Search Results - "Barisal, Swadhin Kumar"
-
1
BOOMPizer: Minimization and prioritization of CONCOLIC based boosted MC/DC test cases
Published in Journal of King Saud University. Computer and information sciences (01-11-2022)“…Recent research evidence indicates that the powerful testing tools, even though generate test inputs automatically for coverage measures, but not up to…”
Get full text
Journal Article -
2
MC/DC guided Test Sequence Prioritization using Firefly Algorithm
Published in Evolutionary intelligence (01-03-2021)“…Optimization of the regression testing process has been playing an important role in developing quality software. Still, it is difficult to achieve…”
Get full text
Journal Article -
3
An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection
Published in Computers & security (01-12-2023)“…Most malware detectors rely on machine-learning approaches. However, new malware samples are growing very fast day by day, and their labeling is very…”
Get full text
Journal Article -
4
CGWO: An Improved Grey Wolf Optimization Technique for Test Case Prioritization
Published in Programming and computer software (01-12-2023)“…The convergence rate has been widely accepted as a performance measure for choosing a better metaheuristic algorithm. So, we propose a novel technique to…”
Get full text
Journal Article -
5
Applying unsupervised system-call based software security techniques for anomaly detection
Published in Journal of information & optimization sciences (04-07-2022)“…System call analysis is a technique intended for detecting malware. The above method helps in achieving better detection accuracy. Thus, machine learning (ML)…”
Get full text
Journal Article -
6
SMUP: A technique to improve MC/DC using specified patterns
Published in Computers & electrical engineering (01-12-2024)“…According to recent study, a number of poorly explored aspects, like program structure and not producing high-quality random inputs for testing, can have a…”
Get full text
Journal Article -
7
Validating object-oriented software at design phase by achieving MC/DC
Published in International journal of system assurance engineering and management (01-08-2019)“…This paper deals with a new technique for validating object-oriented software at design phase of project development. There are several modeling diagrams used…”
Get full text
Journal Article -
8
Security Improvement and Privacy Preservation in E-Health
Published in ICC 2021 - IEEE International Conference on Communications (01-06-2021)“…In today's world, all things are connected and influencing the existing applications. The E-Health domain extensively adopts IoT and presents new healthcare…”
Get full text
Conference Proceeding -
9
A Comparative Analysis on Traffic Flow Prediction
Published in 2022 International Conference on Machine Learning, Computer Systems and Security (MLCSS) (01-08-2022)“…Over the last few decades, as the population has been increasing day-by-day, similarly there has been an exponential increment of vehicles across the world…”
Get full text
Conference Proceeding -
10
Early Stage Ovarian Cancer Prediction using Machine Learning
Published in 2023 International Conference in Advances in Power, Signal, and Information Technology (APSIT) (09-06-2023)“…The most dangerous cancer that affects women is ovarian cancer and the early-stage diagnosis is difficult. To overcome this issue, machine learning techniques…”
Get full text
Conference Proceeding -
11
URBAN TRAFFIC FLOW PREDICTION USING TIMEGAN MODEL
Published in 2023 2nd International Conference on Ambient Intelligence in Health Care (ICAIHC) (17-11-2023)“…The gap between the supply and demand for road space has been widening over the past few decades as the number of cars has increased steadily. This imbalance…”
Get full text
Conference Proceeding -
12
NITRSCT: A Software Security tool for collection and analysis of Kernel Calls
Published in TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON) (01-10-2019)“…Software security is the way of developing software such that, it should function well under malicious attack. In this paper, we design and develop an…”
Get full text
Conference Proceeding -
13
Particle Swarm Optimized Federated Learning For Securing IoT Devices
Published in 2021 IEEE Globecom Workshops (GC Wkshps) (01-12-2021)“…Federated learning (FL) focuses on interpreting optimization, privacy, and communication but pays little consideration to enhance training and results on the…”
Get full text
Conference Proceeding -
14
Family Classification of Malicious Applications using Hybrid Analysis and Computationally Economical Machine Learning Techniques
Published in 2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT) (01-11-2022)“…Most users utilize android smartphones for almost all activities. However, malicious attacks on these devices rose exponentially. Samples can be classified…”
Get full text
Conference Proceeding -
15
Familial analysis of interface and program targeting noise contained malware using image processing
Published in 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC) (16-12-2020)“…Malware variants are increasing at a rapid pace and their detection is becoming a cumbersome task. A lot of work detect malware using the behavioural…”
Get full text
Conference Proceeding -
16
JavaScript malware behaviour analysis and detection using sandbox assisted ensemble model
Published in 2020 IEEE REGION 10 CONFERENCE (TENCON) (16-11-2020)“…Whenever any internet user visits a website, a scripting language runs in the background known as JavaScript. The embedding of malicious activities within the…”
Get full text
Conference Proceeding -
17
Designing Fault-Counter for Object-Oriented Software using Bagging Technique
Published in 2023 International Conference in Advances in Power, Signal, and Information Technology (APSIT) (09-06-2023)“…In Software Engineering, the faults present in software are the most critical issues, since they produce many incorrect and unreliable results. For developing…”
Get full text
Conference Proceeding -
18
An incremental malware detection model for meta-feature API and system call sequence
Published in 2020 15th Conference on Computer Science and Information Systems (FedCSIS) (01-09-2020)“…In this technical world, the detection of malware variants is getting cumbersome day by day. Newer variants of malware make it even tougher to detect them. The…”
Get full text
Conference Proceeding -
19
A Comprehensive Voice Data Analysis for Parkinson's Disease Prediction via Machine Learning Techniques
Published in 2023 2nd International Conference on Ambient Intelligence in Health Care (ICAIHC) (17-11-2023)“…This work aims to develop a Machine Learning-based system to classify patients with Parkinson's disease. The existing systems have limitations, including…”
Get full text
Conference Proceeding -
20
Achieving MC/DC using UML Communication Diagram
Published in 2018 International Conference on Information Technology (ICIT) (01-12-2018)“…Today, in order to reduce the burdensome task of software testing, test case generation has been elongated and can be generated not only from the coding…”
Get full text
Conference Proceeding