Sarmah, Dipti Kapoor
32  results:
Search for persons X
?
2

TangleTunes: A P2P Music Streaming Service on the IoTA Dist..:

, In: 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS),
 
?
4

Hollow-Pass: A Dual-View Pattern Password Against Shoulder-..:

, In: Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science,
Tan, Jiayi ; Sarmah, Dipti Kapoor - p. 251-272 , 2023
 
?
5

The baseline of global consumer cyber security standards fo..:

Olga Greuter, Kes ; Sarmah, Dipti Kapoor
Journal of Cyber Security Technology.  6 (2022)  4 - p. 175-200 , 2022
 
?
6

Heuristics and Metaheuristic Optimization Algorithms:

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
7

Cohort Intelligence with Cognitive Computing (CICC) and Mod..:

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
8

Secret Text Embedding Capacity Improvement (Approach 3):

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
10

Steganalysis on All Approaches/Vulnerability Analysis of St..:

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
11

Conclusions and Future Recommendations:

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
12

Improved Cohort Intelligence Optimization Algorithm (Approa..:

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
13

Introduction:

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
14

Cryptography and Digital Image Steganography Techniques:

, In: Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics,
 
?
15

Improved Cohort Intelligence—A high capacity, swift and sec..:

Sarmah, Dipti Kapoor ; Kulkarni, Anand J
Journal of Information Security and Applications.  45 (2019)  - p. 90-106 , 2019
 
1-15