Dr. Dhirendra Pandey
Babasaheb Bhimrao Ambedkar University
H-index: 17
Asia-India
Top articles of Dr. Dhirendra Pandey
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Lean Start-Up Procedure for Optimized Heavy Oil Well Operations | M Alfoudari M Johar Y Al-Naqi SB Khan D Pandey | 2024/4/22 | |
A fuzzy TOPSIS-based approach for comprehensive evaluation of bio-medical waste management: advancing sustainability and decision-making | Sustainability | Khalil al-Sulbi Pawan Kumar Chaurasia Abdulaziz Attaallah Alka Agrawal Dhirendra Pandey | 2023/8/18 |
A Fusion of VANETs and IoT for Intelligent and Secure Communication | Ashwani Kant Shukla Raj Shree Dhirendra Pandey Vivek Shukla Ravi Prakash Pandey | 2023 | |
Security Test Case Prioritization through Ant Colony Optimization Algorithm | Computer Systems Science & Engineering | Abdulaziz Attaallah Khalil al-Sulbi Areej Alasiry Mehrez Marzougui Mohd Waris Khan | 2023/12/1 |
Integrating IoT with cloud computing and big data analytics: Security perspective | AIP Conference Proceedings | Swati Arya Sujit Kumar Dwivedi Syed Anas Ansar Kanika Sharma Dhirendra Pandey | 2023/11/29 |
An investigation with emerging issues and preventive measures: Cloud computing perspective | AIP Conference Proceedings | Sujit Kumar Dwivedi Jaya Yadav Syed Anas Ansar Mohd Khan Dhirendra Pandey | 2023/11/21 |
STORE: Security threat oriented requirements engineering methodology | Journal of King Saud University-Computer and Information Sciences | Md Tarique Jamal Ansari Dhirendra Pandey Mamdouh Alenezi | 2022/2/1 |
Ransomware-Threats, Vulnerabilities, and Targets in Cloud Environment | NeuroQuantology | Sujit Kumar Dwivedi Ali Wahid Rizwan Ahmed Khan Mohd Waris Khan Mohammad Ishrat | 2022 |
Study of requirements engineering process model | IJRAR–International Journal of Research and Analytical Reviews (IJRAR) | Brijesh Kumar D Pandey | 2022 |
A novel paradigm: cloud-fog integrated IoT approach | Sujit Kumar Dwivedi Jaya Yadav Syed Anas Ansar Mohd Waris Khan Dhirendra Pandey | 2022/11/15 | |
Security Introspection for Software Reuse | Sheleshma Shukla Dhirendra Pandey | 2022 | |
An empirical investigation to understand the issues of distributed software testing amid COVID-19 pandemic | Processes | Abdullah Alharbi Md Tarique Jamal Ansari Wael Alosaimi Hashem Alyami Majid Alshammari | 2022/4/24 |
Paradigms of smart education with IoT approach | Internet of Things and its applications | Dhirendra Pandey Neha Singh Virendra Singh Mohd Waris Khan | 2022 |
Effectiveness evaluation of different IDSs using integrated fuzzy MCDM model | Electronics | Hashem Alyami Md Tarique Jamal Ansari Abdullah Alharbi Wael Alosaimi Majid Alshammari | 2022/3/9 |
The evaluation of software security through quantum computing techniques: A durability perspective | Applied Sciences | Hashem Alyami Mohd Nadeem Abdullah Alharbi Wael Alosaimi Md Tarique Jamal Ansari | 2021/12/11 |
A Fuzzy Multi-Criteria Decision-Making Method for Managing Network Security Risk Perspective | Suhel Ahmad Khan Waris Khan Dhirendra Pandey | 2021 | |
Identifying Factors towards Cyberbullying | Webology (ISSN: 1735-188X) | Manish Joshi Dhirendra Pandey | 2021 |
An anti‐phishing enterprise environ model using feed‐forward backpropagation and Levenberg‐Marquardt method | Security and Privacy | Shweta Sankhwar Dhirendra Pandey Raees Ahmad Khan Sachi Nandan Mohanty | 2021/1 |
A Mathematical Model for Improving Model-Based Testing Approach in Agile Software Development | Webology (ISSN: 1735-188X) | Sandhya Satyarthi Dhirendra Pandey | 2021 |
Adaptation of Digital Twins as a methodology for management and development of Secure Software Systems | NeuroQuantology | Sandhya Satyarthi Dhirendra Pandey Mohd Waris Khan | 2021 |