Sunil Kumar Muttoo

Orcid: 0000-0001-6450-9592

According to our database1, Sunil Kumar Muttoo authored at least 45 papers between 1980 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sentiment analysis and topic modeling of COVID-19 tweets of India.
Int. J. Syst. Assur. Eng. Manag., May, 2024

Inter project defect classification based on word embedding.
Int. J. Syst. Assur. Eng. Manag., 2024

2022
A new S-box design by applying Swarm Intelligence based technique.
Int. J. Syst. Assur. Eng. Manag., 2022

Classification of Software Defects Using Orthogonal Defect Classification.
Int. J. Open Source Softw. Process., 2022

GENDroid - a graph-based ensemble classifier for detecting Android malware.
Int. J. Inf. Comput. Secur., 2022

Autoclassify Software Defects Using Orthogonal Defect Classification.
Proceedings of the Computational Science and Its Applications - ICCSA 2022 Workshops, 2022

2021
An Improved Separable and Reversible Steganography in Encrypted Grayscale Images.
Int. J. Inf. Secur. Priv., 2021

2020
Enhanced payload and trade-off for image steganography via a novel pixel digits alteration.
Multim. Tools Appl., 2020

Regional E-governance Development Index for Developing Nations.
Digit. Gov. Res. Pract., 2020

Multiclass malware classification via first- and second-order texture statistics.
Comput. Secur., 2020

Detection of Malign and Benign PE Files Using Texture Analysis.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
Meta-Heuristic Algorithms to Improve Fuzzy C-Means and K-Means Clustering for Location Allocation of Telecenters Under E-Governance in Developing Nations.
Int. J. Fuzzy Log. Intell. Syst., 2019

CENDroid - A cluster-ensemble classifier for detecting malicious Android applications.
Comput. Secur., 2019

2018
Evading android anti-malware by hiding malicious application inside images.
Int. J. Syst. Assur. Eng. Manag., 2018

Comparative Analysis of Pre- and Post-Classification Ensemble Methods for Android Malware Detection.
Proceedings of the Advances in Computing and Data Science, 2018

2017
Detecting redirection spam using multilayer perceptron neural network.
Soft Comput., 2017

Fuzzy C-Means Clustering and Particle Swarm Optimization based scheme for Common Service Center location allocation.
Appl. Intell., 2017

Development of e-Governance in an Emerging Economy Like India: Assessment and Way Ahead for Key Components.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

Proposed Framework for Information Systems Security for e-Governance in Developing Nations.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

The Need of a Development Assessment Index for e-Governance in India.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

2016
Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA.
Netw. Protoc. Algorithms, 2016

A fuzzy logic approach for detecting redirection spam.
Int. J. Electron. Secur. Digit. Forensics, 2016

Implementation & Analysis of Integrated Utility System in Developing Nation like India.
Int. J. Recent Contributions Eng. Sci. IT, 2016

2015
Secure Group Message Transfer Stegosystem.
Int. J. Inf. Secur. Priv., 2015

2014
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution.
Int. J. Inf. Secur. Priv., 2014

Robust and secure image steganographic algorithm based on matrix embedding.
Int. J. Electron. Secur. Digit. Forensics, 2014

An Image Steganography Method Using Spread Spectrum Technique.
Proceedings of Fourth International Conference on Soft Computing for Problem Solving, 2014

Proposal for integrated system architecture in utilities.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Secure Group Communication with Hidden Group Key.
Inf. Secur. J. A Glob. Perspect., 2013

Secure Requirement Prioritized Grid Scheduling Model.
Int. J. Netw. Secur., 2013

Self-synchronising image steganography algorithms based on error-correcting codes.
Int. J. Electron. Secur. Digit. Forensics, 2013

2012
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market.
ACM SIGSOFT Softw. Eng. Notes, 2012

Hiding Information in Vector Layer While Extracting Layers from Raster Data.
Inf. Secur. J. A Glob. Perspect., 2012

Secure Data Hiding Using Eight Queens Solutions.
Int. J. Inf. Secur. Priv., 2012

Watermarking digital vector map using graph theoretic approach.
Ann. GIS, 2012

Steganography-Based Secure Communication.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

Comparative analysis of Mamdani and Sugeno inference systems for evaluating inter-agent dependency requirements.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

2010
Graph Theoretic Approach to Steganography to Secure Message Digest.
Inf. Secur. J. A Glob. Perspect., 2010

Hiding Message in Map Along Pre-Hamiltonian Path.
Int. J. Inf. Secur. Priv., 2010

Hamiltonian graph approach to steganography.
Int. J. Electron. Secur. Digit. Forensics, 2010

1986
A reversible code over GF(q).
Kybernetika, 1986

1981
Comments on 'Error-locating codes - A new concept in error control' by J. K. Wolf and B. Elspas.
IEEE Trans. Inf. Theory, 1981

An upper bound for codes detecting low-density closed-loop bursts.
Inf. Sci., 1981

1980
A bound for random and closed loop burst error detecting codes.
Inf. Sci., 1980

A note on Reed-Muller codes.
Discret. Appl. Math., 1980


  Loading...