Dr. Chitreshh Banerjee
Dr. Chitreshh Banerjee
Assistant Professor (AP-III), Amity Institute of Information Technology, Amity University
Verified email at jpr.amity.edu
TitleCited byYear
Software Security Rules, SDLC Perspective
C Banerjee, SK Pandey
International Journal of Computer Science and Information Security 6 (1 …, 2009
232009
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
162010
Software Security Rules
C Banerjee, SK Pandey
SDLC Perspective. arXiv preprint, 2009
112009
An Improvised Software Security Awareness Model
C Banerjee, A Banerjee, PD Murarka
International Journal of Information, Communication and Computing Technology …, 2013
102013
MCOQR (misuse case-oriented quality requirements) metrics framework
C Banerjee, A Banerjee, SK Pandey
Problem Solving and Uncertainty Modeling through Optimization and Soft …, 2016
92016
Vulnerability identification and misuse case classification framework
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications, 659-666, 2018
62018
Proposed algorithm for identification of vulnerabilities & associated misuse cases using cvss, cve during sre phase
C Banerjee, A Banerjee, AS Poonia, SK Sharma
Proceedings of Soft Computing: Theories and Applications, Advances in …, 2017
52017
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Computer Applications (IJCA), USA, 93 (18), 47-54, 2014
52014
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC
C Banerjee, A Banerjee, PD Murarka
International Journal of Advanced Studies in Computer Science and …, 2014
52014
Research on Security Requirements Engineering: Problems and Prospects
A Banerjee, M Sharma, C Banerjee, SK Pandey
MATRIX Academic International Online Journal of Engineering and Technology 3 …, 2015
32015
Security Threats of Social Networking Sites: An Analytical Approach
A Banerjee, C Banerjee, AS Poonia
International Journal of Enhanced Research in Management & Computer …, 2014
32014
Role Of Technology In Education: A 21 st Century Approach
B Keswani, C Banerjee, P Patni
Proceedings of second national conference on challenges and opportunities in …, 2008
32008
Proposed Algorithm for Identification of Vulnerabilities and Associated Misuse Cases Using CVSS, CVE Standards During Security Requirements Elicitation Phase
C Banerjee, A Banerjee, AS Poonia, SK Sharma
Soft Computing: Theories and Applications, 651-658, 2018
22018
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Emerging Trends & Technology in Computer Science …, 2014
22014
Recent Advances in Risk Analysis and Management (RAM)
A Banerjee, C Banerjee, AS Poonia
International Journal of Advanced Computer Technology 3 (12), 1412-1416, 2014
22014
Software Security Awareness: Comparison of Artifacts Based Awareness Tools and Techniques
C Banerjee, A Banerjee, SK Pandey
Journal of Engineering & Technology 1 (1), 33-38, 2013
22013
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective
C Banerjee, A Banerjee, SK Sharma
International Journal of Hybrid Intelligent Systems 14 (1-2), 1-11, 2017
12017
Improvised Cyber Crime Investigation Model
AS Poonia, C Banerjee, A Banerjee
Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016
12016
Development of iMACOQR Metrics Framework for Quantification of Software Security
A Banerjee, C Banerjee, SK Pandey, AS Poonia
Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016
12016
Algorithmic Approach for Development of Misuse Case Modeling Framework for iMACOQR Metrics
C Banerjee, A Banerjee, PD Murarka
Fifth International Conference on Advanced Computing & Communication …, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20