Follow
Dr. Alka Agrawal
Dr. Alka Agrawal
Assistant Professor, Department of Information Technology, Babasaheb Bhimrao Ambedkar University
Verified email at bbau.ac.in
Title
Cited by
Cited by
Year
Healthcare data breaches: insights and implications
AH Seh, M Zarour, M Alenezi, AK Sarkar, A Agrawal, R Kumar, ...
Healthcare 8 (2), 133, 2020
3882020
Evaluating the impact of blockchain models for secure and trustworthy electronic healthcare records
M Zarour, MTJ Ansari, M Alenezi, AK Sarkar, M Faizan, A Agrawal, ...
IEEE Access 8, 157959-157973, 2020
1142020
Key issues in healthcare data integrity: Analysis and recommendations
AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ...
IEEE Access 8, 40612-40628, 2020
902020
A systematic analysis on blockchain integration with healthcare domain: scope and challenges
S Khatri, FA Alzahrani, MTJ Ansari, A Agrawal, R Kumar, RA Khan
IEEE Access 9, 84666-84687, 2021
772021
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development
MTJ Ansari, FA Al-Zahrani, D Pandey, A Agrawal
BMC Medical Informatics and Decision Making 20, 1-13, 2020
772020
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications
R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan
IEEE Access 8, 50944-50957, 2020
742020
Ensuring data integrity of healthcare information in the era of digital health
M Zarour, M Alenezi, MTJ Ansari, AK Pandey, M Ahmad, A Agrawal, ...
Healthcare Technology Letters 8 (3), 66-77, 2021
642021
A study of big data characteristics
G Kapil, A Agrawal, RA Khan
2016 international conference on communication and electronics systems …, 2016
622016
A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications
R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan
IEEE Access 8, 48870-48885, 2020
582020
Measuring security durability of software through fuzzy-based decision-making process
R Kumar, M Zarour, M Alenezi, A Agrawal, RA Khan
International Journal of Computational Intelligence Systems 12 (2), 627-642, 2019
562019
Security issues in fog environment: a systematic literature review
J Kaur, A Agrawal, RA Khan
International Journal of Wireless Information Networks 27, 467-483, 2020
552020
Ransomware: evolution, target and safety measures
AK Maurya, N Kumar, A Agrawal, RA Khan
International Journal of Computer Sciences and Engineering 6 (1), 80-85, 2018
512018
Evaluating performance of software durability through an integrated fuzzy-based symmetrical method of ANP and TOPSIS
SA Khan, M Alenezi, A Agrawal, R Kumar, RA Khan
Symmetry 12 (4), 493, 2020
502020
Measuring the sustainable-security of Web applications through a fuzzy-based integrated approach of AHP and TOPSIS
A Agrawal, M Alenezi, R Kumar, RA Khan
IEEE Access 7, 153936-153951, 2019
492019
Evaluating performance of Web application security through a fuzzy based hybrid multi-criteria decision-making approach: Design tactics perspective
M Alenezi, A Agrawal, R Kumar, RA Khan
IEEE Access 8, 25543-25556, 2020
452020
Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security
R Kumar, AK Pandey, A Baz, H Alhakami, W Alhakami, A Agrawal, ...
Symmetry 12 (4), 664, 2020
442020
Multi-level fuzzy system for usable-security assessment
A Agrawal, M Alenezi, SA Khan, R Kumar, RA Khan
Journal of King Saud University-Computer and Information Sciences 34 (3 …, 2022
432022
Software security estimation using the hybrid fuzzy ANP-TOPSIS approach: Design tactics perspective
A Agrawal, AH Seh, A Baz, H Alhakami, W Alhakami, M Baz, R Kumar, ...
Symmetry 12 (4), 598, 2020
392020
A multi-perspective benchmarking framework for estimating usable-security of hospital management system software based on fuzzy logic, ANP and TOPSIS methods
R Kumar, MTJ Ansari, A Baz, H Alhakami, A Agrawal, RA Khan
KSII Transactions on Internet and Information Systems (TIIS) 15 (1), 240-263, 2021
372021
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
G Kapil, A Agrawal, A Attaallah, A Algarni, R Kumar, RA Khan
PeerJ Computer Science 6, e259, 2020
372020
The system can't perform the operation now. Try again later.
Articles 1–20