Volgen
Dr Dipti Kapoor Sarmah
Dr Dipti Kapoor Sarmah
Faculty of EEMCS, Services, Cyber Security and Safety(SCS)
Geverifieerd e-mailadres voor utwente.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Proposed system for data hiding using cryptography and steganography
DK Sarmah, N Bajpai
International Journal of Computer Applications 8 (9), 7-10, 2010
1702010
JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms
DK Sarmah, AJ Kulkarni
Information Sciences 430, 378-396, 2018
352018
Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography
DKSAJ Kulkarni
Journal of Information Security and Applications 45, 90-106, 2019
342019
Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods
DK Sarmah, AJ Kulkarni
Arabian Journal for Science and Engineering 43 (8), 3927-3950, 2018
302018
Optimization models in steganography using metaheuristics
DK Sarmah, AJ Kulkarni, A Abraham
Springer International Publishing, 2020
122020
A new horizon in data security by Cryptography & Steganography
DK Sarmah, N Bajpai
International Journal of Computer Science and Information Technology 1 (4 …, 2010
112010
A Survey on the latest development of Machine Learning in Genetic Algorithm and Particle Swarm Optimization
DK Sarmah
Optimization in Machine Learning and Applications, 91-112, 2020
92020
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains
R Hoheisel, G van Capelleveen, DK Sarmah, M Junger
Computers & Security 128, 103158, 2023
62023
The baseline of global consumer cyber security standards for IoT: quality evaluation
KOGDK Sarmah
Journal of Cyber Security Technology 6 (3), 1-26, 2022
6*2022
Cryptography and digital image steganography techniques
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 33-48, 2020
62020
Multiphase and multiple encryption
H Kaur, HPS Gill, D Sarmah
2018 IEEE Punecon, 1-8, 2018
62018
Heuristics and metaheuristic optimization algorithms
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 49-61, 2020
52020
Smart traffic light controlling and violation detection system using digital image processing
BM Gebregeorgis, DK Sarmah
International Journal of Engineering Research 4 (2), 520-529, 2016
52016
Web Application Performance Analysis based on Component Load Testing
C Babbar, N Bajpai, DK Sarmah
International Journal of Technology and Applied Science 2, 22-28, 2011
52011
Cryptography algorithm based on cohort intelligence
DK Sarmah, IR Kale
Proceedings of the 2nd International Conference on Data Engineering and …, 2019
32019
A story-driven gamified education on USB-based attack
V Rikkers, DK Sarmah
Journal of Computing in Higher Education, 1-25, 2023
22023
Steganalysis on All Approaches/Vulnerability Analysis of Stego Image (s)
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 147-161, 2020
22020
Improved Cohort Intelligence Optimization Algorithm (Approach 4)
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 123-145, 2020
12020
NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce
AC Rus, M El-Hajj, DK Sarmah
Computers & Security 140, 103797, 2024
2024
Automobile Insurance Fraud Detection Using Data Mining: A Systematic Literature Review
G Schrijver, DK Sarmah, M El-hajj
Intelligent Systems with Applications, 200340, 2024
2024
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20