER SCIENCE, ENGINEERING & APPLICATIONS, Advances in Intelligent and Soft Computing, 2012, Springer-Verlag, Volume 166/2012, 577-585, DOI: 10.1007/978-3-642-30157-5_58

  5. Assessing and Improving Encapsulation for Minimizing Vulnerability of an Object Oriented Design: A Agrawal & R.A.Khan, Computational Intelligence and Information Technology, Vinu V Das and Nessy Thankachan (Eds.), Volume 250, Part 2, LNCS, Springer-Verlag, 2011, pp. 531-533, DOI: 10.1007/978-3-642-25734-6_90.

  6. Testability Estimation Model (TEMOOD): M. Nazir & R.A.Khan, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 85, Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.), Volume 85, Part 3, LNICST, Springer-Verlag, 2012, pp 178-187, (ISBN 978-3-642-27307-0).

  7. Software Security Factors in Design Phase- Chandra S., Khan R. A. & Agrawal A., Information Systems, Technology and Management, S. K Prasad et al. (Eds.), Vol. 31, Part 12, Springer-Verlag Berlin Heidelberg 2009, pp. 339-340 (ISSN: 1865-0929, ISBN: 978-3-642-00404-9).

  8. A Vulnerability Metric for the Design Phase of Object Oriented Software, A. Agrawal and R.A. Khan, Communications in Computer and Information Science, S. Ranka et al. (Eds.), Part I, CCIS 94, pp. 328–339, 2010, Springer-Verlag Berlin Heidelberg 2010, (ISBN: 978-3-642-14833-0).

2. Mrs. Raj Shree

  1. A Secure Hybrid Protocol for Wireless Sensor Network in Strategic Pervasive Computing Applications: Emerging Trends, ISBN-1615207538, 2010, pp- 99-110.

  2. Cyber Terrorism: An Introduction, Impact of Terrorism on Economic Growth in India: A Scenario Analysis, Prakash Book Depo., Bareilly, ISBN-9788179774526, 2011. pp. 47-54

C. RESEARCH PROJECTS

1. Dr. R. A. Khan

  1. Title of Project: Quantifying Security in Early Stage of Software Development Life Cycle: An Object Oriented Software Perspectives, Funding Agency: University Grant Commission (UGC), Total Budget: Rs. 7,81,800/-, Status: Executed, Duration: 3 Years, Role: Principal Investigator, Date of Implementation: 01-02-2009

  2. Title of Project: Symptoms and Sensation due to Cellular Telephone Usage Among the Urban and Rural Population of Uttar Pradesh: A Risk Assessment, Funding Agency: Council of Science & Technology, UP (under Young Scientist Scheme), Total Budget: Rs. 6, 36,000/-, Status: Executed, Duration: 3 Years, Role: Principal Investigator, Execution Date: March 2009

  3. Title of Project: Integration, Analysis and Implementation of Prosodic & MFCC Features for Automatic Speaker Recognition System using GMM, Funding Agency: Council of Science & Technology, UP, Total Budget: Rs. 7, 82,000/-, Status: On Going, Duration: 2 Years, Role: Principal Investigator, Execution Date: May 2013.


D. INTERNATIONAL JOURNAL

1. Dr. R. A. Khan

  1. Agrawal & Khan R. A.(2014): Securo-Phobia: A New Challenge to Usage of Security Technologies, Journal of Software Engineering and Simulation, Quest Journals, Vol. 2, Issue 1, pp: 01-03.

  2. Agrawal & Khan R. A.(2013): Software Security Metric Development Framework: An Early Stage Approach, American Journal of Software Engineering and Application, Vol. 2, No. 6, pp. 150-155.

  3. Yadav, R.A. Khan (2013): Development Of OO Design Metrics-Complexity Perspective, Computech: An International Journal of Computer Sciences Vol. 3, No. 6 pp. 45-55, January 2013(ISSN: 2229-4589)(IF: 1.071).

  4. Suhel Ahmad Khan, Khan R A (2013): Security Quantification Model, International Journal of Software Engineering, ISSN: 2090-1801, Volume 6, No 2, July 2013, pp.75-79.

  5. S. K. Nayak, Khan R A & M. R. Beg (2013): Empirical Validation of Reliable Requirement Specification Framework, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013, pp. 402-406 (Impact Factor=.242).

  6. Suhel Ahmad Khan, Khan R A (2013): Software Security Testing Process, International Journal of Advances in Computer Science and its Application IJCSIA-UACEE-2013, ISSN: 2250-3765, Volume 3, Issue 2, June 2013, pp.125-129.

  7. Bonthu Kotaiah & Khan R A (2013): Different Issues in Predicting the Software Reliability, International Journal of Science and Engineering Investigations, Vol. 2, Issue 12, pp. 65-68(ISSN: 2251-8843).

