|
Search the dblp DataBase
Sukumar Nandi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury
CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. [Citation Graph (0, 0)][DBLP] ICIT, 2006, pp:190-191 [Conf]
- Vinod Kone, Sukumar Nandi
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks. [Citation Graph (0, 0)][DBLP] ICIT, 2006, pp:40-45 [Conf]
- Somanath Tripathy, Atanu Roy Chowdhury, Sukumar Nandi
CARA: Cellular automata based remote-user authentication scheme. [Citation Graph (0, 0)][DBLP] COMSWARE, 2006, pp:- [Conf]
- Suresh Reddy, Sukumar Nandi
Modular approach for anomaly based NIDS. [Citation Graph (0, 0)][DBLP] COMSWARE, 2006, pp:- [Conf]
- Zhuowei Li, Amitabha Das, Sukumar Nandi
Utilizing Statistical Characteristics of N-grams for Intrusion Detection. [Citation Graph (0, 0)][DBLP] CW, 2003, pp:486-493 [Conf]
- Suresh Reddy, Sukumar Nandi
Enhanced Network Traffic Anomaly Detector. [Citation Graph (0, 0)][DBLP] ICDCIT, 2005, pp:397-403 [Conf]
- Somanath Tripathy, Sukumar Nandi
Efficient Remote User Authentication and Key Establishment for Multi-server Environment. [Citation Graph (0, 0)][DBLP] ICDCIT, 2006, pp:333-346 [Conf]
- Vivek Ramachandran, Sukumar Nandi
Detecting ARP Spoofing: An Active Technique. [Citation Graph (0, 0)][DBLP] ICISS, 2005, pp:239-250 [Conf]
- Zhifei Li, Sukumar Nandi, Anil K. Gupta
Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control. [Citation Graph (0, 0)][DBLP] ISCC, 2004, pp:176-181 [Conf]
- Zhifei Li, Sukumar Nandi, Anil K. Gupta
Improving MAC Performance in Wireless Ad Hoc Networks Using Enhanced Carrier Sensing (ECS). [Citation Graph (0, 0)][DBLP] NETWORKING, 2004, pp:600-612 [Conf]
- Zhifei Li, Sukumar Nandi, Anil K. Gupta
Modeling the Short-Term Unfairness of IEEE 802.11 in Presence of Hidden Terminals. [Citation Graph (0, 0)][DBLP] NETWORKING, 2004, pp:613-625 [Conf]
- Biswanath Dey, Sukumar Nandi
Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] ICDCN, 2006, pp:534-545 [Conf]
- Zhifei Li, Sukumar Nandi, Anil K. Gupta
ECS: An enhanced carrier sensing mechanism for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2005, v:28, n:17, pp:1970-1984 [Journal]
- Zhifei Li, Sukumar Nandi, Anil K. Gupta
Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals. [Citation Graph (0, 0)][DBLP] Perform. Eval., 2006, v:63, n:4-5, pp:441-462 [Journal]
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. [Citation Graph (, )][DBLP]
OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol. [Citation Graph (, )][DBLP]
Securing Wireless Sensor Networks Against Spurious Injections. [Citation Graph (, )][DBLP]
Improving MAC Layer Fairness in Multi-Hop 802.11 Networks. [Citation Graph (, )][DBLP]
A Strict Priority Based QoS-Aware MAC Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Seamless Handoff between IEEE 802.11 and GPRS Networks. [Citation Graph (, )][DBLP]
Enhancing Route Recovery for QAODV Routing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless Networks. [Citation Graph (, )][DBLP]
Sahnet: a secure system for ad-hoc networking using ecc. [Citation Graph (, )][DBLP]
A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks. [Citation Graph (, )][DBLP]
Distance Based Fast Hierarchical Clustering Method for Large Datasets. [Citation Graph (, )][DBLP]
Fast Single-Link Clustering Method Based on Tolerance Rough Set Model. [Citation Graph (, )][DBLP]
QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]
An Active Intrusion Detection System for LAN Specific Attacks. [Citation Graph (, )][DBLP]
A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor network. [Citation Graph (, )][DBLP]
Defense against outside attacks in wireless sensor networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.305secs
|