Dr. Chitreshh Banerjee
Dr. Chitreshh Banerjee
Assistant Professor (AP-III), Amity Institute of Information Technology, Amity University
Verified email at jpr.amity.edu
TitleCited byYear
Software Security Rules, SDLC Perspective
C Banerjee, SK Pandey
International Journal of Computer Science and Information Security 6 (1 …, 2009
322009
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
202010
An Improvised Software Security Awareness Model
C Banerjee, A Banerjee, PD Murarka
International Journal of Information, Communication and Computing Technology …, 2013
102013
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Computer Applications (IJCA), USA, 93 (18), 47-54, 2014
72014
MCOQR (misuse case-oriented quality requirements) metrics framework
C Banerjee, A Banerjee, SK Pandey
Problem Solving and Uncertainty Modeling through Optimization and Soft …, 2016
62016
Vulnerability identification and misuse case classification framework
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications, 659-666, 2018
52018
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC
C Banerjee, A Banerjee, PD Murarka
International Journal of Advanced Studies in Computer Science and …, 2014
52014
Software security rules
C Banerjee, SK Pandey
SDLC Perspective, 2009
52009
Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase
C Banerjee, A Banerjee, AS Poonia, SK Sharma
Soft Computing: Theories and Applications, 651-658, 2018
32018
Research on Security Requirements Engineering: Problems and Prospects
A Banerjee, M Sharma, C Banerjee, SK Pandey
MATRIX Academic International Online Journal of Engineering and Technology 3 …, 2015
32015
Security Threats of Social Networking Sites: An Analytical Approach
A Banerjee, C Banerjee, AS Poonia
International Journal of Enhanced Research in Management & Computer …, 2014
32014
Role Of Technology In Education: A 21 st Century Approach
B Keswani, C Banerjee, P Patni
Journal of Commerce and Information Technology 8 (1), 53-59, 2008
32008
Proposed algorithm for identification of vulnerabilities & associated misuse cases using cvss, cve during sre phase
C Banerjee, A Banerjee, AS Poonia, SK Sharma
International Conference on Soft Computing: Theories and Applications (SoCTA), 2017
22017
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective
C Banerjee, A Banerjee, SK Sharma
International Journal of Hybrid Intelligent Systems 14 (1-2), 1-11, 2017
22017
Improvised Cyber Crime Investigation Model
AS Poonia, C Banerjee, A Banerjee
Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016
22016
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Emerging Trends & Technology in Computer Science …, 2014
22014
Recent Advances in Risk Analysis and Management (RAM)
A Banerjee, C Banerjee, AS Poonia
International Journal of Advanced Computer Technology 3 (12), 1412-1416, 2014
22014
Software Security Awareness: Comparison of Artifacts Based Awareness Tools and Techniques
C Banerjee, A Banerjee, SK Pandey
Journal of Engineering & Technology 1 (1), 33-38, 2013
22013
Aligning Misuse Case Oriented Quality Requirements Metrics with Machine Learning Approach
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications, 687-692, 2019
12019
Development of iMACOQR metrics framework for quantification of software security
A Banerjee, C Banerjee, SK Pandey, AS Poonia
Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20