  8. Bonthu Kotaiah & Khan R A (2012): A Survey on Software reliability Assessment by Using Different Machine Learning Techniques, International Journal of Science & Engineering Research, Vol. 3, Issue 6, pp. 1-7 (ISSN: m2229-5518).

  9. Nilu Singh, R A Khan and Raj Shree (2012): Article: MFCC and Prosodic Feature Extraction Techniques: A Comparative Study. International Journal of Computer Applications 54(1):9-13, September 2012. Published by Foundation of Computer Science, New York, USA. 

  10. Nilu Singh, Khan R A & Raj Shree(2012): Application of Speaker Recognition, Procedia Engineering, Elsevier, Vol. 38, 2012, pp. 3122-3126.

  11. S. A. Khan & Khan R A (2012): Integrity Quantification Model for Object Oriented Design, Software Engineering Notes, ACM SIGSOFT, March 2012, Vol. 37, Issue 2, pp. 1-3.

  12. Yadav & Khan R A (2012): Impact of Cohesion on Reliability, Journal of Information and Operations Management, Bioinfo Publication, ISSN: 0976–7754 & E-ISSN: 0976–7762, Volume 3, Issue 1, 2012, pp-191-193 (Impact Factor 4.72).

  13. S. A. Khan, Khan R. A.(2012): Analyzability Quantification Model of Object Oriented Design, Procedia Technology 4 (2012) pp. 536-542, Elsevier.

  14. S. A. Khan & Khan R. A. (2012): Confidentiality Quantification Model At Design Phase, International Journal of Information and Education Technology, Vol. 2, No. 5, pp. 535-537.

  15. S. A. Khan, R. A. Khan (2012): A Framework to Quantify Security: Complexity Perspective, International Journal of Information and Education Technology, Vol. 2, No. 5, pp. 439-441.

  16. S. A. Khan, Khan R. A. (2012): Object Oriented Design Complexity Quantification Model, Procedia Technology 4 (2012) pp. 548-554, Elsevier.

  17. S. K. Nayak, Khan R A & M. R. Beg (2012): Evaluation of Requirement Defects: An Implementation of Identification Technique, International Journal of Information and Education Technology, Vol. 2, No. 5, October 2012, pp. 448-450.

  18. S. K. Nayak, Khan R A & M. R. Beg (2012): Reliability Assessment in Functioning of Requirement Defect Mitigation, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 2, September 2012, pp. 381-386 (Impact Factor=.242).

  19. M. Nazir & Khan R A(2012): An Empirical Validation of Understandability Quantification Model, Procedia Technology 4 (2012) pp. 772-777, Elsevier.

  20. Yadav & Khan R A(2012): Development of Encapsulated Class Complexity Metric, Procedia Technology 4 (2012) pp. 754-760, Elsevier.

  21. Agrawal & Khan R. A.(2012): Role of Coupling in Vulnerability Propagation-Object Oriented Design Perspective, Software Engineering: An International Journal, Vol. 2, No. 1, pp. 60-68.

  22. S. K. Nayak, Khan R A & M. R. Beg (2012): Reliable Requirement Specification: Defect Analysis Perspective, Springer-LNCS, Vol. 270, pp. 740-751.

  23. S. K. Nayak, Khan R A & M. R. Beg (2012): Requirement Defect Identification and Their Mitigation through Severity and Priority, ASME Press-USA, 427-431.

  24. Khan R.A. & Choudhary R K (2011): Software Testing Process: A Prescriptive Framework, Software Engineering Notes, ACM SIGSOFT, Vol. 36, No. 3, May 2011, pp. 1-5.

  25. Khan R.A. (2011): Secure Software Development Process: A Prescriptive Framework, Computer Fraud and Security, Elsevier, Vol. 2011, Issue 8, pp. 12-20.

  26. Yadav A. & Khan R A(2011): Coupling Normalization Metric-An Object Oriented Perspective, International Journal of Information Technology & Knowledge Management(ISSN 0973-4414), Vol. 4, No. 2, pp. 501-509.

  27. Chandra S & Khan R.A. (2011): Availability State Transition Model, Software Engineering Notes, ACM SIGSOFT, Vol. 36, Issue 3 March 2011, pp. 1-3.

  28. Choudhary R K & Khan R.A. (2011): Testing Software Fault Tolerance Techniques-Future Direction, Software Engineering Notes, ACM SIGSOFT Vol. 36, Issue 3 March 2011, pp. 1-5.

  29. S. K. Nayak, Khan R A & M. R. Beg (2011): A Comparative template for Reliable Requirement Specification, International Journal of Computer Applications, Vol. 14, No. 2, pp. 27-30.

