A survey on implementation of lightweight block ciphers for resource constraints devices Nayancy, S Dutta, S Chakraborty Journal of Discrete Mathematical Sciences and Cryptography 25 (5), 1377-1398, 2022 | 34 | 2022 |
Regression test case prioritization technique using genetic algorithm DK Yadav, S Dutta Advances in Computational Intelligence: Proceedings of International …, 2017 | 27 | 2017 |
Network security using biometric and cryptography S Dutta, A Kar, NC Mahanti, BN Chatterji Advanced Concepts for Intelligent Vision Systems: 10th International …, 2008 | 27 | 2008 |
Test case prioritization technique based on early fault detection using fuzzy logic DK Yadav, S Dutta 2016 3rd international conference on computing for sustainable global …, 2016 | 26 | 2016 |
A Symmetric Key Algorithm for Cryptography using Music SC Sandip Dutta , Chandan Kumar International Journal of Engineering and Technology (IJET) 5, 3109-3115, 2013 | 26* | 2013 |
A hybrid polybius-playfair music cipher C Kumar, S Dutta, S Chakraborty International Journal of Multimedia and Ubiquitous Engineering 10 (8), 187-198, 2015 | 22 | 2015 |
Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach S Ray, KN Mishra, S Dutta International Journal of Information Technology 14 (3), 1333-1341, 2022 | 21 | 2022 |
Regression test case selection and prioritization for object oriented software DK Yadav, S Dutta Microsystem Technologies 26 (5), 1463-1477, 2020 | 19 | 2020 |
Big data security issues from the perspective of IoT and cloud computing: A review S Ray, KN Mishra, S Dutta Recent Advances in Computer Science and Communications 12 (1), 1-22, 2020 | 18 | 2020 |
Hiding messages using musical notes: A fuzzy logic approach C Kumar, S Dutta, S Chakraborty International Journal of Security and Its Applications 9 (1), 237-248, 2015 | 17 | 2015 |
A Novel Method of Hiding Message Using Musical S Dutta, S Chakraborty, NC Mahanti International Journal of Computer Applications 975, 8887, 2010 | 13 | 2010 |
Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption P Pranav, S Dutta, S Chakraborty Soft Computing 25 (21), 13127-13145, 2021 | 12 | 2021 |
Musical cryptography using genetic algorithm C Kumar, S Dutta, S Chakborty 2014 International Conference on Circuits, Power and Computing Technologies …, 2014 | 12 | 2014 |
FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment A Kumar, S Dutta, P Pranav International Journal of Information Technology 16 (2), 891-900, 2024 | 11 | 2024 |
Test case prioritization using clustering approach for object oriented software DK Yadav, SK Dutta International Journal of Information System Modeling and Design (IJISMD) 10 …, 2019 | 10 | 2019 |
Survey on lightweight cryptography algorithm for data privacy in internet of things M Sinha, S Dutta Proceedings of the Fourth International Conference on Microelectronics …, 2021 | 8 | 2021 |
A new cipher system using semi-natural composition in Indian raga P Pranav, S Chakraborty, S Dutta Soft Computing 24 (2), 1529-1537, 2020 | 8 | 2020 |
Analysis of SQL injection attacks in the cloud and in WEB applications A Kumar, S Dutta, P Pranav Security and Privacy 7 (3), e370, 2024 | 6 | 2024 |
Sensitive data identification and security assurance in cloud and IoT based networks S Ray, KN Mishra, S Dutta International Journal of Computer Network and Information Security 10 (5), 11, 2022 | 6 | 2022 |
Big data security issues from the perspective of IoT and cloud computing: a review S Ray, KN Mishra, S Dutta Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021 | 6 | 2021 |