Search dblp for Publications

export results for "Dipti Kapoor Sarmah"

 download as .bib file

@article{DBLP:journals/compsec/RusES24,
  author       = {Adrian{-}Catalin Rus and
                  Mohammad El{-}Hajj and
                  Dipti Kapoor Sarmah},
  title        = {{NAISS:} {A} reverse proxy approach to mitigate MageCart's e-skimmers
                  in e-commerce},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103797},
  year         = {2024}
}
@article{DBLP:journals/ijisec/HaverkampS24,
  author       = {Indy Haverkamp and
                  Dipti Kapoor Sarmah},
  title        = {Evaluating the merits and constraints of cryptography-steganography
                  fusion: a systematic analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {4},
  pages        = {2607--2635},
  year         = {2024}
}
@article{DBLP:journals/iswa/SchrijverSE24,
  author       = {Gilian Schrijver and
                  Dipti Kapoor Sarmah and
                  Mohammed El{-}Hajj},
  title        = {Automobile insurance fraud detection using data mining: {A} systematic
                  literature review},
  journal      = {Intell. Syst. Appl.},
  volume       = {21},
  pages        = {200340},
  year         = {2024}
}
@article{DBLP:journals/compsec/HoheiselCSJ23,
  author       = {Raphael Hoheisel and
                  Guido van Capelleveen and
                  Dipti Kapoor Sarmah and
                  Marianne Junger},
  title        = {The development of phishing during the {COVID-19} pandemic: An analysis
                  of over 1100 targeted domains},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103158},
  year         = {2023}
}
@inproceedings{DBLP:conf/cscml/TanS23,
  author       = {Jiayi Tan and
                  Dipti Kapoor Sarmah},
  title        = {Hollow-Pass: {A} Dual-View Pattern Password Against Shoulder-Surfing
                  Attacks},
  booktitle    = {{CSCML}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {251--272},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/secrypt/RusS023,
  author       = {Catalin Rus and
                  Dipti Kapoor Sarmah and
                  Mohammed El{-}Hajj},
  title        = {Defeating MageCart Attacks in a {NAISS} Way},
  booktitle    = {{SECRYPT}},
  pages        = {691--697},
  publisher    = {{SCITEPRESS}},
  year         = {2023}
}
@book{DBLP:series/isrl/2020-187,
  author       = {Dipti Kapoor Sarmah and
                  Anand J. Kulkarni and
                  Ajith Abraham},
  title        = {Optimization Models in Steganography Using Metaheuristics},
  series       = {Intelligent Systems Reference Library},
  volume       = {187},
  publisher    = {Springer},
  year         = {2020}
}
@article{DBLP:journals/istr/SarmahK19,
  author       = {Dipti Kapoor Sarmah and
                  Anand J. Kulkarni},
  title        = {Improved Cohort Intelligence - {A} high capacity, swift and secure
                  approach on {JPEG} image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {90--106},
  year         = {2019}
}
@article{DBLP:journals/isci/SarmahK18,
  author       = {Dipti Kapoor Sarmah and
                  Anand J. Kulkarni},
  title        = {{JPEG} based steganography methods using Cohort Intelligence with
                  Cognitive Computing and modified Multi Random Start Local Search optimization
                  algorithms},
  journal      = {Inf. Sci.},
  volume       = {430},
  pages        = {378--396},
  year         = {2018}
}
@inproceedings{DBLP:conf/ictcs2/GuhaS16,
  author       = {Samadrita Guha and
                  Dipti Kapoor Sarmah},
  title        = {Increase of Capacity and Quality of Frequency Based Image Steganography
                  Using Particle Swarm Optimization},
  booktitle    = {{ICTCS}},
  pages        = {4:1--4:5},
  year         = {2016}
}
@article{DBLP:journals/corr/abs-1009-2826,
  author       = {Dipti Kapoor Sarmah and
                  Neha Bajpai},
  title        = {Proposed System for data hiding using Cryptography and Steganography
                  Proposed System for data hiding using Cryptography and Steganography},
  journal      = {CoRR},
  volume       = {abs/1009.2826},
  year         = {2010}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics