Dr. Dhirendra Pandey
Dr. Dhirendra Pandey
Department of Information Technology, Babasaheb Bhimrao Ambdedkar University
Verified email at - Homepage
Cited by
Cited by
An effective requirement engineering process model for software development and requirements management
D Pandey, U Suman, AK Ramani
2010 International Conference on Advances in Recent Technologies in …, 2010
STORE: Security threat oriented requirements engineering methodology
MTJ Ansari, D Pandey, M Alenezi
Journal of King Saud University-Computer and Information Sciences 34 (2 …, 2022
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development
MTJ Ansari, FA Al-Zahrani, D Pandey, A Agrawal
BMC Medical Informatics and Decision Making 20, 1-13, 2020
The role of information communication technology (ICT) in agriculture
V Singh, S Sankhwar, D Pandey
Global Journal of Multidisciplinary Studies 3 (4), 2-10, 2015
Development of the Asia Pacific Consortium on Osteoporosis (APCO) Framework: clinical standards of care for the screening, diagnosis, and management of osteoporosis in the Asia …
M Chandran, PJ Mitchell, T Amphansap, SK Bhadada, M Chadha, ...
Osteoporosis International 32, 1249-1275, 2021
Importance of requirement management: A requirement engineering concern
D Pandey, V Pandey
International Journal of Research and Development-A Management Review …, 2012
RSA based encryption approach for preserving confidentiality of big data
SKD Kanika Sharma , Alka Agrawal , Dhirendra Pandey , R.A. Khan
Journal of King Saud University – Computer and Information Sciences, 2019
The evaluation of software security through quantum computing techniques: A durability perspective
H Alyami, M Nadeem, A Alharbi, W Alosaimi, MTJ Ansari, D Pandey, ...
Applied Sciences 11 (24), 11784, 2021
A framework for modelling software requirements
D Pandey, U Suman, AK Ramani
International Journal of Computer Science Issues (IJCSI) 8 (3), 164, 2011
A safeguard against ATM fraud
S Sankhwar, D Pandey
2016 IEEE 6th International Conference on Advanced Computing (IACC), 701-705, 2016
Risks, security, and privacy for HIV/AIDS data: big data perspective
MTJ Ansari, D Pandey
Big Data Analytics in HIV/AIDS Research, 117-139, 2018
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation.
TJ Ansari, D Pandey
International Journal of Advanced Research in Computer Science 8 (3), 2017
Effectiveness evaluation of different IDSs using integrated fuzzy MCDM model
H Alyami, MTJ Ansari, A Alharbi, W Alosaimi, M Alshammari, D Pandey, ...
Electronics 11 (6), 859, 2022
Social-organizational participation difficulties in requirement engineering process: A study
D Pandey, U Suman, AK Ramani
Software Engineering 1 (1), 1, 2010
GIS: scope and benefits
D Pandey, AK Shukla, A Shukla
International Conference on Advances in Engineering and Technology, 60-65, 2013
Security requirement engineering issues in risk management
D Pandey, U Suman, AK Ramani
International Journal of Computer Applications 17 (5), 12-14, 2011
E-commerce transactions: An empirical study
D Pandey, V Agarwal
International journal of advanced research in computer science and software …, 2014
Email phishing: an enhanced classification model to detect malicious urls
S Sankhwar, D Pandey, RA Khan
EAI Endorsed Transactions on Scalable Information Systems 6 (21), e5-e5, 2019
An anti‐phishing enterprise environ model using feed‐forward backpropagation and Levenberg‐Marquardt method
S Sankhwar, D Pandey, RA Khan, SN Mohanty
Security and Privacy 4 (1), e132, 2021
Requirement engineering paradigm
S Sankhwar, V Singh, D Pandey
Global Journal of Multidisciplinary Studies 3 (3), 1-8, 2014
The system can't perform the operation now. Try again later.
Articles 1–20