Follow
DILIP KUMAR YADAV
DILIP KUMAR YADAV
Verified email at nitjsr.ac.in
Title
Cited by
Cited by
Year
A fuzzy logic based approach for phase-wise software defects prediction using software metrics
HB Yadav, DK Yadav
Information and Software Technology 63, 44-57, 2015
1362015
RSA and ECC: a comparative analysis
D Mahto, DK Yadav
International journal of applied engineering research 12 (19), 9053-9061, 2017
1302017
Security analysis of elliptic curve cryptography and RSA
D Mahto, DA Khan, DK Yadav
Proceedings of the world congress on engineering 1, 419-422, 2016
842016
Early software reliability analysis using reliability relevant software metrics
HB Yadav, DK Yadav
International Journal of System Assurance Engineering and Management 8, 2097 …, 2017
672017
A probabilistic software risk assessment and estimation model for software projects
C Kumar, DK Yadav
Procedia Computer Science 54, 353-361, 2015
662015
Early Software Defects Prediction Using Fuzzy Logic.
DK Yadav, SK Chaturvedi, RB Misra
International Journal of Performability Engineering 8 (4), 2012
582012
Performance Analysis of RSA and Elliptic Curve Cryptography.
D Mahto, DK Yadav
Int. J. Netw. Secur. 20 (4), 625-635, 2018
502018
Software defects estimation using metrics of early phases of software development life cycle
C Kumar, DK Yadav
International Journal of System Assurance Engineering and Management 8, 2109 …, 2017
372017
A modified approach to data hiding in Microsoft Word documents by change-tracking technique
S Mahato, DA Khan, DK Yadav
Journal of King Saud University-Computer and Information Sciences 32 (2 …, 2020
342020
The AES-256 cryptosystem resists quantum attacks
S Rao, D Mahto, DK Yadav, DA Khan
Int. J. Adv. Res. Comput. Sci 8 (3), 404-408, 2017
242017
A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm
S Kumar, DK Yadav, DA Khan
International Journal of Advanced Intelligence Paradigms 9 (2-3), 278-312, 2017
242017
Construction of membership function for software metrics
HB Yadav, DK Yadav
Procedia Computer Science 46, 933-940, 2015
242015
A modified approach to text steganography using HyperText markup language
S Mahato, DK Yadav, DA Khan
2013 Third International Conference on Advanced Computing and Communication …, 2013
232013
Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce applications
D Mahto, DK Yadav
Proceedings of the 2015 third international conference on computer …, 2015
222015
A novel approach to text steganography using font size of invisible space characters in microsoft word document
S Mahato, DK Yadav, DA Khan
Intelligent Computing, Networking, and Informatics: Proceedings of the …, 2014
222014
A minesweeper game-based steganography scheme
S Mahato, DK Yadav, DA Khan
Journal of Information Security and Applications 32, 1-14, 2017
192017
A novel approach to information security using four dimensional (4d) playfair cipher fused with linear feedback shift register
K Bhat, D Mahto, DK Yadav
Indian Journal of Computer Science and Engineering 8 (1), 15-32, 2017
152017
Artificial bee colony based test data generation for data-flow testing
S Kumar, DK Yadav, DA Khan
Indian Journal of Science and Technology, 2016
132016
A multistage model for defect prediction of software development life cycle using fuzzy logic
HB Yadav, DK Yadav
Proceedings of the Third International Conference on Soft Computing for …, 2014
132014
Network security using ECC with Biometric
D Mahto, DK Yadav
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013
132013
The system can't perform the operation now. Try again later.
Articles 1–20