Follow
Dr. Chitresh Banerjee
Dr. Chitresh Banerjee
Associate Professor, Amity Institute of Information Technology, Amity University
Verified email at jpr.amity.edu
Title
Cited by
Cited by
Year
Software Security Rules, SDLC Perspective
C Banerjee, SK Pandey
International Journal of Computer Science and Information Security 6 (1 …, 2009
502009
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
312010
An Improvised Software Security Awareness Model
C Banerjee, A Banerjee, PD Murarka
International Journal of Information, Communication and Computing Technology …, 2013
172013
Role Of Technology In Education: A 21 st Century Approach
B Keswani, C Banerjee, P Patni
Journal of Commerce and Information Technology 8, 53-59, 2008
162008
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC
C Banerjee, A Banerjee, PD Murarka
International Journal of Advanced Studies in Computer Science and …, 2014
122014
Software security rules
C Banerjee, SK Pandey
SDLC perspective 911, 2009
112009
MCOQR (misuse case-oriented quality requirements) metrics framework
C Banerjee, A Banerjee, SK Pandey
Research Anthology on Recent Trends, Tools, and Implications of Computer …, 2021
102021
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Computer Applications (IJCA), USA, 93 (18), 47-54, 2014
102014
Artificial intelligence in healthcare
L Garg, S Basterrech, C Banerjee, TK Sharma
Springer Nature, 2021
72021
Vulnerability identification and misuse case classification framework
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018
72018
Security Threats of Social Networking Sites: An Analytical Approach
A Banerjee, C Banerjee, AS Poonia
International Journal of Enhanced Research in Management & Computer …, 2014
72014
Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase
C Banerjee, A Banerjee, AS Poonia, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018
62018
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective
C Banerjee, A Banerjee, SK Sharma
International Journal of Hybrid Intelligent Systems 14 (1-2), 1-11, 2017
62017
Security issues in Internet of Things (IoT)-enabled systems: problem and prospects
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Soft Computing: Theories and Applications: Proceedings of SoCTA 2018, 1419-1423, 2020
52020
Software engineering approaches to enable digital transformation technologies
S Misra, A Jain, M Kaushik, C Banerjee
Taylor & Francis, 2023
42023
Development of iMACOQR metrics framework for quantification of software security
A Banerjee, C Banerjee, SK Pandey, AS Poonia
Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016
42016
Research on Security Requirements Engineering: Problems and Prospects
A Banerjee, M Sharma, C Banerjee, SK Pandey
MATRIX Academic International Online Journal of Engineering and Technology 3 …, 2015
42015
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective
C Banerjee, A Banerjee, PD Murarka
International Journal of Emerging Trends & Technology in Computer Science …, 2014
42014
Smart automation in manufacturing process using industrial internet of things (IIoT) architecture
J Singh, C Banerjee, SK Pandey
Innovations in Systems and Software Engineering 19 (1), 15-22, 2023
32023
Smart Agriculture Using Internet of Things (IoT) and Wireless Sensor Network: Problems and Prospects
AS Poonia, C Banerjee, A Banerjee, SK Sharma
Advances in Mechanical Engineering: Select Proceedings of CAMSE 2020, 749-757, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20