  30. S. A. Khan & Khan R A (2011): Object Oriented Design Security Quantification, Journal of Global Research in Computer Science, Vol. 2, No. 4, pp. 55-58.

  31. Khan R.A. & Khan S A (2010): A Roadmap for Security, International Journal of Computer Science & Engineering Technologies (IJCSET), Vol. 1, Issue 1, June 2010, pp. 5-8.

  32. Yadav A. & Khan R A(2010): Software Reliability Models Taxonomy, The Journal of Computing (TJC), Sambhavam Scientific Community, Vol. 1, Issue 3, July 2010, pp. 18-25.

  33. M. Nazir, Khan R A & Mustafa K. (2010): Testability Estimation Framework, International Journal of Computer Application, Vol. 2, No. 5, June 2010, pp.9-14. 

  34. S. A. Khan & Khan R A (2010): Securing Object Oriented Design: A Complexity Perspective, International Journal of Computer Applications, Vol. 8, No. 13, October 2010, pp.8-12. 

  35. M. Nazir, Khan R A & Mustafa K. (2010): A Metrics Based Model for Understandability Quantification, Journal of Computing, Vol. 2, Issue 4, April 2010, pp.90-94. 

  36. S.W.A. Rizvi & Khan R A (2010): Maintainability Estimation Model for Object-Oriented Software in Design Phase (MEMOOD), Journal of Computing, Vol. 2, Issue 4, April 2010, pp. 26-32. 

  37. Chandra S & Khan R.A.(2010): Confidentiality Checking an Object-Oriented Class Hierarchy, Network Security, Elsevier, Vol. 2010, Issue 3, pp. 16-20.

  38. Agrawal A & Khan R.A.(2009): Measuring Vulnerability of an Object-Oriented Design, Computer Fraud and Security, Elsevier, Vol. 2009, Issue 10, pp. 13-17.

  39. Chandra S. & Khan R.A. (2009): A Methodology to Check Integrity of a Class Hierarchy, International Journal of Recent Trends in Engineering, Nov 2009 Vol. 2, No. 4, pp.83-85.

  40. Agrawal A. & Khan R.A. (2009): An Algorithm to Measure Attribute Vulnerability Ratio of an Object Oriented Design, International Journal of Recent Trends in Engineering, Nov 2009 Vol. 2, No. 3, pp. 61-63.

  41. Agrawal A. & Khan R.A. (2009): A Framework to Detect and Analyze Software Vulnerabilities- Development Phase Perspective, International Journal of Recent Trends in Engineering, Nov 2009, Vol. 2, No. 2, pp. 82-84.

  42. Yadav A. & Khan R.A. (2009): Critical Review on Software Reliability Models, International Journal of Recent Trends in Engineering, Nov 2009, Vol. 2, No. 3, pp. 114-116.

  43. Agrawal A. & Khan R.A. (2009): Impact of Inheritance on Vulnerability Propagation at Design Phase, Software Engineering Notes, ACM SIGSOFT, Vol. 34, No. 4 July 2009, pp. 1-5.

  44. Choudhary R. K. & Khan R. A. (2009): Need of Framework to Test an Object Oriented Software Fault Tolerance, International Journal of Emerging Technologies And Applications In Engineering, Technology And Sciences (IJ-ETA-ETS), Volume 2, Issue 2, Page: -7.

  45. Khan R.A. & Mustafa K. (2009), From Threat to Security Indexing: A Causal Chain, Computer Fraud & Security, Elsevier Vol. 2009, Issue 4, pp. 9-12.

  46. Yadav A. & Khan R.A. (2009): Measuring Design Complexity: An Inherited method Perspective, Software Engineering Notes, ACM SIGSOFT, Vol. 34, No. 4 July 2009, pp. 1-5.

  47. Agrawal A. & Khan R.A. (2009): Impact of Inheritance on Vulnerability Propagation at Design Phase, Software Engineering Notes, ACM SIGSOFT, Vol. 34, No. 4 July 2009, pp. 1-5.

  48. Khan R. A. & Mustafa K (2009): Metric Based Testability Model for Object Oriented Design (MTMOOD), Software Engineering Notes, ACM SIGSOFT, Vol. 34, No. 2 March 2009, pp. 1-6.

  49. Yadav A. & Khan R. A. (2009): Software Reliability Metrics Taxonomy, International Journal of Computing Science and Communication Technology, Vol. 1, No. 2, pp. 172-179.

  50. Choudhary R. K., Chandra S. & Khan R. A.(2009): An Empirical Validation of Framework to Test an OO Software Fault Tolerance, International Journal of Computing Science and Communication Technology, Vol. 1, No. 2, pp. 101-108.

  51. Khan R. A. & Mustafa K (2008): Secured Requirement Specification Framework, American Journal of Applied Science, USA, Vol. 5, No. 12, pp. 1622-1629.

