Follow
Dulal Chandra Kar
Title
Cited by
Cited by
Year
Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose
F Fuentes, DC Kar
Journal of Computing Sciences in Colleges 20 (4), 169-176, 2005
1072005
Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding
N Zhang, X Fang, Y Wang, S Wu, H Wu, D Kar, H Zhang
IEEE Internet of Things Journal 7 (9), 9001-9010, 2020
602020
Automatic assignment management and peer evaluation
A Trivedi, DC Kar, H Patterson-McNeill
Journal of Computing Sciences in Colleges 18 (4), 30-37, 2003
492003
A multi-threshold based audio steganography scheme
D Kar, C Mulkey
Journal of Information Security and Applications 23 (C), 54-67, 2015
312015
A CORDIC-based unified systolic architecture for sliding window applications of discrete transforms
DC Kar, VVB Rao
IEEE Transactions on Signal processing 44 (2), 441-444, 1996
311996
On the prime factor decomposition algorithm for the discrete sine transform
DC Kar, VVB Rao
IEEE Transactions on Signal processing 42 (11), 3258-3260, 1994
241994
A new systolic realization for the discrete Fourier transform
DC Kar, VVB Rao
IEEE transactions on signal processing 41 (5), 2008-2010, 1993
191993
Hartley Transforms
D Kar, B Rao
Encyclopedia of Electrical and Electronics Engineering, 642-650, 1998
18*1998
A web-based system for Intrusion Detection
A Nalluri, DC Kar
Journal of Computing Sciences in Colleges 20 (4), 274-281, 2005
102005
A new analog voltage sorter
VVB Rao, DC Kar
IEEE transactions on instrumentation and measurement 41 (5), 714-716, 1992
81992
A new statistical attack resilient steganography scheme for hiding messages in audio files
DC Kar, AM Nakka, AK Katangur
International Journal of Information and Computer Security 10 (2-3), 276-302, 2018
72018
Towards an efficient protocol for privacy and authentication in wireless networks
C Mulkey, D Kar, A Katangur
Proceedings of the International Conference on Security and Management (SAM), 1, 2013
62013
Teaching cryptography in an applied computing program
DC Kar
Journal of Computing Sciences in Colleges 21 (4), 119-126, 2006
62006
Detection of plagiarism in computer programming assignments
DC Kar
Journal of Computing Sciences in Colleges 15 (3), 266-276, 2000
62000
Energy harvesting aware multi-hop routing policy in distributed iot system based on multi-agent reinforcement learning
W Zhang, T Liu, M Xie, L Li, D Kar, C Pan
2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), 562-567, 2022
52022
Few-shot learning to classify android malwares
L Ale, L Li, D Kar, N Zhang, A Palikhe
2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP …, 2020
52020
Network security, administration and management: advancing technology and practice
DC Kar, MR Syed
IGI Global snippet, 2011
52011
A Parallel, Operational Amplifier Based Design of a Selection Circuit for Rank-Order Filtering
DC Kar, PK Saha
Proceedings of second International Conference on Electrical and Computer …, 2002
52002
Analysis of tools for conducting Wireless Penetration Testing
G Villegas, M Garcia, D Kar, D Thomas
Texas: Texas A&M University-Corpus Christi, 2008
42008
Internet path characterization using common internet tools
DC Kar
Journal of Computing Sciences in Colleges 18 (4), 124-132, 2003
42003
The system can't perform the operation now. Try again later.
Articles 1–20