Methodological study of opinion mining and sentiment analysis techniques PK Singh, MS Husain International Journal on Soft Computing 5 (1), 11, 2014 | 137 | 2014 |
Critical Concepts, Standards, and Techniques in Cyber Forensics MS Husain, MZ Khan IGI Global, 2019 | 61* | 2019 |
An Unsupervised Approach to Develop a Stemmer MS Husain International Journal on Natural Language Computing (IJNLC) 1 (2), 15-23, 2012 | 35 | 2012 |
Pervasive Healthcare: A Compendium of Critical Factors for Success MS Husain, MHBM Adnan, MZ Khan, S Shukla, FU Khan Springer International Publishing AG, 2022 | 29* | 2022 |
Application of artificial intelligence in fighting against cyber crimes: a review MZ Siddiqui, S Yadav, MS Husain Int. J. Adv. Res. Comput. Sci 9 (2), 118-122, 2018 | 26 | 2018 |
Analysis of mental state of users using social media to predict depression! a survey A Khan, MS Husain, A Khan International Journal of Advanced Research in Computer Science 9 (2), 100-106, 2018 | 24 | 2018 |
A Compendium Over Cloud Computing Cryptographic Algorithms and Security Issues Neha Mishra, M Shahid Husain, Jitesh P Tripathi BIJIT - BVICAM’s International Journal of Information Technology 7 (1), 810-814, 2015 | 20* | 2015 |
Different technique of load balancing in distributed system: A review paper HM M Shahid Husain, Khan Riyaz Global Conference on Communication Technologies (GCCT), 2015, 371-375, 2015 | 19 | 2015 |
Advances in Cyberology and the Advent of the Next-Gen Information Revolution MS Husain, M Faisal, H Sadia, T Ahmad, S Shukla IGI Global., 2023 | 17* | 2023 |
Big Data Classification using Evolutionary Techniques: A Survey N Khan, M S Husain, M R Beg IEEE International Conference on Engineering and Technology (ICETECH), 243-247, 2015 | 15 | 2015 |
Analytical study of feature extraction techniques in opinion mining PK Singh, MS Husain Computer Science, 2013 | 15 | 2013 |
A language Independent Approach to develop Urdu stemmer MS Husain, F Ahamad, S Khalid Advances in Computing and Information Technology: Proceedings of the Second …, 2013 | 14 | 2013 |
Word Sense Ambiguity: A Survey MS Husain, MR Beg International Journal of Computer & Information Technology 2 (6), 1161-1168, 2013 | 12 | 2013 |
Nature inspired approach for intrusion detection systems MS Husain Design and analysis of security protocol for communication, 171-182, 2020 | 11 | 2020 |
Social media Analytics to predict depression level in the users MS Husain Early Detection of Neurological Disorders Using Machine Learning Systems …, 2019 | 10 | 2019 |
Analysis of security challenges in vehicular adhoc network N Siddiqui, MS Husain, M Akbar the proceedings of international conference on advancement in computer …, 2016 | 10 | 2016 |
Advances in Ambiguity less NL SRS: A review M S Husain, M R Beg IEEE International Conference on Engineering and Technology (ICETECH), 221-225, 2015 | 10* | 2015 |
Security in Digital Healthcare System MM Tripathi, M Haroon, Z Khan, MS Husain Pervasive Healthcare: A Compendium of Critical Factors for Success, 217-231, 2022 | 9 | 2022 |
Analysis of DDOS attack detection and prevention in cloud environment: A review A Verma, M Arif, MS Husain International Journal of Advanced Research in Computer Science 9 (0), 107-113, 2018 | 9 | 2018 |
A Social Media Analytics Framework to Increase Prospective Students’ Interests in STEM and TVET Education MHM Adnan, SA Ariffin, HF Hanafi, MS Husain, IY Panessai Asian Journal of University Education 16 (4), 82-90, 2021 | 8 | 2021 |