  52. Chandra S. & Khan R A (2008): Object Oriented Software Security Estimation Life Cycle -Design Phase Perspective, Journal of Software Engineering, Vol. 2, No. 1, pp.39-46.

  53. R. K. Choudhary, S. Chandra & Khan R A (2008): Framework for Testing Fault Tolerance, International Journal of Systemic, Cybernetics and Informatics (ISSN0973-4864), Pentagram Research Publication, October 2008, pp. 41-44.

  54. Khan R. A. & Mustafa K (2008): Software Vulnerability Life Cycle, Developer IQ, Vol. 8 No. 2 February 2008, pp. 27-30.


2. Mrs. Raj Shree

  1. Study of Impact of Route Falsification Attack using SRIP in WAN, Internatinal Journal on Computer Engineering & Information Technology, ISSN- 9742034, 2009, pp. 35-38.

  2. Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc networks, International Journal of Computer Applications, ISBN-9789380747972, 2011, pp. 6-10.

  3. An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network:Requirement and Security Management Perspective, International Journal of Advances Computer Engineering and Architecture, ISBN-22489452, 2011, pp. 129-138.

  4. An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective, International Journal of Computer Applications, ISBN-9789380752927, 2011, pp. 34-39.

  5. MFCC and Prosodic Feature Extraction Techniques: A Comparative Study, International Journal of Computer Applications, ISSN- 9789380747972, 2012, pp. 9-13.

  6. Applications of Speaker Recognition, Procedia Engineering of Elsevier, ISBN- 18777058, 2012, pp. 3122-3126.

  7. Wormhole Attack in Wireless Sensor Network, International Journal of Computer Networks and Communication Security, (ACCEPTED for publication), 2013.


3. Mr. P. K. Chaurasia

  1. Chaurasia Pawan Kumar and Jahi Ali,(2013) : Operational Profile: A Critical Review, Journal of Global Research in Computer Science (JGRCS), USA, ISSN 2229-371X, Volume 4 No 8, pp.57-61.(2013). (Impact Factor: 0.5) http://www.jgrcs.info/index.php/jgrcs/article/view/767/546

  2. Chaurasia, Pawan Kumar and Saxena, Vipin,(2011) : Mobile Based Electricity Bill Deposit System Through UML, International Journal of Software Engineering and Applications, USA, Vol. 4(3), pp. 187-190,(2011). www.scirp .org/journal/jsea, (ISSN No.: 1945-3124). Impact Factor (0.15) {http://dx.doi.org/10.4236/jsea.2011.43021}

  3. Saxena, Vipin, Chaurasia, Pawan Kumar and Nimesh Mishra, (2011) : E-Learning Through National Knowledge Network, International Journal of Computer and Electrical Engineering, SINGAPORE, Vol. 3(4), 554-556, www.ijcee.org/papers/378-E1041.pdf, August (2011) (ISSN No.: 1793-8198). http://www.ijcee.org/papers/378-E1041.pdf

  4. Chaurasia, Pawan Kumar and Saxena, Vipin, (2011) : UML Model for Town and Country Planning, PRAYAS-Student Journal of Computing, INDIA, 91-94, March (2011) (ISSN No.: 0975-8224).

  5. Chaurasia, Pawan Kumar and Saxena, Vipin, (2011) : UML Model for Town and Country Planning, PRAYAS-Student Journal of Computing, INDIA, 91-94, March (2011) (ISSN No.: 0975-8224)


4. Dr. Dhirendra Pandey

  1. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “Social-organizational Participation Difficulties in Requirement Engineering Process”, Software Engineering Journal, BioInfo Publication, Mumbai, Vol. 1, No. 1, ISSN: 2229–4007 and ISSN: 2229–4015, pp.01-05, 2010.

  2. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “Security Requirement Engineering Framework for Developing Secure Software”, International Journal of Computational Intelligence and Information Security, IJCIIS, Australia, Vol. 1 No. 8, ISSN: 1837-7823, pp.55-65, 2010.

  3. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “Security Requirement Engineering Issues in Risk Management”, International Journal of Computer Applications, Foundation of Computer Science, USA, ISBN: 978-93-80747-89-4, Vol. 17, No. 5, pp.11-14, 2011.

  4. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “Performance Measurement of Different Requirement Engineering Process: A study”, International Journal of Computer Engineering and Technology, IJCET, Tamilnadu, ISSN: 0976-6375, Vol. 1, No. 2, pp.286-300, 2010.

  5. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani “Framework to Modeling Software Requirement”, International Journal of Computer Science Issues, Malaysia, ISSN: 1694-0814, Vol. 8, No. 3, pp.164-171, 2011.

  6. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “The Usefulness of RE Practices in S/W Development” Journal of Global Research in Computer Science (JGRCS), USA, ISSN: 2229- 371x, Vol3. No.7, pp. 56-66, 2012.

  7. Dhirendra Pandey, Ashish Rastogi, “A Critical Research on Threats and Security Technology Related to Payment System on E-commerce Network”. International Journal of Computer Applications 8(3):11–14, October 2010. Published By Foundation of Computer Science, USA, Volume 8– No.3, October 2010, pp 11-14, ISSN0975 – 8887.

  8. Dhirendra Pandey, Vandana Pandey, “Requirement Engineering: An Approach to Quality Software Development” Journal of Global Research in Computer Science (JGRCS), USA, ISSN: 2229- 371x, Vol.3, No.9, pp. 31-33, 2012.

  9. Dhirendra Pandey, Vandana Pandey “Importance of Requirement Management: A Requirement Engineering Concern”, International Journal on Research and Development- A Management Review (IJRDM), India, ISSN: 2278-5140, Vol. 1 No. 1, pp. 66-70, 2012.

  10. Dhirendra Pandey, Neeraj Kumar, Vandana Pandey, “SMS-Based System for Type-II Diabetes (NIDDM) Management", Health Informatics - An International Journal (HIIJ), Vol 1, No. 1, pp 19-26, 2012.

  11. N. Kumar, R. A. Khan and Dhirendra Pandey. “Cellular Phone: A Contemporary Tool for Biometric Implications”, International Journal of Information and Education Technology, ISSN: 2010 3689, Vol. 2, No. 5, pp. 445-447, 2012.

  12. Dhirendra Pandey, Vandana Pandey, “The Security of Information Exchange: AN E- Commerce Perspectives”, Accepted in Journal of Global Research in Computer Science (JGRCS), USA, ISSN: 229- 371x, Vol 4, No: 3, pp. 31-35 , 2013.

  13. Dhirendra Pandey, Mohd. Waris Khan, Vandana Pandey, “Requirement Validation Vs. Requirement Elicitation”, International Journal of Computer & Communication Technology, ISSN (PRINT): 0975 - 7449, Volume-4, Issue-2, pp. 30-37, 2013.

  14. Dhirendra Pandey, “The Research Road map of Requirement Validation”, International Journal of Advanced Research in Computer Science (IJARCS), ISSN: 0976-5697, Volume 4, Number 4, 2013, pp. 52-54, 2013

  15. Dhirendra Pandey, “Requirement Engineering Research”, International Journal of Computer Science & Engineering Technology (IJCSET), ISSN No: 2229-3345, Vol. 4, No. 4, pp. 447-450, 2013

  16. Dhirendra Pandey “An Overview on Advance Metering System”, IJCSET, ISSN No: 2229-3345, Vol. 4, No. 4, pp. 443-446, 2013.

  17. Vandana Pandey, Dhirendra Pandey, , Abhinav Shukla, “FEREP: Framework for Effective Requirement Engineering Process Model”, International Journal of Advance Research in Science and Engineering, ISSN (Online): 2321 – 8304, Volume-1 Issue-1, pp. 24-33, 2013.


E. NATIONAL JOURNAL
1. Dr. R. A. Khan

  1. A. Yadav & Khan R. A. (2011): Reliability Estimation of Object Oriented Design, The IUP Journal of System Management., Vol. IX, No. 2, May 2011, pp. 28-41.

  2. Chandra S & Khan R. A. (2010): Software Security: A Quantitative Approach CSI Communications, Vol. 34, Issue 5, August 2010, pp. 19-23.

  3. A. Yadav & Khan R. A.(2010): Bridging the Gap between Design Constructs and Reliability Factors, CSI Communications, Vol. 33, Issue 12, March 2010, pp.29-32.

  4. Agrawal A., S. Chandra & Khan R. A.(2008): Software Security Process – Development Life Cycle Perspective, CSI Communications, Vol. 32 (5), pp.39-42.

  5. Khan R. A. & Mustafa K (2008): Managing Software Risk- A Lifecycle Approach, Journal of Computer Science, Vol. 2(6), pp. 841-851, 2008.

  6. Khan R. A. & Mustafa K (2008): Specifying Secured Requirements, Journal of Computer Science, Vol. 2, No. 4, pp. 680-689.


F. INTERNATIONAL CONFERENCES
1. Dr. R. A. Khan

  1. S. A. Khan, Khan R. A. (2012): Software Security Testing Tools: A Revisit, International Conference on Emerging Trends in Electrical, Communication and Information Technologies (ICECIT-2012), pp. 321-333, Elsevier, (ISBN: 978-81-312-3411-2).

  2. S. A. Khan, Khan R. A. (2012): Availability Quantification Model for Design Phase, 2012 Students Conference on Engineering and Systems (SCES 2012),(ISBN: 978-1-4673-0454-2), MNNIT, Allahabad, India, pp. 253-256, March 16-18, 2012.

