Volgen
Dr Dipti Kapoor Sarmah
Dr Dipti Kapoor Sarmah
Faculty of EEMCS, Services, Cyber Security and Safety(SCS)
Geverifieerd e-mailadres voor utwente.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Proposed system for data hiding using cryptography and steganography proposed system for data hiding using cryptography and steganography
DK Sarmah, N Bajpai
arXiv preprint arXiv:1009.2826, 2010
1072010
JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms
DK Sarmah, AJ Kulkarni
Information Sciences 430, 378-396, 2018
382018
Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography
DKSAJ Kulkarni
Journal of Information Security and Applications 45, 90-106, 2019
362019
Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods
DK Sarmah, AJ Kulkarni
Arabian Journal for Science and Engineering 43 (8), 3927-3950, 2018
312018
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains
R Hoheisel, G van Capelleveen, DK Sarmah, M Junger
Computers & Security 128, 103158, 2023
222023
A Survey on the latest development of Machine Learning in Genetic Algorithm and Particle Swarm Optimization
DK Sarmah
Optimization in Machine Learning and Applications, 91-112, 2020
142020
Optimization models in steganography using metaheuristics
DK Sarmah, AJ Kulkarni, A Abraham
Springer International Publishing, 2020
132020
The baseline of global consumer cyber security standards for IoT: quality evaluation
KOGDK Sarmah
Journal of Cyber Security Technology 6 (3), 1-26, 2022
11*2022
A new horizon in data security by Cryptography & Steganography
DK Sarmah, N Bajpai
International Journal of Computer Science and Information Technology 1 (4 …, 2010
102010
Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication
B Oude Roelink, M El‐Hajj, D Sarmah
Security and Privacy 7 (5), e401, 2024
72024
Automobile insurance fraud detection using data mining: A systematic literature review
G Schrijver, DK Sarmah, M El-Hajj
Intelligent Systems with Applications 21, 200340, 2024
72024
Cryptography and digital image steganography techniques
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 33-48, 2020
72020
Heuristics and metaheuristic optimization algorithms
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 49-61, 2020
62020
Multiphase and multiple encryption
H Kaur, HPS Gill, D Sarmah
2018 IEEE Punecon, 1-8, 2018
62018
Defeating MageCart Attacks in a NAISS Way
C Rus, D Sarmah, and ElHajj M.
Proceedings of SECRYPT 2023, ISBN: 978-989-758-666-8, Proceedings of the …, 2023
52023
Web Application Performance Analysis based on Component Load Testing
C Babbar, N Bajpai, DK Sarmah
International Journal of Technology and Applied Science 2, 22-28, 2011
52011
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
I Haverkamp, DK Sarmah
International Journal of Information Security 23 (4), 2607-2635, 2024
42024
Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations
KD Michaylov, DK Sarmah
Journal of Cyber Security Technology, 1-27, 2024
42024
A story-driven gamified education on USB-based attack
V Rikkers, DK Sarmah
Journal of Computing in Higher Education, 1-25, 2023
42023
Online protection for children using a developed parental monitoring tool
M Stoev, DK Sarmah
International Congress on Information and Communication Technology, 205-215, 2023
42023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20