Search Results - "Barisal, Swadhin Kumar"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    BOOMPizer: Minimization and prioritization of CONCOLIC based boosted MC/DC test cases by Barisal, Swadhin Kumar, Chauhan, Shorya Pratap Singh, Dutta, Arpita, Godboley, Sangharatna, Sahoo, Bibhudatta, Mohapatra, Durga Prasad

    “…Recent research evidence indicates that the powerful testing tools, even though generate test inputs automatically for coverage measures, but not up to…”
    Get full text
    Journal Article
  2. 2

    MC/DC guided Test Sequence Prioritization using Firefly Algorithm by Barisal, Swadhin Kumar, Dutta, Arpita, Godboley, Sangharatna, Sahoo, Bibhudatta, Mohapatra, Durga Prasad

    Published in Evolutionary intelligence (01-03-2021)
    “…Optimization of the regression testing process has been playing an important role in developing quality software. Still, it is difficult to achieve…”
    Get full text
    Journal Article
  3. 3

    An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection by Kishore, Pushkar, Barisal, Swadhin Kumar, Mohapatra, Durga Prasad, Mall, Rajib

    Published in Computers & security (01-12-2023)
    “…Most malware detectors rely on machine-learning approaches. However, new malware samples are growing very fast day by day, and their labeling is very…”
    Get full text
    Journal Article
  4. 4

    CGWO: An Improved Grey Wolf Optimization Technique for Test Case Prioritization by Nayak, Gayatri, Barisal, Swadhin Kumar, Ray, Mitrabinda

    Published in Programming and computer software (01-12-2023)
    “…The convergence rate has been widely accepted as a performance measure for choosing a better metaheuristic algorithm. So, we propose a novel technique to…”
    Get full text
    Journal Article
  5. 5

    Applying unsupervised system-call based software security techniques for anomaly detection by Kishore, Pushkar, Nayak, Gayatri, Barisal, Swadhin Kumar

    “…System call analysis is a technique intended for detecting malware. The above method helps in achieving better detection accuracy. Thus, machine learning (ML)…”
    Get full text
    Journal Article
  6. 6

    SMUP: A technique to improve MC/DC using specified patterns by Barisal, Swadhin Kumar, Dutta, Arpita, Godboley, Sangharatna, Sahoo, Bibhudatta, Mohapatra, Durga Prasad

    Published in Computers & electrical engineering (01-12-2024)
    “…According to recent study, a number of poorly explored aspects, like program structure and not producing high-quality random inputs for testing, can have a…”
    Get full text
    Journal Article
  7. 7

    Validating object-oriented software at design phase by achieving MC/DC by Barisal, Swadhin Kumar, Behera, Suvam Suvabrata, Godboley, Sangharatna, Mohapatra, Durga Prasad

    “…This paper deals with a new technique for validating object-oriented software at design phase of project development. There are several modeling diagrams used…”
    Get full text
    Journal Article
  8. 8

    Security Improvement and Privacy Preservation in E-Health by Kishore, Pushkar, Barisal, Swadhin Kumar, Kumar, Kulamala Vinod, Mohapatra, Durga Prasad

    “…In today's world, all things are connected and influencing the existing applications. The E-Health domain extensively adopts IoT and presents new healthcare…”
    Get full text
    Conference Proceeding
  9. 9

    A Comparative Analysis on Traffic Flow Prediction by Das, Anuradha, Barisal, Swadhin Kumar, Dutta, Pratik

    “…Over the last few decades, as the population has been increasing day-by-day, similarly there has been an exponential increment of vehicles across the world…”
    Get full text
    Conference Proceeding
  10. 10

    Early Stage Ovarian Cancer Prediction using Machine Learning by Nayak, Chinmayee, Tripathy, Alakananda, Parhi, Manoranjan, Barisal, Swadhin Kumar

    “…The most dangerous cancer that affects women is ovarian cancer and the early-stage diagnosis is difficult. To overcome this issue, machine learning techniques…”
    Get full text
    Conference Proceeding
  11. 11

    URBAN TRAFFIC FLOW PREDICTION USING TIMEGAN MODEL by Dutta, Pratik, Das, Anuradha, Parhi, Manoranjan, Tripathy, Alakananda, Mishra, Debahuti, Barisal, Swadhin Kumar

    “…The gap between the supply and demand for road space has been widening over the past few decades as the number of cars has increased steadily. This imbalance…”
    Get full text
    Conference Proceeding
  12. 12

    NITRSCT: A Software Security tool for collection and analysis of Kernel Calls by Kishore, Pushkar, Barisal, Swadhin Kumar, Vaish, Shikhar

    “…Software security is the way of developing software such that, it should function well under malicious attack. In this paper, we design and develop an…”
    Get full text
    Conference Proceeding
  13. 13

    Particle Swarm Optimized Federated Learning For Securing IoT Devices by Kishore, Pushkar, Barisal, Swadhin Kumar, Prasad Mohapatra, Durga

    Published in 2021 IEEE Globecom Workshops (GC Wkshps) (01-12-2021)
    “…Federated learning (FL) focuses on interpreting optimization, privacy, and communication but pays little consideration to enhance training and results on the…”
    Get full text
    Conference Proceeding
  14. 14

    Family Classification of Malicious Applications using Hybrid Analysis and Computationally Economical Machine Learning Techniques by Kishore, Pushkar, Barisal, Swadhin Kumar, Mohapatra, Durga Prasad

    “…Most users utilize android smartphones for almost all activities. However, malicious attacks on these devices rose exponentially. Samples can be classified…”
    Get full text
    Conference Proceeding
  15. 15

    Familial analysis of interface and program targeting noise contained malware using image processing by Kishore, Pushkar, Barisal, Swadhin Kumar, Mohapatra, Durga Prasad

    “…Malware variants are increasing at a rapid pace and their detection is becoming a cumbersome task. A lot of work detect malware using the behavioural…”
    Get full text
    Conference Proceeding
  16. 16

    JavaScript malware behaviour analysis and detection using sandbox assisted ensemble model by Kishore, Pushkar, Barisal, Swadhin Kumar, Prasad Mohapatra, Durga

    Published in 2020 IEEE REGION 10 CONFERENCE (TENCON) (16-11-2020)
    “…Whenever any internet user visits a website, a scripting language runs in the background known as JavaScript. The embedding of malicious activities within the…”
    Get full text
    Conference Proceeding
  17. 17

    Designing Fault-Counter for Object-Oriented Software using Bagging Technique by Mishra, Sandeep Soumya Sekhar, Dutta, Pratik, Nayak, Gayatri, Tripathy, Alakananda, Kishore, Pushkar, Barisal, Swadhin Kumar

    “…In Software Engineering, the faults present in software are the most critical issues, since they produce many incorrect and unreliable results. For developing…”
    Get full text
    Conference Proceeding
  18. 18

    An incremental malware detection model for meta-feature API and system call sequence by Kishore, Pushkar, Barisal, Swadhin Kumar, Mohapatra, Durga Prasad

    “…In this technical world, the detection of malware variants is getting cumbersome day by day. Newer variants of malware make it even tougher to detect them. The…”
    Get full text
    Conference Proceeding
  19. 19

    A Comprehensive Voice Data Analysis for Parkinson's Disease Prediction via Machine Learning Techniques by Nayak, Gayatri, Dehury, Siddharth, Barisal, Swadhin Kumar, Mishra, Sandeep Soumya Sekhar, Dutta, Pratik, Jena, Lambodar

    “…This work aims to develop a Machine Learning-based system to classify patients with Parkinson's disease. The existing systems have limitations, including…”
    Get full text
    Conference Proceeding
  20. 20

    Achieving MC/DC using UML Communication Diagram by Mahanto, Parbati, Barisal, Swadhin Kumar, Mohapatra, Durga Prasad

    “…Today, in order to reduce the burdensome task of software testing, test case generation has been elongated and can be generated not only from the coding…”
    Get full text
    Conference Proceeding