Follow
Dr. Chitresh Banerjee
Dr. Chitresh Banerjee
Associate Professor, Amity Institute of Information Technology, Amity University
Verified email at jpr.amity.edu
Title
Cited by
Cited by
Year
Software Security Rules, SDLC Perspective
C Banerjee, SK Pandey
International Journal of Computer Science and Information Security 6 (1 …, 2009
472009
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
312010
An Improvised Software Security Awareness Model
C Banerjee, A Banerjee, PD Murarka
International Journal of Information, Communication and Computing Technology …, 2013
172013
Role of technology in education: a 21st century approach
B Keswani, C Banerjee, P Patni
Journal of Commerce and Information Technology 8, 53-59, 2008
152008
Software security rules
C Banerjee, SK Pandey
SDLC perspective 911, 2009
112009
MCOQR (misuse case-oriented quality requirements) metrics framework
C Banerjee, A Banerjee, SK Pandey
Problem solving and uncertainty modeling through optimization and soft …, 2016
102016
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Computer Applications (IJCA), USA, 93 (18), 47-54, 2014
102014
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC
C Banerjee, A Banerjee, PD Murarka
International Journal of Advanced Studies in Computer Science and …, 2014
102014
Vulnerability identification and misuse case classification framework
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018
72018
Security Threats of Social Networking Sites: An Analytical Approach
A Banerjee, C Banerjee, AS Poonia
International Journal of Enhanced Research in Management & Computer …, 2014
72014
Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase
C Banerjee, A Banerjee, AS Poonia, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018
62018
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective
C Banerjee, A Banerjee, SK Sharma
International Journal of Hybrid Intelligent Systems 14 (1-2), 1-11, 2017
62017
Security issues in Internet of Things (IoT)-enabled systems: problem and prospects
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2018, 1419-1423, 2020
52020
Development of iMACOQR metrics framework for quantification of software security
A Banerjee, C Banerjee, SK Pandey, AS Poonia
Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016
42016
Research on Security Requirements Engineering: Problems and Prospects
A Banerjee, M Sharma, C Banerjee, SK Pandey
MATRIX Academic International Online Journal of Engineering and Technology 3 …, 2015
42015
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Emerging Trends & Technology in Computer Science …, 2014
42014
Computational Network Application Tools for Performance Management
M Pant, TK Sharma, S Basterrech, C Banerjee
Springer, 2020
32020
Software Security Awareness: Comparison of Artifacts Based Awareness Tools and Techniques
C Banerjee, A Banerjee, SK Pandey
Journal of Engineering & Technology 1 (1), 33-38, 2013
32013
Software engineering approaches to enable digital transformation technologies
S Misra, A Jain, M Kaushik, C Banerjee
Taylor & Francis, 2023
22023
Smart automation in manufacturing process using industrial internet of things (IIoT) architecture
J Singh, C Banerjee, SK Pandey
Innovations in Systems and Software Engineering 19 (1), 15-22, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20