Sukumar Nandi
#88,855
Most Influential Person Now
Indian computer scientist
Sukumar Nandi's AcademicInfluence.com Rankings
Sukumar Nandicomputer-science Degrees
Computer Science
#4332
World Rank
#4558
Historical Rank
Database
#7567
World Rank
#7851
Historical Rank

Download Badge
Computer Science
Why Is Sukumar Nandi Influential?
(Suggest an Edit or Addition)According to Wikipedia, Professor Sukumar Nandi is senior member of IEEE and is in Department of Computer Science and Engineering at the Indian Institute of Technology Guwahati. He did his Ph.D. from IIT Kharagpur under Professor P. Pal Chaudhri. He joined IIT Guwahati, and has been teaching there since 1995. He is also a member of the Board of Governors of IIT Guwahati.
Sukumar Nandi's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Additive cellular automata : theory and applications (1997) (469)
- Theory and Applications of Cellular Automata in Cryptography (1994) (388)
- A new similarity measure using Bhattacharyya coefficient for collaborative filtering in sparse data (2015) (212)
- A tutorial survey on vehicular communication state of the art, and future research directions (2019) (121)
- An Outlier Detection Method Based on Clustering (2011) (104)
- Route Stability Based QoS Routing in Mobile Ad Hoc Networks (2010) (103)
- Detecting ARP Spoofing: An Active Technique (2005) (87)
- Comments on "Theory and Applications of Cellular Automata in Cryptography" (1997) (82)
- Additive Cellular Automata Theory and Applications Volume I (1997) (73)
- Full auto rate MAC protocol for wireless ad hoc networks (2005) (68)
- Deciding Handover Points Based on Context-Aware Load Balancing in a WiFi-WiMAX Heterogeneous Network Environment (2016) (59)
- Improving the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad hoc networks (2005) (57)
- Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals (2004) (51)
- Online Voting System Powered by Biometric Security Using Steganography (2011) (48)
- Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract (2021) (43)
- A distance based clustering method for arbitrary shaped clusters in large datasets (2011) (43)
- Analysis of Periodic and Intermediate Boundary 90/150 Cellular Automata (1996) (39)
- LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption (2009) (39)
- Managing Smart Home Appliances with Proof of Authority and Blockchain (2019) (39)
- Influence of edge weight on node proximity based link prediction methods: An empirical analysis (2016) (39)
- LAN attack detection using Discrete Event Systems. (2011) (39)
- Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol (2011) (38)
- A Multipath QoS Routing with Route Stability for Mobile Ad Hoc Networks (2010) (35)
- A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor network (2008) (35)
- Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization (2016) (35)
- Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city (2019) (34)
- ECS: An enhanced carrier sensing mechanism for wireless ad hoc networks (2005) (34)
- Machine Learning Based Approach to Detect Position Falsification Attack in VANETs (2019) (34)
- Detection of neighbor discovery protocol based attacks in IPv6 network (2013) (34)
- QoS Aware Stable path Routing (QASR) Protocol for MANETs (2008) (34)
- Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks (2015) (33)
- Improving MAC Performance in Wireless Ad Hoc Networks Using Enhanced Carrier Sensing (ECS) (2004) (32)
- Sequencegram: n-gram modeling of system calls for program based anomaly detection (2011) (32)
- Defense against outside attacks in wireless sensor networks (2008) (31)
- Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system (2017) (31)
- Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control (2004) (30)
- Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach (2015) (27)
- An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks (2018) (26)
- Detection of De-authentication Denial of Service attack in 802.11 networks (2013) (26)
- Network specific false alarm reduction in intrusion detection system (2011) (26)
- A host based DES approach for detecting ARP spoofing (2011) (26)
- Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks (2016) (25)
- Length based network steganography using UDP protocol (2011) (25)
- Detection of NDP based attacks using MLD (2012) (24)
- A robust compressed domain video watermarking in P-frames with controlled bit rate increase (2013) (24)