  3. Agrawal & R. A. Khan (2011): A Framework for Vulnerability Minimization- Object Oriented Design Perspective, 2nd International Conference on Computer and Communication Technology, ICCCT, 15-17 Sep 2011, IEEE Computer Society, (ISBN: 978-1-4577-1385-9), pp. 499-504.

  4. Yadav & Khan R. A. (2011): Class Cohesion Complexity Metrics, , 2nd International Conference on Computer and Communication Technology, ICCCT, 15-17 Sep 2011, IEEE Computer Society,(ISBN: 978-1-4577-1385-9) pp. 363-366.

  5. Yadav & Khan R. A. (2010): Does Coupling Really Affect Complexity?, ICCCT 2010 MNNIT Allahabad, India, IEEE Computer Society (ISBN: 978-1-4244-9032-5), pp. 583-588.

  6. M. Nazir, Khan R. A. & Mustafa K. (2010): Complexity Quantification Model: A Metric Based Approach, 4th IEEE International Conference on Advanced Computing and Communication Technologies, APIIT SD India, (ISBN: 978-1-93-80697-28-4), October 30, pp. 725-729.

  7. Yadav & Khan R. A. (2010): Identifying Relationship between Reliability Factors and OO Design, 4th IEEE International Conference on Advanced Computing and Communication Technologies, APIIT SD India, (ISBN: 978-1-93-80697-28-4), October 30, pp. 710-713.

  8. Chandra S., Khan R. A. & Agrawal A. (2009): Security Estimation Framework: Design Phase Perspective”, Sixth International Conference on Information Technology, New Generations, ITNG 2009, IEEE Computer Society, Las Vegas, NV, USA, (ISBN: 978-0-7695-3596-8 ) 27-29 April, 2009, pp. 254-259.

  9. Agrawal A., Chandra S. & Khan R. A. (2009): An Efficient Measurement of Object Oriented Design Vulnerability, Proceedings, International Dependability Conference, ARES 2009, IEEE Computer Society, Fukuoka, Japan, (ISBN: 978-1-4244-3572-2) 16th-19th March, pp. 618-623.

  10. Chandra S. & Khan R. A. (2009): Software Security Metric Identification Framework (SSMf), International Conference on Advances in Computing, Communication and Control (ICAC3’09), ACM, (ISBN: 978-1-60558-351-8) Mumbai, pp.725-731.

  11. Yadav A. & Khan R.A (2009): Complexity: A Reliability Factor, IEEE International Advance Computing Conference (IACC’09), Patiala, India, 6-7 March 2009, pp: 2375-2378.

  12. Chandra S., Khan R. A. (2008): Software Security Estimation – A Quantification Approach, Proceedings, International conference on Advanced Computing and Communication Technologies for High Performance Applications, Kerala, 24-26 sep 2008, Sponsored by IEEE & CSI, pp. 316-319.

  13. Agrawal A., Khan R.A. (2008): Securing Vulnerable Software: A Checklist Approach, Proceedings, International conference on Advanced Computing and Communication Technologies for High Performance Applications, Kerala, 24-26 sep 2008, Sponsored by IEEE & CSI, pp. 302-309.

  14. Wahid A., Mustafa K. & Khan R A(2008): WBIS for Computer Programming, International Conference on EEE, CSRE press USA, DBLP July 2008, ISBN 1-60132-063-9 pp 413-419.


2. Mrs. Raj Shree

  1. Bluff-Probe Based Black Hole Node Detection and Prevention, IEEE International Advance Computing Conference, held at Thapar University, Patiala. 6/3/9 to 7/3/9.

  2. A Strategy for Detecting Single Black Hole Node in Mobile Ad Hoc networks, International Conference on Electronics, Information and Communication Systems Engineering, ISBN-9789350331460, PP. 404-414.

  3. Emerging Trends in Human Rights in context of Globalized World, International Seminar on Future of Human Rights, Humanity & Culture in Emerging Globalized World, organized by AIRO in association with IAOSS and SJN PG College, Lucknow, 9/12/12 to 10/12/12.

  4. Track Down Worm Hole Attack in WSN, International Conference on Nanoscience and Nanotechnology, organized by Department of Physics, BBAU, LKO, 18/11/13 to 20/11/13.

  5. Equal Error Rate and Audio digitization and Sampling Rate for Speaker Recognition System, International Conference on Nanoscience and Nanotechnology, organized by Department of Physics, BBAU, LKO, 18/11/13 to 20/11/13.

