Volgen
Dr Dipti Kapoor Sarmah
Dr Dipti Kapoor Sarmah
Faculty of EEMCS, Services, Cyber Security and Safety(SCS)
Geverifieerd e-mailadres voor utwente.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Proposed system for data hiding using cryptography and steganography
DK Sarmah, N Bajpai
International Journal of Computer Applications 8 (9), 7-10, 2010
1722010
Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography
DKSAJ Kulkarni
Journal of Information Security and Applications 45, 90-106, 2019
372019
JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms
DK Sarmah, AJ Kulkarni
Information Sciences 430, 378-396, 2018
352018
Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods
DK Sarmah, AJ Kulkarni
Arabian Journal for Science and Engineering 43 (8), 3927-3950, 2018
302018
Optimization models in steganography using metaheuristics
DK Sarmah, AJ Kulkarni, A Abraham
Springer International Publishing, 2020
122020
A new horizon in data security by Cryptography & Steganography
DK Sarmah, N Bajpai
International Journal of Computer Science and Information Technology 1 (4 …, 2010
112010
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains
R Hoheisel, G van Capelleveen, DK Sarmah, M Junger
Computers & Security 128, 103158, 2023
102023
A Survey on the latest development of Machine Learning in Genetic Algorithm and Particle Swarm Optimization
DK Sarmah
Optimization in Machine Learning and Applications, 91-112, 2020
102020
The baseline of global consumer cyber security standards for IoT: quality evaluation
KOGDK Sarmah
Journal of Cyber Security Technology 6 (3), 1-26, 2022
7*2022
Heuristics and metaheuristic optimization algorithms
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 49-61, 2020
62020
Cryptography and digital image steganography techniques
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 33-48, 2020
62020
Multiphase and multiple encryption
H Kaur, HPS Gill, D Sarmah
2018 IEEE Punecon, 1-8, 2018
62018
Smart traffic light controlling and violation detection system using digital image processing
BM Gebregeorgis, DK Sarmah
International Journal of Engineering Research 4 (2), 520-529, 2016
62016
Web Application Performance Analysis based on Component Load Testing
C Babbar, N Bajpai, DK Sarmah
International Journal of Technology and Applied Science 2, 22-28, 2011
52011
Cryptography algorithm based on cohort intelligence
DK Sarmah, IR Kale
Proceedings of the 2nd International Conference on Data Engineering and …, 2019
32019
Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations
KD Michaylov, DK Sarmah
Journal of Cyber Security Technology, 1-27, 2024
22024
A story-driven gamified education on USB-based attack
V Rikkers, DK Sarmah
Journal of Computing in Higher Education, 1-25, 2023
22023
Defeating MageCart Attacks in a NAISS Way
C Rus, D Sarmah, and ElHajj M.
Proceedings of SECRYPT 2023, ISBN: 978-989-758-666-8, Proceedings of the …, 2023
22023
Steganalysis on All Approaches/Vulnerability Analysis of Stego Image (s)
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 147-161, 2020
22020
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks
J Tan, DK Sarmah
International Symposium on Cyber Security, Cryptology, and Machine Learning …, 2023
12023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20