- A multihop routing protocol for wireless sensor network based on grid clustering (2015) (23)
- Cellular automata as a BIST structure for testing CMOS circuits (1994) (23)
- Analysis and Design of Adders for Approximate Computing (2017) (23)
- Temporal link prediction in multi-relational network (2018) (23)
- Exploiting Bhattacharyya Similarity Measure to Diminish User Cold-Start Problem in Sparse Data (2014) (23)
- Modified Optimized Link State Routing (M-OLSR) for Wireless Mesh Networks (2008) (23)
- A comparative survey of approximate adders (2016) (22)
- PE File Features in Detection of Packed Executables (2012) (21)
- Towards reducing false alarms in network intrusion detection systems with data summarization technique (2013) (20)
- An efficient blockchain‐based approach for cooperative decision making in swarm robotics (2019) (20)
- Statistical analysis of network traffic inter-arrival (2010) (20)
- Effective data summarization for hierarchical clustering in large datasets (2013) (20)
- Performance modeling and evaluation of IEEE 802.11 IBSS power save mode (2014) (19)
- Improving fairness in IEEE 802.11 using enhanced carrier sensing (2004) (19)
- Utilizing statistical characteristics of N-grams for intrusion detection (2003) (19)
- A parallel algorithm to construct Voronoi diagram and its VLSI architecture (1999) (19)
- Proportional fairness in MAC layer channel access of IEEE 802.11s EDCA based wireless mesh networks (2013) (19)
- Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection (2010) (19)
- Discrete event system framework for fault diagnosis with measurement inconsistency: case study of rogue DHCP attack (2019) (18)
- Emotion Dynamics of Public Opinions on Twitter (2020) (18)
- IEEE 802.11s Mesh Backbone for Vehicular Communication: Fairness and Throughput (2013) (18)
- Performance Modeling and Analysis of IEEE 802.11 IBSS PSM in Different Traffic Conditions (2015) (18)
- A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless Networks (2009) (18)
- An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification (2011) (17)
- Distance Based Fast Hierarchical Clustering Method for Large Datasets (2010) (17)
- A DES approach to intrusion detection system for ARP spoofing attacks (2010) (17)
- CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs (2019) (17)
- Priority Based Fairness Provisioning QoS-Aware MAC Protocol (2007) (17)
- QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks (2006) (17)
- HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments (2021) (16)
- Weight based clustering in wireless sensor networks (2013) (16)
- Analysis, Modeling and Optimization of Equal Segment Based Approximate Adders (2019) (16)
- Detection of Packet Length Based Network Steganography (2010) (16)
- An efficient class of SEC-DED-AUED codes (1997) (15)
- Enhancing Route Recovery for QAODV Routing in Mobile Ad Hoc Networks (2008) (15)
- A Route Stability Based Multipath QoS Routing (SMQR) in MANETs (2008) (15)
- Obfuscated malware detection using API call dependency (2012) (15)
- ML-Based Approach to Detect DDoS Attack in V2I Communication Under SDN Architecture (2018) (15)
- An active DES based IDS for ARP spoofing (2011) (15)
- Machine Learning Based Approach to Detect Wormhole Attack in VANETs (2019) (14)
- Impact of Security Attacks on Cooperative Driving Use Case: CACC Platooning (2018) (14)
- Fault resilience in sensor networks: Distributed node-disjoint multi-path multi-sink forwarding (2015) (14)
- Context Aware Handover Management: Sustaining QoS and QoE in a Public IEEE 802.11e Hotspot (2014) (14)
- NDoT: Nearest Neighbor Distance Based Outlier Detection Technique (2011) (14)
- A technique for classification of VoIP flows in UDP media streams using VoIP signalling traffic (2014) (14)
- An Overview of Digital Audio Steganography (2019) (14)
- MCRD: Motion coherent region detection in H.264 compressed video (2013) (13)
- A Tree-Based Local Repairing Approach for Increasing Lifetime of Query Driven WSN (2011) (13)
- MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing (2018) (13)
- Steganalysis of Network Packet Length Based Data Hiding (2013) (13)
- Stealth steganography in visual cryptography for half tone images (2008) (13)
- Power Efficient and Low Latency MAC for Wireless Sensor Networks (2006) (12)
- Preventing COVID-19 Spread Using Information and Communication Technology (2021) (12)
- On performance improvement issues in unordered Tuple Space based Mobile Middleware (2010) (12)
- An Active Intrusion Detection System for LAN Specific Attacks (2010) (12)
- MPFSLP: Masqueraded Probabilistic Flooding for Source-Location Privacy in VANETs (2020) (12)
- Fast Single-Link Clustering Method Based on Tolerance Rough Set Model (2009) (12)
- An Active Host-Based Detection Mechanism for ARP-Related Attacks (2011) (12)
- Misbehavior Detection in C-ITS Using Deep Learning Approach (2018) (11)
- An architectural framework for seamless handoff between IEEE 802.11 and UMTS networks (2013) (11)
- Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITY (2012) (11)
- EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers (2019) (11)
- Implementation and performance evaluation of AODV in Wireless Mesh Networks using NS-3 (2010) (11)
- Study of IEEE 802.11 Fairness and its Interaction with Routing Mechanism (2003) (11)
- InOvIn: A fuzzy-rough approach for detecting overlapping communities with intrinsic structures in evolving networks (2020) (10)
- Application of stochastic discrete event system framework for detection of induced low rate TCP attack. (2015) (10)
- An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network (2021) (10)
- A Cross-layer QoS Mapping Framework for Mobile Ad Hoc Networks (2008) (10)
- Distance based fast outlier detection method (2010) (10)
- An empirical approach towards characterization of encrypted and unencrypted VoIP traffic (2019) (10)
- Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT Applications (2019) (10)
- MCDM based trust model for secure routing in Wireless Mesh Networks (2011) (10)
- PGIREM: Reliability-Constrained IR Drop Minimization and Electromigration Assessment of VLSI Power Grid Networks Using Cooperative Coevolution (2018) (9)
- Survey of Textbased Chatbot in Perspective of Recent Technologies (2018) (9)
- Fuzzy mega cluster based anomaly network intrusion detection (2009) (9)
- Efficient computation of Euclidean distance transform for applications in image processing (1998) (9)
- Architecture of a VLSI chip for modelling amino acid sequence in proteins (1996) (9)
- Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment (2018) (9)
- Exploring Approximate Computing for Yield Improvement via Re-design of Adders for Error-Resilient Applications (2016) (9)
- Secure user-identification and key distribution scheme preserving anonymity (2008) (9)
- Additive cellular automata as an on-chip test pattern generator (1993) (9)
- E-AODV for Wireless Mesh Networks and Its Performance Evaluation (2011) (9)
- Detection of packed malware (2012) (9)
- PowerPlanningDL: Reliability-Aware Framework for On-Chip Power Grid Design using Deep Learning (2020) (9)
- Robust Mutual Authentication for Low-cost RFID Systems (2006) (9)
- An improvement to the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad networks (2004) (9)
- Cross Layer Adaptation for QoS in WSN (2011) (8)
- An improvement of ODMRP for reliable delivery of busty traffic (2003) (8)
- Distance based Incremental Clustering for Mining Clusters of Arbitrary Shapes (2013) (8)
- Distributed Service Level Flow Control and Fairness in Wireless Mesh Networks (2015) (8)
- A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network (2011) (8)
- A Full Auto Rate ( FAR ) MAC Protocol for Wireless Ad Hoc Networks (2004) (8)
- Beyond conventional routing protocols: Opportunistic path selection for IEEE 802.11s mesh networks (2013) (8)
- Packet Header Attack by Hardware Trojan in NoC based TCMP and its Impact Analysis (2021) (8)
- Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor Network (2006) (8)
- Analysis of VBR coded VoIP for traffic classification (2013) (8)
- Exploiting reciprocity toward link prediction (2018) (8)
- Exhaustive two-pattern generation with cellular automata (1992) (7)
- A Blockchain-Based Approach for Usage Based Insurance and Incentive in ITS (2019) (7)
- Reply to Comments on "Theory and Application of Cellular Automata in Cryptography" (1997) (7)
- Securing Wireless Sensor Networks Against Spurious Injections (2007) (7)
- A reliable and total order tree based broadcast in wireless sensor network (2011) (7)
- On the Security of Remote Key Less Entry for Vehicles (2018) (7)
- Adaptation of MAC Layer for QoS in WSN (2011) (7)
- Impacts of refresh interval parameters on M-OLSR performance for Wireless Mesh Networks (2009) (7)
- Leader Election in Cooperative Adaptive Cruise Control Based Platooning (2018) (7)
- A new tuple space structure for tuple space based mobile middleware platforms (2012) (7)
- Vertical Handover Over Intermediate Switching Framework: Assuring Service Quality for Mobile Users (2014) (7)
- LandLedger: Blockchain-powered Land Property Administration System (2019) (7)
- Performance Analysis of IEEE 802 . 11 DCF : Throughput , Delay , and Fairness (2004) (7)
- A VLSI architecture for cellular automata based Reed-Solomon decoder (1999) (7)
- Cellular architecture for euclidean distance transformation (2000) (7)
- Enhancing QoS Support in Mobile Ad Hoc Networks (2007) (7)
- Research and application of One-class small hypersphere support vector machine for network anomaly detection (2011) (6)
- Smart Contract Based Decentralized Parking Management in ITS (2019) (6)
- Seamless V2I Communication in HetNet: State-of-the-Art and Future Research Directions (2020) (6)
- Context Aware Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks (2011) (6)
- Dead flit attack on NoC by hardware trojan and its impact analysis (2021) (6)
- TCP performance for WLAN-GPRS handover in an Intermediate Switching Network based framework (2011) (6)
- Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network (2020) (6)
- Energy efficient secure communication architecture for wireless sensor network (2016) (6)
- An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics (2012) (6)
- Tuple space enhancements for mobile middleware (2014) (6)
- Service differentiation using priority-based MAC protocol in MANETs (2010) (6)
- EQPR: Enhancing QoS in Named Data Networking using Priority and RTT Driven PIT Replacement Policy (2019) (6)
- PGRDP: Reliability, Delay, and Power-Aware Area Minimization of Large-Scale VLSI Power Grid Network Using Cooperative Coevolution (2020) (6)
- ADCROSS: Adaptive Data Collection from Road Surveilling Sensors (2014) (6)
- Machine Learning Approach for Fast Electromigration Aware Aging Prediction in Incremental Design of Large Scale On-chip Power Grid Network (2020) (6)
- An Efficient Distributed Algorithm for Finding Virtual Backbones in Wireless Ad-Hoc Networks (2005) (6)
- Convergecast tree management from arbitrary node failure in sensor network (2013) (6)
- Blockchain based Security Framework for P2P Filesharing system (2018) (6)
- Markov Chain Model Using Lévy Flight for VLSI Power Grid Analysis (2017) (6)
- Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity (2018) (6)
- A High-Performance Energy-Efficient Hybrid Redundant MAC for Error-Resilient Applications (2015) (5)
- Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks (2015) (5)
- Theory and design of SEC-DED-AUED codes (1998) (5)
- A Strict Priority Based QoS-Aware MAC Protocol for Mobile Ad Hoc Networks (2008) (5)
- CCAPS: Cooperative Context Aware Privacy Scheme for VANETs (2019) (5)
- Throughput Analysis of the IEEE 802 . 11 Power Save Mode in Single Hop Ad hoc Networks (2011) (5)
- CRP: Cluster head Re-election Protocol for heterogeneous wireless sensor networks (2013) (5)
- Link prediction on evolving social network using spectral analysis (2013) (5)
- Accuracy enhancement of equal segment based approximate adders (2018) (5)
- MAC Layer Channel Access and Forwarding in a Directional Multi-Interface Mesh Network (2015) (5)
- INTEGRATING BLOCKCHAIN WITH CACC FOR TRUST AND PLATOON MANAGEMENT (2020) (5)
- Context Aware Inter-BSS Handoff in IEEE 802.11 Networks: Efficient Resource Utilization and Performance Improvement (2014) (5)
- A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks (2008) (5)
- An Active Detection Mechanism for Detecting ICMP Based Attacks (2012) (5)
- Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack (2012) (5)
- Evaluating transport protocol performance over a wireless mesh backbone (2014) (5)
- A Behaviour based Framework for Worm Detection (2012) (4)
- OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol (2007) (4)
- PGOpt: Multi-objective design space exploration framework for large-Scale on-chip power grid design in VLSI SoC using evolutionary computing technique (2021) (4)
- A novel crash-tolerant data gathering in wireless sensor networks (2012) (4)
- Formalization of a Fully-Decoupled Reactive Tuple Space Model for Mobile Middleware (2012) (4)
- A hierarchical routing protocol providing stability and distribution for MANET (2003) (4)
- Seamless Handoff between IEEE 802.11 and GPRS Networks (2010) (4)
- CRT-KPS: A Key Predistribution Schemes Using CRT (2018) (4)
- Dynamic Tree Switching for Distributed Message-Passing Applications (2013) (4)
- Data Summarization Based Fast Hierarchical Clustering Method for Large Datasets (2009) (4)
- Tolerance Rough Set Theory Based Data Summarization for Clustering Large Datasets (2011) (4)
- Exploit detection techniques for STP using distributed IDS (2011) (4)
- Machine Learning for VLSI CAD: A Case Study in On-Chip Power Grid Design (2021) (4)
- Quality of Service provisioning in Named Data Networking via PIT entry reservation and PIT replacement policy (2020) (4)
- Aloe: Fault-Tolerant Network Management and Orchestration Framework for IoT Applications (2020) (4)
- Evaluating the effect of path diversity over QoS and QoE in a high speed indoor mesh backbone (2014) (4)
- Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (2012) (4)
- Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset (2011) (4)
- Performance optimization in single channel directional multi-interface IEEE 802.11s EDCA using beam prioritization (2012) (4)
- A Scalable Energy Efficient and Delay Bounded Data Gathering Framework for Large Scale Sensor Network (2011) (4)
- Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers (2011) (4)
- Exploring gradient in sensor deployment pattern for data gathering with sleep based energy saving (2013) (4)
- Gateway-based multicast protocol - a novel multicast protocol for mobile ad hoc networks (2005) (4)
- Security in Mobile agent systems with Locator mechanism (2012) (4)
- Theory and applications of cellular automata for synthesis of easily testable combinational logic (1995) (4)
- Improving MPTCP Performance by Enabling Sub-Flow Selection over a SDN Supported Network (2018) (3)
- Defending concealedness in IEEE 802.11n (2014) (3)
- Architectures of mobile middleware: A taxonomic perspective (2012) (3)
- I2-diagnosability framework for detection of Advanced Stealth Man in the Middle attack in Wi-Fi networks (2015) (3)
- Delay Fault Test Generation with Cellular Aulhomata (1993) (3)
- IDS for ARP spoofing using LTL based discrete event system framework (2013) (3)
- Evaluation of the end-to-end TCP performance for vertical handover using intermediate switching network (2014) (3)
- Peer-to-Peer Network Classification Using nu-Maximal Margin Spherical Structured Multiclass Support Vector Machine (2010) (3)
- QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks (2009) (3)
- Gateway-based Multicast Protocol for Mobile Ad Hoc Networks (2003) (3)
- Intrusion detection system for identification of throughput degradation attack on TCP (2016) (3)
- MAC layer fairness in IEEE 802.11 DCF based Wireless Mesh Networks (2012) (3)
- A Simplified Adaptive Decision Feedback Equalization Technique for π/4-DQPSK Signals (2008) (3)
- Video streaming over IoV using IP multicast (2021) (2)
- Bleeding Edge DDoS Mitigation Techniques for ISPs (2005) (2)
- A class of key-node indexed hash chains based key predistribution (KPS): Signed weighted graphs (2019) (2)
- Stage Staffing Scheme for Copyright Protection in Multimedia (2011) (2)
- Selective greedy routing: exploring the path diversity in backbone mesh networks (2014) (2)
- A Time Aware Method for Predicting Dull Nodes and Links in Evolving Networks for Data Cleaning (2016) (2)
- LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem (2019) (2)
- DTLS based secure group communication scheme for Internet of Things (2020) (2)
- Using Digital Tokens to Improve Amortized Performance of eSign (2018) (2)
- A Single Chip Implementation of AES Cipher and Whirlpool Hash Function (2009) (2)
- Attention based English-Bodo Neural Machine Translation System for Tourism Domain (2019) (2)
- AsNER - Annotated Dataset and Baseline for Assamese Named Entity recognition (2022) (2)
- An outlier detection method based on cluster pruning (2014) (2)
- Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique (2020) (2)
- Data rate, path length and network contention trade-off in IEEE 802.11s mesh networks: A dynamic data rate selection approach (2015) (2)
- Context Awarw Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks (2011) (2)
- A parallel skeletonization algorithm and its VLSI architecture (1998) (2)
- FLIPPER: Fault-tolerant distributed network management and control (2017) (2)
- Incremental Approach for Detecting Arbitrary and Embedded Cluster Structures (2016) (2)
