Search dblp for Publications

export results for "Dipti Kapoor Sarmah"

 download as .bib file

@article{DBLP:journals/compsec/RusES24,
  author       = {Adrian{-}Catalin Rus and
                  Mohammad El{-}Hajj and
                  Dipti Kapoor Sarmah},
  title        = {{NAISS:} {A} reverse proxy approach to mitigate MageCart's e-skimmers
                  in e-commerce},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103797},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103797},
  doi          = {10.1016/J.COSE.2024.103797},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RusES24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HaverkampS24,
  author       = {Indy Haverkamp and
                  Dipti Kapoor Sarmah},
  title        = {Evaluating the merits and constraints of cryptography-steganography
                  fusion: a systematic analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {4},
  pages        = {2607--2635},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-024-00853-9},
  doi          = {10.1007/S10207-024-00853-9},
  timestamp    = {Sat, 10 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HaverkampS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iswa/SchrijverSE24,
  author       = {Gilian Schrijver and
                  Dipti Kapoor Sarmah and
                  Mohammed El{-}Hajj},
  title        = {Automobile insurance fraud detection using data mining: {A} systematic
                  literature review},
  journal      = {Intell. Syst. Appl.},
  volume       = {21},
  pages        = {200340},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.iswa.2024.200340},
  doi          = {10.1016/J.ISWA.2024.200340},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iswa/SchrijverSE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HoheiselCSJ23,
  author       = {Raphael Hoheisel and
                  Guido van Capelleveen and
                  Dipti Kapoor Sarmah and
                  Marianne Junger},
  title        = {The development of phishing during the {COVID-19} pandemic: An analysis
                  of over 1100 targeted domains},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103158},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103158},
  doi          = {10.1016/J.COSE.2023.103158},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HoheiselCSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/TanS23,
  author       = {Jiayi Tan and
                  Dipti Kapoor Sarmah},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {Hollow-Pass: {A} Dual-View Pattern Password Against Shoulder-Surfing
                  Attacks},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {251--272},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_18},
  doi          = {10.1007/978-3-031-34671-2\_18},
  timestamp    = {Thu, 29 Jun 2023 08:38:21 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/TanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RusS023,
  author       = {Catalin Rus and
                  Dipti Kapoor Sarmah and
                  Mohammed El{-}Hajj},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Defeating MageCart Attacks in a {NAISS} Way},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {691--697},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012079300003555},
  doi          = {10.5220/0012079300003555},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RusS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isrl/2020-187,
  author       = {Dipti Kapoor Sarmah and
                  Anand J. Kulkarni and
                  Ajith Abraham},
  title        = {Optimization Models in Steganography Using Metaheuristics},
  series       = {Intelligent Systems Reference Library},
  volume       = {187},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-42044-4},
  doi          = {10.1007/978-3-030-42044-4},
  isbn         = {978-3-030-42043-7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isrl/2020-187.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SarmahK19,
  author       = {Dipti Kapoor Sarmah and
                  Anand J. Kulkarni},
  title        = {Improved Cohort Intelligence - {A} high capacity, swift and secure
                  approach on {JPEG} image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {90--106},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.002},
  doi          = {10.1016/J.JISA.2019.01.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SarmahK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SarmahK18,
  author       = {Dipti Kapoor Sarmah and
                  Anand J. Kulkarni},
  title        = {{JPEG} based steganography methods using Cohort Intelligence with
                  Cognitive Computing and modified Multi Random Start Local Search optimization
                  algorithms},
  journal      = {Inf. Sci.},
  volume       = {430},
  pages        = {378--396},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2017.11.027},
  doi          = {10.1016/J.INS.2017.11.027},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/SarmahK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictcs2/GuhaS16,
  author       = {Samadrita Guha and
                  Dipti Kapoor Sarmah},
  title        = {Increase of Capacity and Quality of Frequency Based Image Steganography
                  Using Particle Swarm Optimization},
  booktitle    = {{ICTCS}},
  pages        = {4:1--4:5},
  year         = {2016},
  url          = {https://doi.org/10.1145/2905055.2905059},
  doi          = {10.1145/2905055.2905059},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictcs2/GuhaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1009-2826,
  author       = {Dipti Kapoor Sarmah and
                  Neha Bajpai},
  title        = {Proposed System for data hiding using Cryptography and Steganography
                  Proposed System for data hiding using Cryptography and Steganography},
  journal      = {CoRR},
  volume       = {abs/1009.2826},
  year         = {2010},
  url          = {http://arxiv.org/abs/1009.2826},
  eprinttype    = {arXiv},
  eprint       = {1009.2826},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1009-2826.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics