Mohd. Rafiq’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


Design and Analysis of Modified Playfair Square Cipher Algorithm Using 10 By 9 Matrix With "N" Iteration Followed By "N" Substitutions
  • Article
  • Full-text available

December 2015

·

159 Reads

·

1 Citation

·

·

·

Mohd Rafiq
Download


Fig. 1 Targeted Clone Motor Centre website
Fig. 2 Total number of Columns in Database
Fig. 3 Total number of Vulnerable Columns in Database
Fig. 4 Database name and version of PHP Step 7: Get the total no of tables http://cloneemotorcentre.ie/faq2.php?id=15 union all select 1,group_concat(table_name),3,4,5,6,7from information_schema.tables-
Figure 9 Sample Code for filtration of unwanted inputs
Vulnerability assessment and patching management

October 2015

·

2,120 Reads

·

16 Citations


Citations (2)


... Vulnerability management is a multi-phase process, as shown in Figure 3. The overall aim of the process is to identify, measure, and classify vulnerabilities in systems, applications, and networks based on the risk they represent [51]. Vulnerability assessment is an integral part of the vulnerability management program. ...

Reference:

Analysis of Consumer IoT Device Vulnerability Quantification Frameworks
Vulnerability assessment and patching management

... Additionally, surveys that do take note of swarm intelligence-based software reliability prediction has only covered the popular swarm intelligence algorithms. Altaf et al. performed an analysis into the field of parameter estimation in software reliability and identified 12 different studies within the domain ranging from the 2004 to 2011 (Altaf et al., 2015). Their work covered a wide range of stochastic techniques including Two Parameter Distribution and swarm intelligence algorithms of Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO) and Cuckoo Search (CuS). ...

Survey on parameter estimation in software reliability