Implementation of 3D Obstacle Compliant Mobility Models for UAV networks in ns-3 PA Regis, S Bhunia, S Sengupta The Workshop on ns-3 (WNS3), Seattle, Washington, 2016 | 30 | 2016 |
Performance study of mobile WiMAX network with changing scenarios under different modulation and coding S Bhunia, IS Misra, SK Sanyal, A Kundu International Journal of Communication Systems 24 (8), 1087-1104, 2011 | 28 | 2011 |
Machine learning-based irrigation control optimization A Murthy, C Green, R Stoleru, S Bhunia, C Swanson, T Chaspari Proceedings of the 6th ACM International Conference on Systems for Energy …, 2019 | 26 | 2019 |
A case study of credential stuffing attack: Canva data breach MHN Ba, J Bennett, M Gallagher, S Bhunia 2021 International Conference on Computational Science and Computational …, 2021 | 25 | 2021 |
VoIP performance over broadband wireless networks under static and mobile environments A Kundu, IS Misra, SK Sanyal, S Bhunia International Journal of Wireless & Mobile Networks 2 (4), 82-93, 2010 | 25 | 2010 |
Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention S Bhunia, X Su, S Sengupta, F Vázquez-Abad International Conference on Distributed Computing and Networks (ICDCN), 438-452, 2014 | 23 | 2014 |
Line-of-Sight Discovery in 3D Using Highly Directional Transceivers MR Khan, S Bhunia, M Yuksel, L Kane IEEE Transactions on Mobile Computing, 2019 | 22 | 2019 |
Technical analysis of the nso group’s pegasus spyware JD Rudie, Z Katz, S Kuhbander, S Bhunia 2021 International Conference on Computational Science and Computational …, 2021 | 20 | 2021 |
On solarwinds orion platform security breach L Sterle, S Bhunia 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2021 | 20 | 2021 |
A review of colonial pipeline ransomware attack J Beerman, D Berent, Z Falter, S Bhunia 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet …, 2023 | 19* | 2023 |
CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN S Bhunia, S Sengupta, F Vazquez-Abad Military Communications Conference (MILCOM), 2014 IEEE, 1173-1180, 2014 | 19 | 2014 |
Vulnerability in massive api scraping: 2021 linkedin data breach B Gibson, S Townes, D Lewis, S Bhunia 2021 International Conference on Computational Science and Computational …, 2021 | 18 | 2021 |
How vmware exploits contributed to solarwinds supply-chain attack J Huddleston, P Ji, S Bhunia, J Cogan 2021 International Conference on Computational Science and Computational …, 2021 | 18 | 2021 |
CR-Honeynet: A Cognitive Radio Learning and Decoy Based Sustenance Mechanism to Avoid Intelligent Jammer S Bhunia, E Miles, S Sengupta, F Vazquez-Abad IEEE Transactions on Cognitive Communications and Networking, 2018 | 18 | 2018 |
Adaptive Beam Nulling in Multihop Ad Hoc Networks Against a Jammer in Motion S Bhunia, V Behzadan, PA Regis, S Sengupta Computer Networks, 2016 | 16 | 2016 |
Study of enhanced VoIP performance under congested wireless network scenarios A Mukhopadhyay, T Chakraborty, S Bhunia, IS Misra, SK Sanyal 2011 Third International Conference on Communication Systems and Networks …, 2011 | 14 | 2011 |
LOS Discovery in 3D for Highly Directional Transceivers M Khan, S Bhunia, M Yuksel, S Sengupta Military Communications Conference (MILCOM), 2016 | 13 | 2016 |
Performance of adaptive beam nulling in multihop ad-hoc networks under jamming S Bhunia, V Behzadan, PA Regis, S Sengupta 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 13 | 2015 |
A systematic review of 2021 microsoft exchange data breach exploiting multiple vulnerabilities AM Pitney, S Penrod, M Foraker, S Bhunia 2022 7th international conference on smart and sustainable technologies …, 2022 | 12 | 2022 |
Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling S Bhunia, S Sengupta, F Vázquez-Abad Pervasive and Mobile Computing 21, 133-149, 2015 | 12 | 2015 |