- RelBAS: Reliable data gathering from border area sensors (2013) (2)
- Publicly verifiable secret sharing scheme in hierarchical settings using CLSC over IBC (2017) (2)
- Enhanced service differentiation using priority-based MAC protocol for MANETs (2012) (2)
- Bivariate gamma distribution: A plausible solution for joint distribution of packet arrival and their sizes (2010) (2)
- QoS associated path selection in wireless mesh networks (2014) (2)
- BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network (2020) (2)
- LLM:Low Latency MAC Protocol for Wireless Sensor Networks (2006) (2)
- Leveraging the trade-off between spatial reuse and channel contention in wireless mesh networks (2016) (2)
- SAS: Seasonality Aware Social-Based Forwarder Selection in Delay Tolerant Networks (2020) (2)
- Contrast various tests for primality (2016) (2)
- Early detection of VoIP network flows based on sub-flow statistical characteristics of flows using machine learning techniques (2014) (2)
- Adaptive path selection for high throughput Heterogeneous Wireless Mesh Networks (2015) (2)
- Received signal based minimization of broadcast storm in multi-hop MANET (2006) (2)
- Energy-Efficient Data Gathering for Road-Side Sensor Networks Ensuring Reliability and Fault-Tolerance (2013) (2)
- Designing a Blockchain Based Framework for IoT Data Trade (2020) (2)
- Impact of redundant sensor deployment over data gathering performance: A model based approach (2016) (1)
- An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks (2011) (1)
- Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters (2016) (1)
- Secure, Privacy Enhanced and Anonymous Communication between Vehicle and Infrastructure (2019) (1)
- ReFIT: Reliability Challenges and Failure Rate Mitigation Techniques for IoT Systems (2020) (1)
- ERBAR : an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks (2003) (1)
- Topology Management Ensuring Reliability in Delay Sensitive Sensor Networks with Arbitrary Node Failures (2014) (1)
- ArsPAN: Attacker Revelation Scheme using Discrete Event System in 6LoWPAN based Buffer Reservation Attack (2020) (1)
- Temporal link prediction in multi-relational network (2017) (1)
- TA-ACS: A Trust Aware Adaptive Carrier Selection Scheme for Reliable Routing in Delay Tolerant Networks (2020) (1)
- Supporting Tuple Space based Mobile Middleware over unreliable mobile infrastructures: Design and formal specifications (2012) (1)
- Modular Approach for Anomaly Based NIDS (2006) (1)
- Reduplication in Assamese: Identification and Modeling (2022) (1)
- Performance analysis of lattice reduction‐assisted precoder for multi‐user millimeter wave MIMO system (2021) (1)
- Application specific processor design implementation to monitor seismic activity (2016) (1)
- M-HRP for Wireless Mesh Networks and its performance evaluation (2014) (1)
- Mobility Assisted Efficient Coverage Control in Cluster Based Sensor Networks (2011) (1)
- CASE: CELLULAR AUTOMATA BASED SYMMETRIC ENCRYPTION (2007) (1)
- A Secure Location Service in Mobile Ad Hoc Networks (2003) (1)
- Hybrid Precoding Algorithm for Millimeter-Wave Massive MIMO-NOMA Systems (2022) (1)
- Scalability of correlation clustering (2018) (1)
- Hardware Trojan Mitigation for Securing On-chip Networks from Dead Flit Attacks (2022) (1)
- Completeness of LAN Attack Detection Using Discrete Event Systems (2011) (1)
- Demystifying Security on NDN: A Survey of Existing Attacks and Open Research Challenges (2020) (1)
- Copyright Protection in Digital Multimedia (2011) (1)
- Improving MAC Layer Fairness in Multi-Hop 802.11 Networks (2007) (1)
- Multi-objective routing optimizations in cluster based Sensor Networks (2012) (1)
- Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm (2011) (1)
- Probabilistic model checking of IEEE 802.11 IBSS power save mode (2014) (1)
- Approxhash: delay, power and area optimized approximate hash functions for cryptography applications (2017) (1)
- Exploring Approximate Computing for Yield Improvement via Re-design of Adders for Error-Resilient Applications (2016) (1)
- Securing On-chip Interconnect against Delay Trojan using Dynamic Adaptive Caging (2022) (1)
- Pruning based method for outlier detection (2012) (1)
- OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks (2023) (1)
- New class of t-error correcting and all unidirectional error detecting (t-EC/AUED) codes (1995) (1)
- Compressed Domain Robust Video Watermarking (2012) (1)
