Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Email: Received: 06 January 2021 Accepted: 06 February 2021Ībstract: Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Abushark 1, Asif Irshad Khan 1, *, Fawaz Jaber Alsolami 1, Abdulmohsen Almalawi 1, Md Mottahir Alam 2, Alka Agrawal 3, Rajeev Kumar 3, 4 and Raees Ahmad Khan 3ġDepartment of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia 2Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589, Saudi Arabia 3Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India 4Department of Computer Application, Shri Ramswaroop Memorial University, Barabanki, 225003, India *Corresponding Author: Asif Irshad Khan. Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective Computers, Materials & Continua DOI:10.32604/cmc.2021.016610
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |