A comparative study of moodle with other e-learning systems S Kumar, AK Gankotiya, K Dutta 2011 3rd International Conference on Electronics Computer Technology 5, 414-418, 2011 | 236 | 2011 |
Neural network based models for software effort estimation: a review VS Dave, K Dutta Artificial Intelligence Review 42 (2), 295-307, 2014 | 177 | 2014 |
A survey on various threats and current state of security in android platform P Bhat, K Dutta ACM Computing Surveys (CSUR) 52 (1), 1-35, 2019 | 101 | 2019 |
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges S Kumar, K Dutta Security and Communication Networks 9 (14), 2484-2556, 2016 | 96 | 2016 |
Investigation on security in lms moodle S Kumar, K Dutta International Journal of Information Technology and Knowledge Management 4 …, 2011 | 78 | 2011 |
Hybrid algorithm to detect DDoS attacks in VANETs K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications 114 (4), 3613-3634, 2020 | 70 | 2020 |
A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning P Bhat, S Behal, K Dutta Computers & Security 130, 103277, 2023 | 58 | 2023 |
A cloud based software testing paradigm for mobile applications S Baride, K Dutta ACM SIGSOFT Software Engineering Notes 36 (3), 1-4, 2011 | 53 | 2011 |
Architectural space planning using evolutionary computing approaches: a review K Dutta, S Sarthak Artificial Intelligence Review 36 (4), 311-321, 2011 | 51 | 2011 |
A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment V Katiyar, K Dutta, S Gupta International Journal of Computer Applications (0975-8887) 11 (10), 41-46, 2010 | 49 | 2010 |
Prediction of deviator stress of sand reinforced with waste plastic strips using neural network RK Dutta, K Dutta, S Jeevanandham International Journal of Geosynthetics and Ground Engineering 1, 1-12, 2015 | 37 | 2015 |
Machine learning approach for the classification of demonstrative pronouns for Indirect Anaphora in Hindi News Items K Dutta, S Kaushik, N Prakash The Prague Bulletin of Mathematical Linguistics 95, 33, 2011 | 37 | 2011 |
Resolving pronominal anaphora in hindi using hobbs algorithm K Dutta, N Prakash, S Kaushik Web Journal of Formal Computation and Cognitive Linguistics 1 (10), 5607-11, 2008 | 36 | 2008 |
A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain P Bhat, K Dutta Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 34 | 2022 |
Incremental development & revolutions of E-learning software systems in education sector: a case study approach V Gupta, DS Chauhan, K Dutta Human-centric Computing and Information Sciences 3, 1-14, 2013 | 32 | 2013 |
Security issues in mobile agents P Dadhich, K Dutta, MC Govil International Journal of Computer Applications 11 (4), 1-7, 2010 | 32 | 2010 |
Comparison of regression model, feed-forward neural network and radial basis neural network for software development effort estimation VS Dave, K Dutta ACM SIGSOFT Software Engineering Notes 36 (5), 1-5, 2011 | 26 | 2011 |
Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks S Kumar, K Dutta Wireless Personal Communications 101, 2029-2052, 2018 | 23 | 2018 |
LDAT: LFTM based data aggregation and transmission protocol for wireless sensor networks M Kumar, K Dutta Journal of Trust Management 3, 1-20, 2016 | 23 | 2016 |
A comprehensive review on feature set used for anaphora resolution K Lata, P Singh, K Dutta Artificial Intelligence Review 54, 2917-3006, 2021 | 22 | 2021 |