default search action
Sunil Kumar Muttoo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Sushil Kumar, Meera Sharma, Sunil Kumar Muttoo, V. B. Singh:
Inter project defect classification based on word embedding. Int. J. Syst. Assur. Eng. Manag. 15(2): 621-634 (2024) - [j34]Manju Bhardwaj, Priya Mishra, Shikha Badhani, Sunil Kumar Muttoo:
Sentiment analysis and topic modeling of COVID-19 tweets of India. Int. J. Syst. Assur. Eng. Manag. 15(5): 1756-1776 (2024) - 2022
- [j33]Shikha Badhani, Sunil Kumar Muttoo:
GENDroid - a graph-based ensemble classifier for detecting Android malware. Int. J. Inf. Comput. Secur. 18(3/4): 327-347 (2022) - [j32]Sushil Kumar, Sunil Kumar Muttoo, V. B. Singh:
Classification of Software Defects Using Orthogonal Defect Classification. Int. J. Open Source Softw. Process. 13(1): 1-16 (2022) - [j31]Maiya Din, Saibal Kumar Pal, Sunil Kumar Muttoo, Sushila Madan:
A new S-box design by applying Swarm Intelligence based technique. Int. J. Syst. Assur. Eng. Manag. 13(6): 2963-2970 (2022) - [c10]Sushil Kumar, Meera Sharma, Sunil Kumar Muttoo, V. B. Singh:
Autoclassify Software Defects Using Orthogonal Defect Classification. ICCSA (Workshops 5) 2022: 313-322 - 2021
- [j30]Manisha Duevedi, Sunil Kumar Muttoo:
An Improved Separable and Reversible Steganography in Encrypted Grayscale Images. Int. J. Inf. Secur. Priv. 15(2): 1-28 (2021) - 2020
- [j29]Vinita Verma, Sunil Kumar Muttoo, V. B. Singh:
Multiclass malware classification via first- and second-order texture statistics. Comput. Secur. 97: 101895 (2020) - [j28]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
Regional E-governance Development Index for Developing Nations. Digit. Gov. Res. Pract. 1(3): 20:1-20:26 (2020) - [j27]Vinita Verma, Sunil Kumar Muttoo, V. B. Singh:
Enhanced payload and trade-off for image steganography via a novel pixel digits alteration. Multim. Tools Appl. 79(11-12): 7471-7490 (2020) - [c9]Vinita Verma, Sunil Kumar Muttoo, V. B. Singh:
Detection of Malign and Benign PE Files Using Texture Analysis. ICISS 2020: 253-266
2010 – 2019
- 2019
- [j26]Shikha Badhani, Sunil Kumar Muttoo:
CENDroid - A cluster-ensemble classifier for detecting malicious Android applications. Comput. Secur. 85: 25-40 (2019) - [j25]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
Meta-Heuristic Algorithms to Improve Fuzzy C-Means and K-Means Clustering for Location Allocation of Telecenters Under E-Governance in Developing Nations. Int. J. Fuzzy Log. Intell. Syst. 19(4): 290-298 (2019) - 2018
- [j24]Shikha Badhani, Sunil Kumar Muttoo:
Evading android anti-malware by hiding malicious application inside images. Int. J. Syst. Assur. Eng. Manag. 9(2): 482-493 (2018) - [c8]Shikha Badhani, Sunil Kumar Muttoo:
Comparative Analysis of Pre- and Post-Classification Ensemble Methods for Android Malware Detection. ICACDS (2) 2018: 442-453 - 2017
- [j23]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
Fuzzy C-Means Clustering and Particle Swarm Optimization based scheme for Common Service Center location allocation. Appl. Intell. 47(3): 624-643 (2017) - [j22]Kanchan Hans, Laxmi Ahuja, Sunil Kumar Muttoo:
Detecting redirection spam using multilayer perceptron neural network. Soft Comput. 21(13): 3803-3814 (2017) - [c7]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
The Need of a Development Assessment Index for e-Governance in India. ICEGOV 2017: 414-422 - [c6]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
Proposed Framework for Information Systems Security for e-Governance in Developing Nations. ICEGOV 2017: 546-547 - [c5]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
Development of e-Governance in an Emerging Economy Like India: Assessment and Way Ahead for Key Components. ICEGOV 2017: 613-616 - 2016
- [j21]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
