Software Security Rules, SDLC Perspective C Banerjee, SK Pandey International Journal of Computer Science and Information Security 6 (1 …, 2009 | 49 | 2009 |
Research on software security awareness: problems and prospects C Banerjee, SK Pandey ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010 | 31 | 2010 |
An Improvised Software Security Awareness Model C Banerjee, A Banerjee, PD Murarka International Journal of Information, Communication and Computing Technology …, 2013 | 16 | 2013 |
Role Of Technology In Education: A 21 st Century Approach B Keswani, C Banerjee, P Patni Journal of Commerce and Information Technology 8, 53-59, 2008 | 15 | 2008 |
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC C Banerjee, A Banerjee, PD Murarka International Journal of Advanced Studies in Computer Science and …, 2014 | 11 | 2014 |
Software security rules C Banerjee, SK Pandey SDLC perspective 911, 2009 | 11 | 2009 |
MCOQR (misuse case-oriented quality requirements) metrics framework C Banerjee, A Banerjee, SK Pandey Problem solving and uncertainty modeling through optimization and soft …, 2016 | 10 | 2016 |
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective C Banerjee, A Banerjee, PD Murarka International Journal of Computer Applications (IJCA), USA, 93 (18), 47-54, 2014 | 10 | 2014 |
Artificial intelligence in healthcare L Garg, S Basterrech, C Banerjee, TK Sharma Springer Nature, 2021 | 7 | 2021 |
Vulnerability identification and misuse case classification framework AS Poonia, C Banerjee, A Banerjee, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 7 | 2018 |
Security Threats of Social Networking Sites: An Analytical Approach A Banerjee, C Banerjee, AS Poonia International Journal of Enhanced Research in Management & Computer …, 2014 | 7 | 2014 |
Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase C Banerjee, A Banerjee, AS Poonia, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 6 | 2018 |
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective C Banerjee, A Banerjee, SK Sharma International Journal of Hybrid Intelligent Systems 14 (1-2), 1-11, 2017 | 6 | 2017 |
Security issues in Internet of Things (IoT)-enabled systems: problem and prospects AS Poonia, C Banerjee, A Banerjee, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2018, 1419-1423, 2020 | 5 | 2020 |
Development of iMACOQR metrics framework for quantification of software security A Banerjee, C Banerjee, SK Pandey, AS Poonia Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016 | 4 | 2016 |
Research on Security Requirements Engineering: Problems and Prospects A Banerjee, M Sharma, C Banerjee, SK Pandey MATRIX Academic International Online Journal of Engineering and Technology 3 …, 2015 | 4 | 2015 |
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective C Banerjee, A Banerjee, PD Murarka International Journal of Emerging Trends & Technology in Computer Science …, 2014 | 4 | 2014 |
Smart automation in manufacturing process using industrial internet of things (IIoT) architecture J Singh, C Banerjee, SK Pandey Innovations in Systems and Software Engineering 19 (1), 15-22, 2023 | 3 | 2023 |
Software Security Awareness: Comparison of Artifacts Based Awareness Tools and Techniques C Banerjee, A Banerjee, SK Pandey Journal of Engineering & Technology 1 (1), 33-38, 2013 | 3 | 2013 |
Software engineering approaches to enable digital transformation technologies S Misra, A Jain, M Kaushik, C Banerjee Taylor & Francis, 2023 | 2 | 2023 |