Proposed system for data hiding using cryptography and steganography proposed system for data hiding using cryptography and steganography DK Sarmah, N Bajpai arXiv preprint arXiv:1009.2826, 2010 | 107 | 2010 |
JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms DK Sarmah, AJ Kulkarni Information Sciences 430, 378-396, 2018 | 38 | 2018 |
Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography DKSAJ Kulkarni Journal of Information Security and Applications 45, 90-106, 2019 | 36 | 2019 |
Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods DK Sarmah, AJ Kulkarni Arabian Journal for Science and Engineering 43 (8), 3927-3950, 2018 | 31 | 2018 |
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains R Hoheisel, G van Capelleveen, DK Sarmah, M Junger Computers & Security 128, 103158, 2023 | 22 | 2023 |
A Survey on the latest development of Machine Learning in Genetic Algorithm and Particle Swarm Optimization DK Sarmah Optimization in Machine Learning and Applications, 91-112, 2020 | 14 | 2020 |
Optimization models in steganography using metaheuristics DK Sarmah, AJ Kulkarni, A Abraham Springer International Publishing, 2020 | 13 | 2020 |
The baseline of global consumer cyber security standards for IoT: quality evaluation KOGDK Sarmah Journal of Cyber Security Technology 6 (3), 1-26, 2022 | 11* | 2022 |
A new horizon in data security by Cryptography & Steganography DK Sarmah, N Bajpai International Journal of Computer Science and Information Technology 1 (4 …, 2010 | 10 | 2010 |
Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication B Oude Roelink, M El‐Hajj, D Sarmah Security and Privacy 7 (5), e401, 2024 | 7 | 2024 |
Automobile insurance fraud detection using data mining: A systematic literature review G Schrijver, DK Sarmah, M El-Hajj Intelligent Systems with Applications 21, 200340, 2024 | 7 | 2024 |
Cryptography and digital image steganography techniques DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ... Optimization Models in Steganography Using Metaheuristics, 33-48, 2020 | 7 | 2020 |
Heuristics and metaheuristic optimization algorithms DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ... Optimization Models in Steganography Using Metaheuristics, 49-61, 2020 | 6 | 2020 |
Multiphase and multiple encryption H Kaur, HPS Gill, D Sarmah 2018 IEEE Punecon, 1-8, 2018 | 6 | 2018 |
Defeating MageCart Attacks in a NAISS Way C Rus, D Sarmah, and ElHajj M. Proceedings of SECRYPT 2023, ISBN: 978-989-758-666-8, Proceedings of the …, 2023 | 5 | 2023 |
Web Application Performance Analysis based on Component Load Testing C Babbar, N Bajpai, DK Sarmah International Journal of Technology and Applied Science 2, 22-28, 2011 | 5 | 2011 |
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis I Haverkamp, DK Sarmah International Journal of Information Security 23 (4), 2607-2635, 2024 | 4 | 2024 |
Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations KD Michaylov, DK Sarmah Journal of Cyber Security Technology, 1-27, 2024 | 4 | 2024 |
A story-driven gamified education on USB-based attack V Rikkers, DK Sarmah Journal of Computing in Higher Education, 1-25, 2023 | 4 | 2023 |
Online protection for children using a developed parental monitoring tool M Stoev, DK Sarmah International Congress on Information and Communication Technology, 205-215, 2023 | 4 | 2023 |