Implementation & Analysis of Integrated Utility System in Developing Nation like India. Int. J. Recent Contributions Eng. Sci. IT 4(2): 11-17 (2016) - [j20]Kanchan Hans, Laxmi Ahuja, Sunil Kumar Muttoo:
A fuzzy logic approach for detecting redirection spam. Int. J. Electron. Secur. Digit. Forensics 8(3): 191-204 (2016) - [j19]Rajan Gupta, Sunil Kumar Muttoo:
Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA. Netw. Protoc. Algorithms 8(4): 1-28 (2016) - 2015
- [j18]Mahinder Pal Singh Bhatia, Manjot Bhatia, Sunil Kumar Muttoo:
Secure Group Message Transfer Stegosystem. Int. J. Inf. Secur. Priv. 9(4): 59-76 (2015) - 2014
- [j17]Sushil Kumar, Sunil Kumar Muttoo:
Robust and secure image steganographic algorithm based on matrix embedding. Int. J. Electron. Secur. Digit. Forensics 6(3): 219-240 (2014) - [j16]Vinay Kumar, Abhishek Bansal, Sunil Kumar Muttoo:
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution. Int. J. Inf. Secur. Priv. 8(2): 55-68 (2014) - [c4]Rajan Gupta, Sunil Kumar Muttoo, Saibal Kumar Pal:
Proposal for integrated system architecture in utilities. ICACCI 2014: 1995-1998 - [c3]Mahinder Pal Singh Bhatia, Sunil Kumar Muttoo, Manjot Bhatia:
An Image Steganography Method Using Spread Spectrum Technique. SocProS (2) 2014: 215-232 - 2013
- [j15]Sunil Kumar Muttoo, Sushil Kumar:
Self-synchronising image steganography algorithms based on error-correcting codes. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 297-316 (2013) - [j14]Manjot Bhatia, Sunil Kumar Muttoo, Mahinder Pal Singh Bhatia:
Secure Requirement Prioritized Grid Scheduling Model. Int. J. Netw. Secur. 15(6): 478-483 (2013) - [j13]Manjot Bhatia, Sunil Kumar Muttoo, Mahinder Pal Singh Bhatia:
Secure Group Communication with Hidden Group Key. Inf. Secur. J. A Glob. Perspect. 22(1): 21-34 (2013) - 2012
- [j12]Sunil Kumar Muttoo, Vinay Kumar:
Watermarking digital vector map using graph theoretic approach. Ann. GIS 18(2): 135-146 (2012) - [j11]Sunil Kumar Muttoo, Vinay Kumar, Abhishek Bansal:
Secure Data Hiding Using Eight Queens Solutions. Int. J. Inf. Secur. Priv. 6(4): 55-70 (2012) - [j10]Vinay Kumar, Abhishek Bansal, Sunil Kumar Muttoo:
Hiding Information in Vector Layer While Extracting Layers from Raster Data. Inf. Secur. J. A Glob. Perspect. 21(6): 317-327 (2012) - [j9]Neeraj Kumar Sharma, Vibha Gaur, Sunil Kumar Muttoo:
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market. ACM SIGSOFT Softw. Eng. Notes 37(4): 1-19 (2012) - [c2]Vibha Gaur, Anuja Soni, Sunil Kumar Muttoo, Neeraj Jain:
Comparative analysis of Mamdani and Sugeno inference systems for evaluating inter-agent dependency requirements. HIS 2012: 131-136 - [c1]Manjot Bhatia, Sunil Kumar Muttoo, Mahinder Pal Singh Bhatia:
Steganography-Based Secure Communication. SocProS 2012: 781-792 - 2010
- [j8]Sunil Kumar Muttoo, Vinay Kumar:
Hamiltonian graph approach to steganography. Int. J. Electron. Secur. Digit. Forensics 3(4): 311-332 (2010) - [j7]Sunil Kumar Muttoo, Vinay Kumar:
Hiding Message in Map Along Pre-Hamiltonian Path. Int. J. Inf. Secur. Priv. 4(4): 21-34 (2010) - [j6]Vinay Kumar, Sunil Kumar Muttoo:
Graph Theoretic Approach to Steganography to Secure Message Digest. Inf. Secur. J. A Glob. Perspect. 19(6): 328-335 (2010)
1980 – 1989
- 1986
- [j5]Sunil Kumar Muttoo, Shankar Lal:
A reversible code over GF(q). Kybernetika 22(1): 85-91 (1986) - 1981
- [j4]Sunil Kumar Muttoo, Vinod Tyagi:
An upper bound for codes detecting low-density closed-loop bursts. Inf. Sci. 24(3): 195-199 (1981) - [j3]Bal Kishan Dass, Sunil Kumar Muttoo:
Comments on 'Error-locating codes - A new concept in error control' by J. K. Wolf and B. Elspas. IEEE Trans. Inf. Theory 27(1): 136- (1981) - 1980
- [j2]Bal Kishan Dass, Sunil Kumar Muttoo:
A note on Reed-Muller codes. Discret. Appl. Math. 2(4): 345-348 (1980) - [j1]Bal Kishan Dass, Sunil Kumar Muttoo:
A bound for random and closed loop burst error detecting codes. Inf. Sci. 20(2): 151-156 (1980)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint