Design and simulation of wireless sensor network in NS2 G Gautam, B Sen International Journal of Computer Applications 113 (16), 2015 | 44 | 2015 |
Effect of varying node density and routing zone radius in ZRP: a simulation based approach S Sinha, B Sen International Journal on Computer Science and Engineering 4 (6), 1069, 2012 | 16 | 2012 |
A trust-based intrusion detection system for mitigating blackhole attacks in MANET B Sen, MG Meitei, K Sharma, MK Ghose, S Sinha Advanced Computational and Communication Paradigms: Proceedings of …, 2018 | 13 | 2018 |
A Simulation Based Performance Analysis of AODV and DSDV Routing Protocols in MANETs B Sen, S Sinha International Journal of Modern Engineering Research (IJMER) 2 (4), 2404-2408, 2012 | 11 | 2012 |
Enhancing covid-19 safety: Exploring yolov8 object detection for accurate face mask classification S Tamang, B Sen, A Pradhan, K Sharma, VK Singh International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 10 | 2023 |
Mitigating black hole attacks in MANETs using a trust-based threshold mechanism B Sen, MG Meitei, K Sharma, MK Ghose, S Sinha International Journal of Applied Engineering Research 13 (7), 5458-5463, 2018 | 9 | 2018 |
Sensitivity analysis on AODV with Wormhole attack P Sarkar, C Kar, B Sen, K Sharma 2016 2nd International Conference on Next Generation Computing Technologies …, 2016 | 8 | 2016 |
A survey on localization and covering techniques in wireless sensor networks L Poudyal, B Sen International Journal of Computer Applications 67 (7), 2013 | 8 | 2013 |
A study on few approaches to counter security breaches in MANETs MG Meitei, B Sen Advances in Communication, Cloud, and Big Data: Proceedings of 2nd National …, 2019 | 4 | 2019 |
Survey: visual navigation for mobile robot L Nawang, S Biswaraj, G Kiran Proc. Int. Conf. on Computing and Communication (Munich), 5-11, 2016 | 4 | 2016 |
Performance Analysis of AODV And DSDV Routing Protocols in Mobile Ad Hoc Networks Under Varying Node Density S Sinha, B Sen the proceedings of international conference RTCMC-2012, OITM, Hissar, 171-174, 2012 | 4 | 2012 |
Survey on different types of security threats on wireless sensor networks G Gautam, B Sen International Journal of Computer Science and Information Technologies 6 (1 …, 2015 | 3 | 2015 |
Effect of Exponential Back-off Mechanism in MACA and MACAW for MANETs–A Study. VK Singh, S Ghatak, L Chettri, B Sen International Journal of Latest Trends in Engineering and Technology (IJLTET …, 2012 | 3 | 2012 |
Exploratory Data Analysis on IPL Data S Mohapatra, A Goswami, A Singh, VK Singh, B Sen, K Sharma Contemporary Issues in Communication, Cloud and Big Data Analytics …, 2022 | 2 | 2022 |
Effect of Exponential Back-off Mechanism in MACA and MACAW for MANETs: A Survey‖ VK Sing, S Ghatak, L Chetri, B Sen International Journal of Latest Trends in Engineering and Technology 1 (2 …, 2012 | 2 | 2012 |
Delay-based approach for prevention of rushing attack in MANETs A Adarsh, TL Tamang, P Pradhan, VK Singh, B Sen, K Sharma Contemporary Issues in Communication, Cloud and Big Data Analytics …, 2021 | 1 | 2021 |
A brief study on Contention Based Multi-Channel MAC Protocol for MANETs A Pradhan, B Sen International Journal 6 (12), 2018 | 1 | 2018 |
Impact of Varying Node Density and Pause Time in AODV B Sen, A Sharma, V Mintri, K Sharma, MK Ghose SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE …, 2014 | 1* | 2014 |
Simulation based Study on Fisheye State Routing Protocol K Gaurav, B Agarwal, A Singh, B Sen International Journal of Advanced Engineering and Nano Technology (IJAENT) 2, 0 | 1 | |
Face Mask Wearing Condition Classification using YOLOv5 trained with Hybrid Dataset S Tamang, B Sen, A Pradhan 2023 4th International Conference on Computing and Communication Systems …, 2023 | | 2023 |