Sunil Kumar Muttoo
Orcid: 0000-0001-6450-9592
According to our database1,
Sunil Kumar Muttoo
authored at least 45 papers
between 1980 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Syst. Assur. Eng. Manag., May, 2024
Int. J. Syst. Assur. Eng. Manag., 2024
2022
Int. J. Syst. Assur. Eng. Manag., 2022
Int. J. Open Source Softw. Process., 2022
Int. J. Inf. Comput. Secur., 2022
Proceedings of the Computational Science and Its Applications - ICCSA 2022 Workshops, 2022
2021
Int. J. Inf. Secur. Priv., 2021
2020
Enhanced payload and trade-off for image steganography via a novel pixel digits alteration.
Multim. Tools Appl., 2020
Digit. Gov. Res. Pract., 2020
Comput. Secur., 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
2019
Meta-Heuristic Algorithms to Improve Fuzzy C-Means and K-Means Clustering for Location Allocation of Telecenters Under E-Governance in Developing Nations.
Int. J. Fuzzy Log. Intell. Syst., 2019
CENDroid - A cluster-ensemble classifier for detecting malicious Android applications.
Comput. Secur., 2019
2018
Int. J. Syst. Assur. Eng. Manag., 2018
Comparative Analysis of Pre- and Post-Classification Ensemble Methods for Android Malware Detection.
Proceedings of the Advances in Computing and Data Science, 2018
2017
Soft Comput., 2017
Fuzzy C-Means Clustering and Particle Swarm Optimization based scheme for Common Service Center location allocation.
Appl. Intell., 2017
Development of e-Governance in an Emerging Economy Like India: Assessment and Way Ahead for Key Components.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017
Proposed Framework for Information Systems Security for e-Governance in Developing Nations.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017
2016
Netw. Protoc. Algorithms, 2016
Int. J. Electron. Secur. Digit. Forensics, 2016
Implementation & Analysis of Integrated Utility System in Developing Nation like India.
Int. J. Recent Contributions Eng. Sci. IT, 2016
2015
2014
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution.
Int. J. Inf. Secur. Priv., 2014
Int. J. Electron. Secur. Digit. Forensics, 2014
Proceedings of Fourth International Conference on Soft Computing for Problem Solving, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
2013
Inf. Secur. J. A Glob. Perspect., 2013
Int. J. Electron. Secur. Digit. Forensics, 2013
2012
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market.
ACM SIGSOFT Softw. Eng. Notes, 2012
Inf. Secur. J. A Glob. Perspect., 2012
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012
Comparative analysis of Mamdani and Sugeno inference systems for evaluating inter-agent dependency requirements.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012
2010
Inf. Secur. J. A Glob. Perspect., 2010
Int. J. Electron. Secur. Digit. Forensics, 2010
1986
1981
Comments on 'Error-locating codes - A new concept in error control' by J. K. Wolf and B. Elspas.
IEEE Trans. Inf. Theory, 1981
1980