  6. Attacks in Mobile Ad hoc Networks, International Conference on Emerging Technologies in Electronics and Communication, organized by GNDU, Amritsar, 20/12/23to 22/12/23

  7. Prevention of Route Falsification Attack using SRIP”, at International Conference on Pervasive Computing & Management (ICPCM), held at India Habitat Center, New Delhi. Titled “DEC-2008


3. Mr. Pawan K. Chaurasia

  1. Saxena Vipin and Chaurasia Pawan Kumar(2011) “A Proposal of Nepal Knowledge Network for Building E-Nepal”, International Conference 11th CAN Information and Communication Technology, Kathmandu, Nepal on 2-3 Feb (2011).

4. Dr. Dhirendra Pandey

  1. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “An Effective Requirement Engineering Process Model for Software Development and Requirement Management”, Proc. of International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom‟ 2010, IEEE Computer Society, ISBN: 978-0-7695-4201-0, Kerala, pp.287-291, 2010.

  2. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “An Approach to Information Requirement Engineering”, Proc. of IEEE International Conference on Information Security and Application, ICISA, South Korea, ISBN: 978-1-4244-9223-7/11, 2011.

  3. Dhirendra Pandey, Vandana Pandey, “Confidence and Security in Online Transaction: An E-Commerce Perspective”, Proc. of International Conference on Electrical and Computer Science (ICEECS), Bangalore, ISBN: 978-93-82208-26-6, pp. 45-47, 2012.

  4. Dhirendra Pandey, Mohd. Waris Khan, “An Enhanced Edification for Validation of Factual Requirements” in Proc. of International Conference on Electrical and Computer Science (ICEECS), Bangalore,ISBN: 978-93-82208-26-6, pp. 124-127, 2012.

  5. Dhirendra Pandey, Vandana Dubey, “The Quality Attributes of Requirements Engineer”, Proc. of International Conference on Recent Development in Engineering and Technology, Mysore, ISBN: 978-93-82208-29-7, pp. 87-88, 2012.

  6. Dhirendra Pandey, Mohd. Waris Khan, Vandana Pandey “Role Of Requirement Validation in Requirement Development”, Proc. of International Conference on Recent Development in Engineering and Technology, Mysore, ISBN: 978-93-82208-29-7, pp. 97-101, 2012.

  7. Dhirendra Pandey, Vandana Pandey, “The Exploitment of Public Key Encryption in E-Commerce Network for Secure Information Exchange” Accepted in Prof. of International Conference on Electrical, Electronics and Computer Science (ICEECS), Tirupati, and October 13, 2012. (Accepted)

  8. Dhirendra Pandey, “The Effective Use of Color Contrast Method in Motion Detection through Webcam: A Study”, Accepted in 3rd International Conference on Advanced Computer Science and Information Technology, ITResearch, ICACSIT-2013”, ISBN: 978-93-82702-20-7, pp. 147-151, 2013

  9. Dhirendra Pandey, Priyadarshini Narayan, “Artificial Intelligence Approach to Avoid Space Attack”, Proc. of International Conference on Advanced Computer Science and Information Technology, ITResearch, ICACSIT-2013, ISBN: 978-93-82702-20-7, pp.103-109, 2013.

  10. Dhirendra Pandey, Vandana Pandey, Abhinav Shukla, “Requirement Engineering Issues”, International Conference on Advances in Engineering & Technology (ICAE&T-2013)- AET – 2013, ISBN- 978 - 81 -927082-1-7, pp. 23,27, 2013

  11. Dhirendra Pandey, Mohd. Waris Khan, Abhinav Shukla, Framework for Requirement Validation (REVAF),   International Conference on Advances in Engineering & Technology - AET - 2013 - ISBN- 978 - 81 -927082-1-7, pp. 37-42, 2013,

  12. Dhirendra Pandey, Abhinav Shukla, Pankaj Bahuguna, “Recent Demand in AMI Infrastructure with Smart Meters”, International Conference on Advances in Engineering & Technology - AET - 2013 - ISBN- 978 - 81 -927082-1-7, pp. 43-45, 2013

  13. Dhirendra Pandey, Abhinav Shukla,Pankaj Bahuguna, “Communication through R F Mash Network”, International Conference on Advances in Engineering & Technology - AET - 2013 - ISBN- 978 - 81 -927082-1-7, pp. 46-49, 2013

  14. Dhirendra Pandey, Anil Kumar Shukla,Abhinav Shukla, , “Tracking Location through GIS Application”, International Conference on Advances in Engineering & Technology - AET - 2013 - ISBN- 978 - 81 -927082-1-7, pp. 53-59, 2013

  15. Dhirendra Pandey, Anil Kumar Shukla, Abhinav Shukla, “GIS: Scope and Benefits”, International Conference on Advances in Engineering & Technology - AET - 2013 - ISBN- 978 - 81 -927082-1-7, pp. 60-65, 2013.


