Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose F Fuentes, DC Kar Journal of Computing Sciences in Colleges 20 (4), 169-176, 2005 | 107 | 2005 |
Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding N Zhang, X Fang, Y Wang, S Wu, H Wu, D Kar, H Zhang IEEE Internet of Things Journal 7 (9), 9001-9010, 2020 | 60 | 2020 |
Automatic assignment management and peer evaluation A Trivedi, DC Kar, H Patterson-McNeill Journal of Computing Sciences in Colleges 18 (4), 30-37, 2003 | 49 | 2003 |
A multi-threshold based audio steganography scheme D Kar, C Mulkey Journal of Information Security and Applications 23 (C), 54-67, 2015 | 31 | 2015 |
A CORDIC-based unified systolic architecture for sliding window applications of discrete transforms DC Kar, VVB Rao IEEE Transactions on Signal processing 44 (2), 441-444, 1996 | 31 | 1996 |
On the prime factor decomposition algorithm for the discrete sine transform DC Kar, VVB Rao IEEE Transactions on Signal processing 42 (11), 3258-3260, 1994 | 24 | 1994 |
A new systolic realization for the discrete Fourier transform DC Kar, VVB Rao IEEE transactions on signal processing 41 (5), 2008-2010, 1993 | 19 | 1993 |
Hartley Transforms D Kar, B Rao Encyclopedia of Electrical and Electronics Engineering, 642-650, 1998 | 18* | 1998 |
A web-based system for Intrusion Detection A Nalluri, DC Kar Journal of Computing Sciences in Colleges 20 (4), 274-281, 2005 | 10 | 2005 |
A new analog voltage sorter VVB Rao, DC Kar IEEE transactions on instrumentation and measurement 41 (5), 714-716, 1992 | 8 | 1992 |
A new statistical attack resilient steganography scheme for hiding messages in audio files DC Kar, AM Nakka, AK Katangur International Journal of Information and Computer Security 10 (2-3), 276-302, 2018 | 7 | 2018 |
Towards an efficient protocol for privacy and authentication in wireless networks C Mulkey, D Kar, A Katangur Proceedings of the International Conference on Security and Management (SAM), 1, 2013 | 6 | 2013 |
Teaching cryptography in an applied computing program DC Kar Journal of Computing Sciences in Colleges 21 (4), 119-126, 2006 | 6 | 2006 |
Detection of plagiarism in computer programming assignments DC Kar Journal of Computing Sciences in Colleges 15 (3), 266-276, 2000 | 6 | 2000 |
Energy harvesting aware multi-hop routing policy in distributed iot system based on multi-agent reinforcement learning W Zhang, T Liu, M Xie, L Li, D Kar, C Pan 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), 562-567, 2022 | 5 | 2022 |
Few-shot learning to classify android malwares L Ale, L Li, D Kar, N Zhang, A Palikhe 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP …, 2020 | 5 | 2020 |
Network security, administration and management: advancing technology and practice DC Kar, MR Syed IGI Global snippet, 2011 | 5 | 2011 |
A Parallel, Operational Amplifier Based Design of a Selection Circuit for Rank-Order Filtering DC Kar, PK Saha Proceedings of second International Conference on Electrical and Computer …, 2002 | 5 | 2002 |
Analysis of tools for conducting Wireless Penetration Testing G Villegas, M Garcia, D Kar, D Thomas Texas: Texas A&M University-Corpus Christi, 2008 | 4 | 2008 |
Internet path characterization using common internet tools DC Kar Journal of Computing Sciences in Colleges 18 (4), 124-132, 2003 | 4 | 2003 |