A fuzzy logic based approach for phase-wise software defects prediction using software metrics HB Yadav, DK Yadav Information and Software Technology 63, 44-57, 2015 | 139 | 2015 |
RSA and ECC: a comparative analysis D Mahto, DK Yadav International journal of applied engineering research 12 (19), 9053-9061, 2017 | 135 | 2017 |
Security analysis of elliptic curve cryptography and RSA D Mahto, DA Khan, DK Yadav Proceedings of the world congress on engineering 1, 419-422, 2016 | 87 | 2016 |
Early software reliability analysis using reliability relevant software metrics HB Yadav, DK Yadav International Journal of System Assurance Engineering and Management 8, 2097 …, 2017 | 68 | 2017 |
A probabilistic software risk assessment and estimation model for software projects C Kumar, DK Yadav Procedia Computer Science 54, 353-361, 2015 | 68 | 2015 |
Early Software Defects Prediction Using Fuzzy Logic. DK Yadav, SK Chaturvedi, RB Misra International Journal of Performability Engineering 8 (4), 2012 | 60 | 2012 |
Performance Analysis of RSA and Elliptic Curve Cryptography. D Mahto, DK Yadav Int. J. Netw. Secur. 20 (4), 625-635, 2018 | 57 | 2018 |
Software defects estimation using metrics of early phases of software development life cycle C Kumar, DK Yadav International Journal of System Assurance Engineering and Management 8, 2109 …, 2017 | 38 | 2017 |
A modified approach to data hiding in Microsoft Word documents by change-tracking technique S Mahato, DA Khan, DK Yadav Journal of King Saud University-Computer and Information Sciences 32 (2 …, 2020 | 37 | 2020 |
The AES-256 cryptosystem resists quantum attacks S Rao, D Mahto, DK Yadav, DA Khan Int. J. Adv. Res. Comput. Sci 8 (3), 404-408, 2017 | 25 | 2017 |
A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm S Kumar, DK Yadav, DA Khan International Journal of Advanced Intelligence Paradigms 9 (2-3), 278-312, 2017 | 24 | 2017 |
Construction of membership function for software metrics HB Yadav, DK Yadav Procedia Computer Science 46, 933-940, 2015 | 24 | 2015 |
A modified approach to text steganography using HyperText markup language S Mahato, DK Yadav, DA Khan 2013 Third International Conference on Advanced Computing and Communication …, 2013 | 23 | 2013 |
Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce applications D Mahto, DK Yadav Proceedings of the 2015 third international conference on computer …, 2015 | 22 | 2015 |
A novel approach to text steganography using font size of invisible space characters in microsoft word document S Mahato, DK Yadav, DA Khan Intelligent Computing, Networking, and Informatics: Proceedings of the …, 2014 | 22 | 2014 |
A minesweeper game-based steganography scheme S Mahato, DK Yadav, DA Khan Journal of Information Security and Applications 32, 1-14, 2017 | 19 | 2017 |
A novel approach to information security using four dimensional (4d) playfair cipher fused with linear feedback shift register K Bhat, D Mahto, DK Yadav Indian Journal of Computer Science and Engineering 8 (1), 15-32, 2017 | 15 | 2017 |
Network security using ECC with Biometric D Mahto, DK Yadav Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013 | 14 | 2013 |
Artificial bee colony based test data generation for data-flow testing S Kumar, DK Yadav, DA Khan Indian Journal of Science and Technology, 2016 | 13 | 2016 |
A multistage model for defect prediction of software development life cycle using fuzzy logic HB Yadav, DK Yadav Proceedings of the Third International Conference on Soft Computing for …, 2014 | 13 | 2014 |