Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges S Kumar, K Dutta Security and Communication Networks, 2016 | 91 | 2016 |
Hybrid Algorithm to Detect DDoS Attacks in VANETs K Adhikari, S Bhusan, S Kumar, K Dutta Wireless Personal Communications, 1-20, 2020 | 59 | 2020 |
Simulators for wireless networks: A comparative study A Kumar, SK Kaushik, R Sharma, P Raj 2012 International Conference on Computing Sciences, 338-342, 2012 | 36 | 2012 |
Performance evaluation of mobile Ad hoc networks with reactive and proactive routing protocols and mobility models SK Kaushik, K Chahal, S Singh, S Dhariwal International Journal of Computer Applications 54 (17), 2012 | 22 | 2012 |
Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks S Kumar, K Dutta Wireless Personal Communications, 2018 | 21 | 2018 |
Securing Mobile Ad Hoc Networks: Challenges and Solutions S Kumar, K Dutta International Journal of Handheld Computing Research (IJHCR) 7 (1), 26-101, 2016 | 18 | 2016 |
Security Issues in Mobile Ad Hoc Networks: A Survey S Kumar, K Dutta Security, Privacy, Trust, and Resource Management in Mobile and Wireless …, 2013 | 14 | 2013 |
A detailed survey on selfish node detection techniques for mobile ad hoc networks S Kumar, K Dutta, G Sharma 2016 Fourth IEEE International Conference on Parallel, Distributed and Grid …, 2016 | 13 | 2016 |
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks S Kumar, K Dutta International Journal of Electronics 104 (6), 1034-1049, 2017 | 11 | 2017 |
Intrusion detection technique for black hole attack in mobile ad hoc networks S Kumar, K Dutta International Journal of Information Privacy, Security and Integrity 2 (2 …, 2015 | 10 | 2015 |
Decision Tree and Neural Network Based Hybrid Algorithm for Detecting and Preventing DDoS Attacks in VANETS K Adhikari, S Bhusan, S Kumar, K Dutta International Journal of Innovative Technology and Exploring Engineering …, 2019 | 9 | 2019 |
Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications, 2021 | 8 | 2021 |
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks S Kumar, K Dutta, A Garg Wireless Personal Communications, 2018 | 6 | 2018 |
Detecting and avoiding selfish nodes in delay tolerant networks (DTNs) S Kumar International Journal of Recent Research Aspects 5 (1), 325-329, 2018 | 6 | 2018 |
Two Pass Port Scan Detection Technique Based on Connection Pattern and Status on Sampled Data S Kumar, K Dutta, A Asati Journal of Computer and Communications 3, 1-8, 2015 | 5 | 2015 |
Impact of CBR Traffic on Routing Protocols in MANETs Y Singh, A Kumar, P Rani, SK Kaushik 2014 UKSim-AMSS 16th International Conference on Computer Modelling and …, 2014 | 5 | 2014 |
Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks K Adhikary, S Bhushan, S Kumar, K Dutta International Journal of Security and Privacy in Pervasive Computing (IJSPPC …, 2020 | 4 | 2020 |
Analysis of TCP Performance over Mobile Ad Hoc Networks with Varying Speed SK Kaushik, K Chahal, S Dhariwal, A Kumar, P Raj 2012 International Conference on Computing Sciences, 193-200, 2012 | 4 | 2012 |
Evaluating the Performance of Various Machine Learning Algorithms for Detecting DDOS Attacks in VANETs K Adhikari, S Bhusan, S Kumar, K Dutta International Journal of Control and Automation 12 (5), 478 - 486, 2019 | 3 | 2019 |
Simulators for Wireless Sensor Networks: A Review R Sharma, P Sharma, VA Athavale, S Kaushik International Journal of Computer Applications 75 (6), 39-46, 2013 | 3 | 2013 |