关注
Dr. Chitresh Banerjee
Dr. Chitresh Banerjee
Associate Professor, Amity Institute of Information Technology, Amity University
在 jpr.amity.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Software Security Rules, SDLC Perspective
C Banerjee, SK Pandey
International Journal of Computer Science and Information Security 6 (1 …, 2009
492009
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
312010
An Improvised Software Security Awareness Model
C Banerjee, A Banerjee, PD Murarka
International Journal of Information, Communication and Computing Technology …, 2013
162013
Role Of Technology In Education: A 21 st Century Approach
B Keswani, C Banerjee, P Patni
Journal of Commerce and Information Technology 8, 53-59, 2008
152008
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC
C Banerjee, A Banerjee, PD Murarka
International Journal of Advanced Studies in Computer Science and …, 2014
112014
Software security rules
C Banerjee, SK Pandey
SDLC perspective 911, 2009
112009
MCOQR (misuse case-oriented quality requirements) metrics framework
C Banerjee, A Banerjee, SK Pandey
Problem solving and uncertainty modeling through optimization and soft …, 2016
102016
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Computer Applications (IJCA), USA, 93 (18), 47-54, 2014
102014
Artificial intelligence in healthcare
L Garg, S Basterrech, C Banerjee, TK Sharma
Springer Nature, 2021
72021
Vulnerability identification and misuse case classification framework
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018
72018
Security Threats of Social Networking Sites: An Analytical Approach
A Banerjee, C Banerjee, AS Poonia
International Journal of Enhanced Research in Management & Computer …, 2014
72014
Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase
C Banerjee, A Banerjee, AS Poonia, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018
62018
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective
C Banerjee, A Banerjee, SK Sharma
International Journal of Hybrid Intelligent Systems 14 (1-2), 1-11, 2017
62017
Security issues in Internet of Things (IoT)-enabled systems: problem and prospects
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2018, 1419-1423, 2020
52020
Development of iMACOQR metrics framework for quantification of software security
A Banerjee, C Banerjee, SK Pandey, AS Poonia
Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016
42016
Research on Security Requirements Engineering: Problems and Prospects
A Banerjee, M Sharma, C Banerjee, SK Pandey
MATRIX Academic International Online Journal of Engineering and Technology 3 …, 2015
42015
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Emerging Trends & Technology in Computer Science …, 2014
42014
Smart automation in manufacturing process using industrial internet of things (IIoT) architecture
J Singh, C Banerjee, SK Pandey
Innovations in Systems and Software Engineering 19 (1), 15-22, 2023
32023
Software Security Awareness: Comparison of Artifacts Based Awareness Tools and Techniques
C Banerjee, A Banerjee, SK Pandey
Journal of Engineering & Technology 1 (1), 33-38, 2013
32013
Software engineering approaches to enable digital transformation technologies
S Misra, A Jain, M Kaushik, C Banerjee
Taylor & Francis, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20