G. NATIONAL CONFERENCES
1. Dr. R. A. Khan

  1. Yadav A & Khan R. A. (2011): Coupling Complexity Rank Metrics- Object Oriented Design Perspective, proceedings, National Conference on Emerging Trends in Electronics and Communication Engineering, Department of Electronics and Communication Engineering, Panipat Institute of Engineering and Technology, Panipat, 22-23 April 2011, pp. 363-366.

  2. Yadav A & Khan R. A. (2009): Software Reliability Metrics Categorization, Proceedings, National Conference Cutting Edge Computer and Electronics Technology (CE)2T, Pantnagar, Feb 14-16, pp. 144-148.

  3. Nazir M & Khan R A (2009): Software Design Testability Factors: A New Perspective, Proceedings, 3rd National Conference: INDIACom-2009, Bharti Vidya Peeth Institute of Computer Application and Management, New Delhi, Feb 26-27, pp.323-328.

  4. Yadav A & Khan R. A. (2009): Software Reliability, Proceedings, Third International Conference: INDIACom-2009, Bharti Vidya Peeth Institute of Computer Application and Management, New Delhi, Feb 26-27, pp. 313-318.

  5. S. Chandra & Khan R A(2008): Software Security Estimation in Early Stage of Development Life Cycle, Proceedings, National Conference on Emerging Trends, NCET, Department of Computer Science & Engineering, Information Technology And Computer Application Integral University, Lucknow, March 29-30, 2008, pp. 1-3.


2. Mrs. Raj Shree

  1. Impact of Wormhole Attack in Wireless Sensor Network, National Conference on Green Technologies for Sustainable Development, Held at Devi Ahilya Vishwavidyalaya, Indore. 1/12/9 to 3/12/09.

  2. Global Warming & its effect on Indian economy, National Conference on Global Warming: its effect on Indian economy, held at Ganna Utpadak Snatkottar Mahavidyalaya, Bahedi. 15/3/09 to 16/3/09.

  3. Rights of Women in India, National Seminar on Woman, Dalit and Human Rights in India, organized by AIRO in association with BBAU, LKO, 8/03/13 to 09/03/13.

  4. The Economic Impact of Cyber Crime and Future Challenges, National Seminar on History of Crime and Economy in Existing Society and Future Challenges, organized by, AIRO in association with Department of Ancient Indian History and Archaeology, University of Lucknow, LKO. 12/11/13 to 13/11/13.

  5. Detection of Wormhole Attack in Distributed Wireless Environment, 8th National Conference on “Thermodynamics of Chemical, Biological and Environmental Systems-2013, organized by Department of Applied Chemistry, BBAU, Lucknow, 25/12/13 to 26/12/13.

  6. Layered Based Classification for Various Attacks in Mobile Ad-Hoc Networks, 5th National Conference on Nanotechnology & Materials Science, organized by Department of Physics, University of Lucknow, 21/12/13 to 23/12/13.

  7. A paper presented and Published, Titled “Mitigating Blackhole Attack in MANET: A survey”, at SRMS, Bareilly, SEPT-2008.


3. Mr. Pawan K. Chaurasia

  1. Saxena, Vipin and Chaurasia, Pawan Kumar, IP Address Security through RSA, National Conference on Emerging Trends in Information/Network Security, 21st October, 2010, Organized by Amity Institute of Information Technology and Computer Society of India, Lucknow Chapter (2010).

4. Dr. Dhirendra Pandey

  1. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “Issues and Impact of Requirement Engineering Practices in Designing Quality Software Products”, Proc. of National Conference on Architecturing Future IT System, DAVV, Indore (MP), pp.44-46, 2008.

  2. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “Role of Interviews in Requirements Gathering”, Proc. of National Conference on Intelligent Computing and Information System, D. P. Vipra College, Bilaspur (CG), pp.26-31, 2009.

  3. Dhirendra Pandey, Ugrasen Suman and A. K. Ramani, “Design and Development of Requirements Specification Documents for Making Quality Software Products”, Proc. of National Conference on Intelligent Computing and Information System, D. P. Vipra College, Bilaspur (CG), pp.43-47, 2009.

  4. Dhirendra Pandey, “A Research on Confidence and security of information in E-commerce Transactions”, National Conference on ISPC’2007, Guru Ghasidas University, Bilaspur, 2007.

  5. Dhirendra Pandey, “The use of Public Key Encryption in secure information exchange on E-commerce Network”, National Conference on ISPC’2007, Guru Ghasidas University, Bilaspur, 2007.

  6. Dhirendra Pandey, “E-commerce Transactions”, National Conference on ISPC’2007, Guru Ghasidas University, Bilaspur, 2007.



Yüklə 3,69 Mb.

Dostları ilə paylaş:
1   ...   4   5   6   7   8   9   10   11   ...   36




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin