Why do firms adopt enterprise risk management (ERM)? Empirical evidence from France MJ Khan, D Hussain, W Mehmood Management Decision 54 (8), 1886-1907, 2016 | 116 | 2016 |
Breast cancer detection and classification using traditional computer vision techniques: a comprehensive review S Zahoor, IU Lali, MA Khan, K Javed, W Mehmood Current medical imaging 16 (10), 1187-1200, 2020 | 64 | 2020 |
Predicting the cricket match outcome using crowd opinions on social networks: A comparative study of machine learning methods RU Mustafa, MS Nawaz, MIU Lali, T Zia, W Mehmood Malaysian Journal of Computer Science 30 (1), 63-76, 2017 | 61 | 2017 |
A feature-centric spam email detection model using diverse supervised machine learning algorithms A Zamir, HU Khan, W Mehmood, T Iqbal, AU Akram The Electronic Library 38 (3), 633-657, 2020 | 35 | 2020 |
A survey of P2P content sharing in MANETs N Shah, SA Abid, D Qian, W Mehmood Computers & Electrical Engineering 57, 55-68, 2017 | 33 | 2017 |
Enforcing optimal ACL policies using K-partite graph in hybrid SDN R Amin, N Shah, W Mehmood Electronics 8 (6), 604, 2019 | 20 | 2019 |
Distributed partition detection with dynamic replication management in a DHT-based MANET S Zahid, SA Abid, N Shah, SHA Naqvi, W Mehmood IEEE Access 6, 18731-18746, 2018 | 18 | 2018 |
Risk Aware and Quality Enriched Effort Estimation for Mobile Applications in Distributed Agile Software Development. W Aslam, F Ijaz, MIU Lali, W Mehmood J. Inf. Sci. Eng. 33 (6), 1481-1500, 2017 | 18 | 2017 |
Security modeling for service-oriented systems using security pattern refinement approach M Memon, GD Menghwar, MH Depar, AA Jalbani, WM Mashwani Software & Systems Modeling 13, 549-572, 2014 | 16 | 2014 |
Leaf Blights Detection and Classification in Large Scale Applications. AM Fayyaz, KA Al-Dhlan, SU Rehman, M Raza, W Mehmood, M Shafiq, ... Intelligent Automation & Soft Computing 31 (1), 2022 | 15 | 2022 |
A comparative analysis of anomaly detection methods for predictive maintenance in SME M Qasim, M Khan, W Mehmood, F Sobieczky, M Pichler, B Moser International Conference on Database and Expert Systems Applications, 22-31, 2022 | 14 | 2022 |
A Fast Implementation of Minimum Spanning Tree Method and Applying it to Kruskal’s and Prim’s Algorithms B Munier, M Aleem, MA Islam, MA Iqbal, W Mehmood Sukkur IBA Journal of Computing and Mathematical Sciences 1 (1), 58-66, 2017 | 12 | 2017 |
Automatic identification of sarcasm in tweets and customer reviews F Naz, M Kamran, W Mehmood, W Khan, MS Alkatheiri, AS Alghamdi, ... Journal of Intelligent & Fuzzy Systems 37 (5), 6815-6828, 2019 | 10 | 2019 |
An evaluation of software measurement processes in pakistani software industry T Tahir, G Rasool, W Mehmood, C Gencel IEEE Access 6, 57868-57896, 2018 | 9 | 2018 |
Designing Healthcare Knowledge Management Systems–Development of an Integrated Component-Based KM Model for Effective Governance A Arshad, MFB Noordin, R Bint Othman, W Mehmood 2018 International Conference on Information and Communication Technology …, 2018 | 8 | 2018 |
CMMI Compliant Modernization Framework to Transform Legacy Systems. M Khan, I Ali, W Mehmood, W Nisar, W Aslam, M Shafiq, JG Choi Intelligent Automation & Soft Computing 27 (2), 2021 | 7 | 2021 |
An efficient and scalable routing for MANETs N Shah, A Ahmad, W Mehmood, D Qian, R Wang Wireless personal communications 75, 987-1004, 2014 | 6 | 2014 |
Modernization Framework to Enhance the Security of Legacy Information Systems. M Khan, I Ali, W Nisar, MQ Saleem, AS Ahmed, HE Elamin, W Mehmood, ... Intelligent Automation & Soft Computing 32 (1), 2022 | 5 | 2022 |
CMMI compliant workflow models to track and control changes I Ali, SM Ali, W Mehmood, W Nisar, MQ Saleem, MK Omer, M Niazi, ... Intelligent Automation & Soft Computing 31 (1), 387-405, 2022 | 4 | 2022 |
Fine-granular model merge solution for model-based version control system W Mehmood, N Shah, MJ Khan, M Memon, M Ikramullah Malaysian Journal of Computer Science 29 (3), 225-246, 2016 | 4 | 2016 |