Interval-valued intuitionistic fuzzy-analytic hierarchy process for evaluating the impact of security attributes in fog based internet of things paradigm R Verma, S Chandra Computer Communications 175, 35-46, 2021 | 38 | 2021 |
VMFCVD: an optimized framework to combat volumetric DDoS attacks using machine learning A Prasad, S Chandra Arabian Journal for Science and Engineering 47 (8), 9965-9983, 2022 | 33 | 2022 |
Object Oriented Software Security Estimation Life Cycle: Design phase perspective S Chandra, RA Khan Journal of Software Engineering 2 (1), 39-46, 2008 | 30 | 2008 |
A systematic survey on fog steered IoT: Architecture, prevalent threats and trust models R Verma, S Chandra International Journal of Wireless Information Networks 28, 116-133, 2021 | 29 | 2021 |
Software security metric identification framework (SSM) S Chandra, RA Khan Proceedings of the International Conference on Advances in Computing …, 2009 | 26 | 2009 |
Security estimation framework: design phase perspective S Chandra, RA Khan, A Agrawal 2009 Sixth International Conference on Information Technology: New …, 2009 | 19 | 2009 |
An efficient measurement of object oriented design vulnerability A Agrawal, S Chandra, RA Khan 2009 International Conference on Availability, Reliability and Security, 618-623, 2009 | 19 | 2009 |
RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu R Verma, S Chandra Engineering Applications of Artificial Intelligence 118, 105670, 2023 | 18 | 2023 |
Security and privacy issues in fog driven IoT environment R Verma, S Chandra International Journal of Computer Sciences and Engineering 7 (5), 367-370, 2019 | 18 | 2019 |
Confidentiality checking an object-oriented class hierarchy S Chandra, RA Khan Network Security 2010 (3), 16-20, 2010 | 10 | 2010 |
Software Security Process–Development Life Cycle Perspective A Agrawal, RA Khan, S Chandra CSI communications 32 (5), 39-42, 2008 | 10 | 2008 |
Defending ARP Spoofing-based MitM Attack using Machine Learning and Device Profiling A Prasad, S Chandra 2022 International Conference on Computing, Communication, and Intelligent …, 2022 | 9 | 2022 |
Machine learning to combat cyberattack: a survey of datasets and challenges A Prasad, S Chandra The Journal of Defense Modeling and Simulation, 15485129221094881, 2022 | 9 | 2022 |
Software Security Factors in Design Phase S Chandra, RA Khan, A Agrawal Information Systems, Technology and Management: Third International …, 2009 | 8 | 2009 |
A Methodology to Check Integrity of a Class Hierarchy S Chandra, RA Khan International Journal of Recent Trends in Engineering 2 (4), 83, 2009 | 7 | 2009 |
A fuzzy AHP approach for ranking security attributes in fog-IoT environment R Verma, S Chandra 2020 11th International Conference on Computing, Communication and …, 2020 | 5 | 2020 |
Availability state transition model S Chandra, RA Khan ACM SIGSOFT Software Engineering Notes 36 (3), 1-3, 2011 | 5 | 2011 |
Evaluating the impact of software security tactics: a design perspective M Alenezi, AK Pandey, R Verma, M Faizan, S Chandra, A Agrawal, ... CMC-Comput Mater Continua 66 (3), 2283-2299, 2021 | 3 | 2021 |
BotDefender: A Collaborative Defense Framework Against Botnet Attacks using Network Traffic Analysis and Machine Learning A Prasad, S Chandra Arabian Journal for Science and Engineering, 1-17, 2023 | 2 | 2023 |
PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning A Prasad, S Chandra Computers & Security, 103545, 2023 | 1 | 2023 |