Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model IH Sarker, A Colman, J Han, AI Khan, YB Abushark, K Salah Mobile Networks and Applications 25 (3), 1151-1161, 2020 | 21 | 2020 |
IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model IH Sarker, YB Abushark, F Alsolami, AI Khan Symmetry 12 (5), 754, 2020 | 16 | 2020 |
An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 50944-50957, 2020 | 14 | 2020 |
Checking consistency of agent designs against interaction protocols for early-phase defect location Y Abushark, J Thangarajah, T Miller, J Harland 13th International Joint Conference on Autonomous Agents and Multiagent …, 2014 | 14 | 2014 |
A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 48870-48885, 2020 | 13 | 2020 |
Early detection of design faults relative to requirement specifications in agent-based models Y Abushark, J Thangarajah, T Miller, J Harland, M Winikoff AAMAS 2015, 1073-1079, 2015 | 12 | 2015 |
ContextPCA: Predicting Context-Aware Smartphone Apps Usage Based On Machine Learning Techniques IH Sarker, YB Abushark, AI Khan Symmetry 12 (4), 499, 2020 | 9 | 2020 |
Key Issues in Healthcare Data Integrity: Analysis and Recommendations AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ... IEEE Access 8, 40612-40628, 2020 | 9 | 2020 |
Requirements specification via activity diagrams for agent-based systems Y Abushark, T Miller, J Thangarajah, M Winikoff, J Harland Autonomous Agents and Multi-Agent Systems 31 (3), 423-468, 2017 | 8 | 2017 |
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling IH Sarker, H Alqahtani, F Alsolami, AI Khan, YB Abushark, MK Siddiqui Journal of Big Data 7 (1), 1-23, 2020 | 4 | 2020 |
Security Risk Assessment of Healthcare Web Application Through Adaptive Neuro-Fuzzy Inference System: A Design Perspective J Kaur, AI Khan, YB Abushark, MM Alam, SA Khan, A Agrawal, R Kumar, ... Risk Management and Healthcare Policy 13, 355, 2020 | 3 | 2020 |
A framework for automatically ensuring the conformance of agent designs Y Abushark, J Thangarajah, J Harland, T Miller Journal of Systems and Software 131, 266-310, 2017 | 2 | 2017 |
Checking the correctness of agent designs against model-based requirements Y Abushark, M Winikoff, T Miller, J Harland, J Thangarajah Proceedings of the Twenty-first European Conference on Artificial …, 2014 | 2 | 2014 |
AUML protocols: from specification to detailed design Y Abushark, J Thangarajah AAMAS 2013, 1173-1174, 2013 | 2 | 2013 |
Propagating AUML protocols to detailed design Y Abushark, J Thangarajah International Workshop on Engineering Multi-Agent Systems, 19-37, 2013 | 1 | 2013 |
A systematic approach for detecting faults in agent designs Y Abushark | | 2017 |
A Systematic Approach for Detecting Defects in Agent Designs: (Doctoral Consortium) Y Abushark Proceedings of the 2016 International Conference on Autonomous Agents …, 2016 | | 2016 |
Requirements specification in the Prometheus methodology via activity diagrams Y Abushark, J Thangarajah, T Miller, M Winikoff, J Harland AAMAS 2016, 1247-1248, 2016 | | 2016 |