Suman Bhunia
Suman Bhunia
Assistant Professor, Miami University - Ohio
Verified email at - Homepage
Cited by
Cited by
Implementation of 3D Obstacle Compliant Mobility Models for UAV networks in ns-3
PA Regis, S Bhunia, S Sengupta
The Workshop on ns-3 (WNS3), Seattle, Washington, 2016
Performance study of mobile WiMAX network with changing scenarios under different modulation and coding
S Bhunia, IS Misra, SK Sanyal, A Kundu
International Journal of Communication Systems 24 (8), 1087-1104, 2011
Machine learning-based irrigation control optimization
A Murthy, C Green, R Stoleru, S Bhunia, C Swanson, T Chaspari
Proceedings of the 6th ACM International Conference on Systems for Energy …, 2019
A case study of credential stuffing attack: Canva data breach
MHN Ba, J Bennett, M Gallagher, S Bhunia
2021 International Conference on Computational Science and Computational …, 2021
VoIP performance over broadband wireless networks under static and mobile environments
A Kundu, IS Misra, SK Sanyal, S Bhunia
International Journal of Wireless & Mobile Networks 2 (4), 82-93, 2010
Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention
S Bhunia, X Su, S Sengupta, F Vázquez-Abad
International Conference on Distributed Computing and Networks (ICDCN), 438-452, 2014
Line-of-Sight Discovery in 3D Using Highly Directional Transceivers
MR Khan, S Bhunia, M Yuksel, L Kane
IEEE Transactions on Mobile Computing, 2019
Technical analysis of the nso group’s pegasus spyware
JD Rudie, Z Katz, S Kuhbander, S Bhunia
2021 International Conference on Computational Science and Computational …, 2021
On solarwinds orion platform security breach
L Sterle, S Bhunia
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2021
A review of colonial pipeline ransomware attack
J Beerman, D Berent, Z Falter, S Bhunia
2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet …, 2023
CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN
S Bhunia, S Sengupta, F Vazquez-Abad
Military Communications Conference (MILCOM), 2014 IEEE, 1173-1180, 2014
Vulnerability in massive api scraping: 2021 linkedin data breach
B Gibson, S Townes, D Lewis, S Bhunia
2021 International Conference on Computational Science and Computational …, 2021
How vmware exploits contributed to solarwinds supply-chain attack
J Huddleston, P Ji, S Bhunia, J Cogan
2021 International Conference on Computational Science and Computational …, 2021
CR-Honeynet: A Cognitive Radio Learning and Decoy Based Sustenance Mechanism to Avoid Intelligent Jammer
S Bhunia, E Miles, S Sengupta, F Vazquez-Abad
IEEE Transactions on Cognitive Communications and Networking, 2018
Adaptive Beam Nulling in Multihop Ad Hoc Networks Against a Jammer in Motion
S Bhunia, V Behzadan, PA Regis, S Sengupta
Computer Networks, 2016
Study of enhanced VoIP performance under congested wireless network scenarios
A Mukhopadhyay, T Chakraborty, S Bhunia, IS Misra, SK Sanyal
2011 Third International Conference on Communication Systems and Networks …, 2011
LOS Discovery in 3D for Highly Directional Transceivers
M Khan, S Bhunia, M Yuksel, S Sengupta
Military Communications Conference (MILCOM), 2016
Performance of adaptive beam nulling in multihop ad-hoc networks under jamming
S Bhunia, V Behzadan, PA Regis, S Sengupta
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
A systematic review of 2021 microsoft exchange data breach exploiting multiple vulnerabilities
AM Pitney, S Penrod, M Foraker, S Bhunia
2022 7th international conference on smart and sustainable technologies …, 2022
Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling
S Bhunia, S Sengupta, F Vázquez-Abad
Pervasive and Mobile Computing 21, 133-149, 2015
The system can't perform the operation now. Try again later.
Articles 1–20