An improvised software security awareness model C Banerjee, A Banerjee, PD Murarka JIMS8I-International Journal of Information Communication and Computing …, 2013 | 16 | 2013 |
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC C Banerjee, A Banerjee, PD Murarka International Journal of Advanced Studies in Computer Science and …, 2014 | 11 | 2014 |
MCOQR (misuse case-oriented quality requirements) metrics framework C Banerjee, A Banerjee, SK Pandey Problem solving and uncertainty modeling through optimization and soft …, 2016 | 10 | 2016 |
Measuring software security using MACOQR (misuse and abuse case oriented quality requirement) metrics: defensive perspective C Banerjee, A Banerjee, PD Murarka International Journal of Computer Applications 93 (18), 2014 | 10 | 2014 |
Vulnerability identification and misuse case classification framework AS Poonia, C Banerjee, A Banerjee, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 7 | 2018 |
Security Threats of Social Networking Sites: An Analytical Approach A Banerjee, C Banerjee, AS Poonia International Journal of Enhanced Research in Management & Computer …, 2014 | 7 | 2014 |
Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase C Banerjee, A Banerjee, AS Poonia, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 6 | 2018 |
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective C Banerjee, A Banerjee, SK Sharma International Journal of Hybrid Intelligent Systems 14 (1-2), 1-11, 2017 | 6 | 2017 |
Security issues in Internet of Things (IoT)-enabled systems: problem and prospects AS Poonia, C Banerjee, A Banerjee, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2018, 1419-1423, 2020 | 5 | 2020 |
Development of iMACOQR metrics framework for quantification of software security A Banerjee, C Banerjee, SK Pandey, AS Poonia Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016 | 4 | 2016 |
Research on Security Requirements Engineering: Problems and Prospects A Banerjee, M Sharma, C Banerjee, SK Pandey MATRIX Academic International Online Journal of Engineering and Technology 3 …, 2015 | 4 | 2015 |
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective C Banerjee, A Banerjee, PD Murarka International Journal of Emerging Trends & Technology in Computer Science 3 …, 2014 | 4 | 2014 |
Software Security Awareness: Comparison of Artifacts Based Awareness Tools and Techniques C Banerjee, A Banerjee, SK Pandey SGVU Journal of Engineering & Technology 1 (1), 33-38, 2013 | 3 | 2013 |
Smart Agriculture Using Internet of Things (IoT) and Wireless Sensor Network: Problems and Prospects AS Poonia, C Banerjee, A Banerjee, SK Sharma Advances in Mechanical Engineering: Select Proceedings of CAMSE 2020, 749-757, 2021 | 2 | 2021 |
Proposed Algorithm for Creation of Misuse Case Modeling Tree During Security Requirements Elicitation Phase to Quantify Security AS Poonia, C Banerjee, A Banerjee, SK Sharma Performance Management of Integrated Systems and its Applications in …, 2020 | 2 | 2020 |
Interpreting the Objective Outcome of the Proposed Misuse Case Oriented Quality Requirements (MCOQR) Framework Metrics for Security Quantification AS Poonia, C Banerjee, A Banerjee, SK Sharma Performance Management of Integrated Systems and its Applications in …, 2020 | 2 | 2020 |
Improvising the Results of Misuse Case-Oriented Quality Requirements (MCOQR) Framework Metrics: Secondary Objective Perspective C Banerjee, A Banerjee, AS Poonia, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2017, 693-697, 2019 | 2 | 2019 |
Aligning misuse case oriented quality requirements metrics with machine learning approach AS Poonia, C Banerjee, A Banerjee, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2017, 687-692, 2019 | 2 | 2019 |
Proposed algorithm for identification of vulnerabilities & associated misuse cases using cvss, cve during sre phase C Banerjee, A Banerjee, AS Poonia, SK Sharma International Conference on Soft Computing: Theories and Applications (SoCTA), 2017 | 2 | 2017 |
Improvised Cyber Crime Investigation Model AS Poonia, C Banerjee, A Banerjee Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016 | 2 | 2016 |