关注
Dr. Sunil Kumar
Dr. Sunil Kumar
Guru Jambheshwar University of Science and Technology, Hisar-125001, Haryana  India
在 gjust.org 的电子邮件经过验证
标题
引用次数
引用次数
年份
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
S Kumar, K Dutta
Security and Communication Networks, 2016
912016
Hybrid Algorithm to Detect DDoS Attacks in VANETs
K Adhikari, S Bhusan, S Kumar, K Dutta
Wireless Personal Communications, 1-20, 2020
592020
Simulators for wireless networks: A comparative study
A Kumar, SK Kaushik, R Sharma, P Raj
2012 International Conference on Computing Sciences, 338-342, 2012
362012
Performance evaluation of mobile Ad hoc networks with reactive and proactive routing protocols and mobility models
SK Kaushik, K Chahal, S Singh, S Dhariwal
International Journal of Computer Applications 54 (17), 2012
222012
Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
S Kumar, K Dutta
Wireless Personal Communications, 2018
212018
Securing Mobile Ad Hoc Networks: Challenges and Solutions
S Kumar, K Dutta
International Journal of Handheld Computing Research (IJHCR) 7 (1), 26-101, 2016
182016
Security Issues in Mobile Ad Hoc Networks: A Survey
S Kumar, K Dutta
Security, Privacy, Trust, and Resource Management in Mobile and Wireless …, 2013
142013
A detailed survey on selfish node detection techniques for mobile ad hoc networks
S Kumar, K Dutta, G Sharma
2016 Fourth IEEE International Conference on Parallel, Distributed and Grid …, 2016
132016
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
S Kumar, K Dutta
International Journal of Electronics 104 (6), 1034-1049, 2017
112017
Intrusion detection technique for black hole attack in mobile ad hoc networks
S Kumar, K Dutta
International Journal of Information Privacy, Security and Integrity 2 (2 …, 2015
102015
Decision Tree and Neural Network Based Hybrid Algorithm for Detecting and Preventing DDoS Attacks in VANETS
K Adhikari, S Bhusan, S Kumar, K Dutta
International Journal of Innovative Technology and Exploring Engineering …, 2019
92019
Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks
K Adhikary, S Bhushan, S Kumar, K Dutta
Wireless Personal Communications, 2021
82021
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks
S Kumar, K Dutta, A Garg
Wireless Personal Communications, 2018
62018
Detecting and avoiding selfish nodes in delay tolerant networks (DTNs)
S Kumar
International Journal of Recent Research Aspects 5 (1), 325-329, 2018
62018
Two Pass Port Scan Detection Technique Based on Connection Pattern and Status on Sampled Data
S Kumar, K Dutta, A Asati
Journal of Computer and Communications 3, 1-8, 2015
52015
Impact of CBR Traffic on Routing Protocols in MANETs
Y Singh, A Kumar, P Rani, SK Kaushik
2014 UKSim-AMSS 16th International Conference on Computer Modelling and …, 2014
52014
Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks
K Adhikary, S Bhushan, S Kumar, K Dutta
International Journal of Security and Privacy in Pervasive Computing (IJSPPC …, 2020
42020
Analysis of TCP Performance over Mobile Ad Hoc Networks with Varying Speed
SK Kaushik, K Chahal, S Dhariwal, A Kumar, P Raj
2012 International Conference on Computing Sciences, 193-200, 2012
42012
Evaluating the Performance of Various Machine Learning Algorithms for Detecting DDOS Attacks in VANETs
K Adhikari, S Bhusan, S Kumar, K Dutta
International Journal of Control and Automation 12 (5), 478 - 486, 2019
32019
Simulators for Wireless Sensor Networks: A Review
R Sharma, P Sharma, VA Athavale, S Kaushik
International Journal of Computer Applications 75 (6), 39-46, 2013
32013
系统目前无法执行此操作,请稍后再试。
文章 1–20