| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2024 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2022 | J | jnl |
A Survey of the Software Test Methods and Identification of Critical Success Factors for Automation.
SN Comput. Sci.
|
| 2022 | J | jnl |
Int. J. Bus. Inf. Syst.
|
| 2021 | J | jnl |
Int. J. Commun. Syst.
|
| 2020 | J | jnl |
Int. J. Adv. Intell. Paradigms
|
| 2019 | J | jnl |
Int. J. Intell. Syst. Technol. Appl.
|
| 2019 | J | jnl |
Comput. Electr. Eng.
|
| 2018 | J | jnl |
Int. J. Intell. Syst. Technol. Appl.
|
| 2018 | J | jnl |
Int. J. Bus. Inf. Syst.
|
| 2016 | — | conf |
FICTA (2)
|
| 2016 | — | conf |
FICTA (2)
|
| 2016 | — | conf |
FICTA (2)
|
| 2016 | — | conf |
WIR
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
FICTA (2)
|
| 2014 | — | conf |
FICTA (2)
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
FICTA (2)
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
FICTA (2)
|
| 2014 | — | conf |
FICTA (1)
|
| 2014 | — | conf |
FICTA (2)
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2013 | — | conf |
ICACCI
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | C | conf |
ISI
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
IET Softw.
|
| 2011 | J | jnl |
CoRR
|
| 2010 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2010 | J | jnl |
CoRR
|
| 2010 | J | jnl |
CoRR
|
| 2010 | J | jnl |
CoRR
|
| 2010 | J | jnl |
CoRR
|
| 2008 | C | conf |
ICSEA
|