- Achieving fairness for multi-class traffic in directional multi-interface IEEE 802.11s MCCA (2012) (1)
- A mechanism to recover voice from logged VoIP sessions based on RTP (2011) (1)
- Achieving MAC layer fairness in wireless mesh backbone based vehicular network (2011) (1)
- An incremental approach for hierarchical community mining in evolving social graphs (2021) (1)
- Survey of broadcasting techniques for dense wireless computing devices (2006) (1)
- Self-Similar Traffic and Buffer Overflow: A Bounded Buffer Allocation Approach (2009) (1)
- Primary Path Effect in Multi-Path TCP: How Serious Is It for Deployment Consideration? (2017) (1)
- Distributed Gateway Selection for Video Streaming in VANET Using IP Multicast (2022) (1)
- CARMA: Cellular Automata Based Remote Mutual Authentication Scheme (2006) (1)
- Sensory Data Gathering for Road Traffic Monitoring: Energy Efficiency, Reliability, and Fault Tolerance (2015) (1)
- Surpassing flow fairness in a mesh network: How to ensure equity among end users? (2013) (1)
- An architectural framework for seamless handoff between IEEE 802.11 and UMTS networks (2012) (0)
- POSTER: Distributed Lagrangean Clustering Protocol (2013) (0)
- Differential cryptanalysis of Substitution Permutation network (2016) (0)
- Generating Monolingual Dataset for Low Resource Language Bodo from old books using Google Keep (2022) (0)
- Efficient Integration of the Multicast Routing Protocol and the Reliable MAC Protocol for MANETs (2005) (0)
- Modular Approach for Anomaly Based NIDS (2006) (0)
- Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications (2013) (0)
- Enhancing Qo SS upport i nM obile Ad Hoc Networks (2006) (0)
- AsPOS: Assamese Part of Speech Tagger using Deep Learning Approach (2022) (0)
- LPECN (2021) (0)
- Alternate Crop Prediction using Artificial Intelligence: A Case Study in Assam (2021) (0)
- SCAN: Smart Collaborative Attack in Named Data Networking (2020) (0)
- Using Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign (2019) (0)
- A Survey on QoS based routing protocols for MANET (2019) (0)
- LPECN: Leveraging PIT placement and explicit marking for congestion control in NDN (2021) (0)
- Steganalysis of Network Packet Length Based Data Hiding (2012) (0)
- MAC LAYER FAIRNESS ISSUES IN MULTI-HOP WIRELESS AD HOC NETWORKS (2007) (0)
- A study on the channel bonding in IoT networks: Requirements, applications, and challenges (2023) (0)
- AN EFFICIENT MOBILE CONTROLLED AND NETWORK ASSISTED HANDOFF PROPOSAL FOR IEEE 802.11 NETWORKS (2007) (0)
- Energy Efficient Approximate MACs (2021) (0)
- Tree-Based Group Diffie-Hellman for subgroup communication in M2M networks (2021) (0)
- Programmable cellular automata based testbed for fault diagnosis in VLSI circuits (1996) (0)
- An empirical approach towards characterization of encrypted and unencrypted VoIP traffic (2019) (0)
- Prioritized Quality of Service Support Medium Access Control for Real Time Flows (2010) (0)
- Scalable Implementation of Active Detection Mechanism for LAN Based Attacks (2011) (0)
- Context Aware Inter-BSS Handoff in IEEE 802.11 Networks: Efficient Resource Utilization and Performance Improvement (2014) (0)
- CARA: Cellular Automata Based Remote-User Authentication Scheme (2006) (0)
- Sahnet: a secure system for ad-hoc networking using ecc (2007) (0)
- Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks (2013) (0)
- An Artificial Intelligence-Based Approach Towards Segregation of Folk Songs (2021) (0)
- SECURE CLUSTER HEAD ELECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS (2007) (0)
- V-CARE: A Blockchain Based Framework for Secure Vehicle Health Record System (2020) (0)
- ML for IEEE 802.15. 4e/TSCH: Energy Efficient Approach to Detect DDoS Attack Using Machine Learning (2021) (0)
- Topology Management Ensuring Reliability in Delay Sensitive Sensor Networks with Arbitrary Node Failures (2014) (0)
- Adaptive Lagrangean Clustering Protocol (2012) (0)
- Integrated ABB and DVS: A Post-silicon Tuning Approach for Parametric Yield Enhancement in Sub-45nm CMOS Technology (2019) (0)
- Neighborhood Based Clustering Method for Arbitrary Shaped Clusters (2011) (0)
- Vertical Handover Over Intermediate Switching Framework: Assuring Service Quality for Mobile Users (2013) (0)
- Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization (2014) (0)
- Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss (2019) (0)
