Follow
Huda Fatima
Huda Fatima
Verified email at jazanu.edu.sa
Title
Cited by
Cited by
Year
Applying data mining techniques in cyber crimes
MA Khan, SK Pradhan, H Fatima
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 213-216, 2017
282017
Dynamic web service composition with QoS clustering
AK Tripathy, MR Patra, MA Khan, H Fatima, P Swain
2014 IEEE International Conference on Web Services, 678-679, 2014
222014
Survey on reverse-engineering tools for android mobile devices
A Albakri, H Fatima, M Mohammed, A Ahmed, A Ali, A Ali, NM Elzein
Mathematical Problems in Engineering 2022, 1-7, 2022
162022
Potentialities and priorities for higher educational development in Saudi Arabia for the next decade: Critical reflections of the vision 2030 framework
K Mohiuddin, OA Nasr, MN Miladi, H Fatima, S Shahwar, QN Naveed
Heliyon 9 (5), 2023
92023
Enhanced algorithmic modelling and architecture in deep reinforcement learning based on wireless communication Fintech technology
K Upreti, MH Syed, MA Khan, H Fatima, MS Alam, AK Sharma
Optik 272, 170309, 2023
82023
Data fusion & visualization application for network forensic investigation-a case study
H Fatima, S Satpathy, S Mahapatra, GN Dash, SK Pradhan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 252-256, 2017
82017
Mobile learning evolution and emerging computing paradigms: An edge-based cloud architecture for reduced latencies and quick response time
K Mohiuddin, H Fatima, MA Khan, MA Khaleel, OA Nasr, S Shahwar
Array 16, 100259, 2022
62022
An efficient technique for Apriori algorithm in medical data mining
MA Khan, SK Pradhan, H Fatima
Innovations in Computer Science and Engineering: Proceedings of the Fifth …, 2019
52019
Soft Computing applications in Cyber crimes
H Fatima, GN Dash, SK Pradhan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 66-69, 2017
32017
Information security: Artificial immune detectors in neural networks
H Fatima, SM Al-Turki, SK Pradhan, GN Dash
2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015
32015
Applying data mining techniques in business intelligence
MA Khan, SK Pradhan, H Fatima
International Journal of Computer Science and Information Security 14 (11), 699, 2016
12016
Deployment of Intelligent Agents in Cognitive Networks
H Fatima, S Pradhan, MA Khan, GN Dash
International Journal of Computer Science and Information Security 8 (6), 2010
12010
Design of a Novel Edge-Centric Cloud Architecture for m-Learning Performance Effectiveness by Leveraging Distributed Computing Paradigms’ Potentials
K Mohiuddin, H Fatima, MA Khan, MA Khaleel, Z Begum, SA Khan, ...
SAGE Open 13 (3), 21582440231190337, 2023
2023
Survey on Reverse-Engineering Tools for Android Mobile Devices
HF Ashwag Bakri
Hindawi, 2022
2022
Determining Mobile Learning Potentialities in Emerging Computing Paradigms: an Exploratory Approach for Performance Optimization
K Mohiuddin, MA Islam, MA Khaleel, MN Miladi, OA Nasr, SA Khan, ...
2021
The system can't perform the operation now. Try again later.
Articles 1–15