- Amalgam: Distributed Network Control With Scalable Service Chaining (2020) (0)
- Quality of Service Model and Signaling for Cellular IP Access Network (2004) (0)
- A Discrete Event System Based Approach for Obfuscated Malware Detection (2015) (0)
- Online Network Attack Detection using Statistical Features (2021) (0)
- Effective data summarization for hierarchical clustering in large datasets (2013) (0)
- Proceedings - CIS Workshops 2007, 2007 International Conference on Computational Intelligence and Security Workshops: Message from the general chairs (2007) (0)
- Smart inter‐operable vehicular communication using hybrid IEEE 802.11p, IEEE 802.16d/e technology (2021) (0)
- Is QUIC Quicker Than TCP? - A Performance Evaluation (2019) (0)
- An Adaptive and Lightweight Solution to Detect Mixed Rate IP Spoofed DDoS Attack in IoT Ecosystem (2018) (0)
- A Caching Mechanism To Improve The Reliability Of Multicasting In Multihop (0)
- Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network (2022) (0)
- Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles (2021) (0)
- JSpongeGen: A Pseudo Random Generator for Low Resource Devices (2018) (0)
- Tighter end-to-end delay bound for aggregate traffic scheduling (2010) (0)
- Exploiting reciprocity toward link prediction (2017) (0)
- RobustMutualAuthentication forLow-cost RFIDSystems (2006) (0)
- Variability-aware parametric yield enhancement via post-silicon tuning of hybrid redundant MAC units (2015) (0)
- Need for cross layer in wireless multi hop ad-hoc networks (2011) (0)
- Distributed smart camera network and mobile devices (2011) (0)
- Cellular automata-based authentication for low-cost RFID systems (2009) (0)
- A new class of t-error correcting/d-error detecting (d>t) and all unidirectional error detecting codes (1997) (0)
- Zone Based Seamless Vertical Handoff Technique between WiFi and WiMax (2011) (0)
- An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks (2018) (0)
- Achieving MAC Fairness in Wireless Ad-hoc Networks by Cooperation between Sender and Receiver (2004) (0)
- An Efficient Authenticated Asymmetric Key Exchange Scheme (2000) (0)
- Evaluating DASH QoE with MPTCP Under Different MPTCP Buffer Sizes and Path Latencies (2021) (0)
- Network layer specific attacks and their detection mechanisms (2011) (0)
- A new block ciphering scheme (1998) (0)
- DisTree: A scheme for DHT (2013) (0)
- TopologyAdaptiveComputationof DistributedIDSSet forDetectingAttacksonSTP (2012) (0)
- Privacy Enhanced Attribute based eSign (2020) (0)
- Scalability of correlation clustering (2017) (0)
- Effective injection of adversarial botnet attacks in IoT ecosystem using evolutionary computing (2023) (0)
- A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh Backbone (2012) (0)
- A Novel Approach to Assimilate VANET Communication using (WAVE) Wireless Access Vehicular Environment Protocol (2016) (0)
- DAISS: Design of an Attacker Identification Scheme in CoAP Request/Response Spoofing (2021) (0)
- Scalability of Correlation Clustering Through Constraint Reduction (2014) (0)
- Selective greedy routing: exploring the path diversity in backbone mesh networks (2014) (0)
- LIENE: Lifetime Enhancement for 6LoWPAN Network Using Clustering Approach Use Case: Smart Agriculture (2021) (0)
- Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption (2020) (0)
- Dynamic Tree Switching for Distributed Message-Passing Applications (2013) (0)
- A CAD tool for design of on-chip store and generate scheme (1994) (0)
- Survey and analysis of Modern Authentication system (2016) (0)
- Intermediate Analysis of Periodic and Boundary 90/150 Cellular Automata (1996) (0)
- Enhanced Network Traffic Anomaly Detector (2005) (0)
- Evaluating DASH Player QoE with MPTCP in Presence of a Shared Bottleneck Link (2019) (0)
- A Blockchain-based Approach for Optimal Energy Dispatch and Fault Reporting in P2P Microgrid (2021) (0)
- A New Class of t-Error Correcting / d-Error Detecting (d > t) and All Unidirectional Error Detecting Codes (1999) (0)
- Cryptosystem for Low Power Devices (2006) (0)
- FMAC / CSR : a Fair MAC Protocol for Wireless Ad-hoc Networks (2004) (0)
- Efficient Remote User Authentication and Key Establishment for Multi-server Environment (2006) (0)
This paper list is powered by the following services:
Other Resources About Sukumar Nandi
What Schools Are Affiliated With Sukumar Nandi?
Sukumar Nandi is affiliated with the following schools: