Design and simulation of wireless sensor network in NS2 G Gautam, B Sen International Journal of Computer Applications 113 (16), 2015 | 49 | 2015 |
Enhancing covid-19 safety: Exploring yolov8 object detection for accurate face mask classification S Tamang, B Sen, A Pradhan, K Sharma, VK Singh International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 34 | 2023 |
Effect of varying node density and routing zone radius in ZRP: a simulation based approach S Sinha, B Sen International Journal on Computer Science and Engineering 4 (6), 1069, 2012 | 18 | 2012 |
A trust-based intrusion detection system for mitigating blackhole attacks in MANET B Sen, MG Meitei, K Sharma, MK Ghose, S Sinha Advanced Computational and Communication Paradigms: Proceedings of …, 2018 | 14 | 2018 |
A Simulation Based Performance Analysis of AODV and DSDV Routing Protocols in MANETs B Sen, S Sinha International Journal of Modern Engineering Research (IJMER) 2 (4), 2404-2408, 2012 | 12 | 2012 |
Mitigating black hole attacks in MANETs using a trust-based threshold mechanism B Sen, MG Meitei, K Sharma, MK Ghose, S Sinha International Journal of Applied Engineering Research 13 (7), 5458-5463, 2018 | 11 | 2018 |
Sensitivity analysis on AODV with Wormhole attack P Sarkar, C Kar, B Sen, K Sharma 2016 2nd International Conference on Next Generation Computing Technologies …, 2016 | 9 | 2016 |
A survey on localization and covering techniques in wireless sensor networks L Poudyal, B Sen International Journal of Computer Applications 67 (7), 2013 | 8 | 2013 |
A study on few approaches to counter security breaches in MANETs MG Meitei, B Sen Advances in Communication, Cloud, and Big Data: Proceedings of 2nd National …, 2019 | 4 | 2019 |
Survey: visual navigation for mobile robot L Nawang, S Biswaraj, G Kiran Proc. Int. Conf. on Computing and Communication (Munich), 5-11, 2016 | 4 | 2016 |
Performance Analysis of AODV And DSDV Routing Protocols in Mobile Ad Hoc Networks Under Varying Node Density S Sinha, B Sen the proceedings of international conference RTCMC-2012, OITM, Hissar, 171-174, 2012 | 4 | 2012 |
A brief study on Contention Based Multi-Channel MAC Protocol for MANETs A Pradhan, B Sen International Journal 6 (12), 2018 | 3 | 2018 |
Survey on different types of security threats on wireless sensor networks G Gautam, B Sen International Journal of Computer Science and Information Technologies 6 (1 …, 2015 | 3 | 2015 |
Effect of Exponential Back-off Mechanism in MACA and MACAW for MANETs–A Study. VK Singh, S Ghatak, L Chettri, B Sen International Journal of Latest Trends in Engineering and Technology (IJLTET …, 2012 | 3 | 2012 |
Exploratory Data Analysis on IPL Data S Mohapatra, A Goswami, A Singh, VK Singh, B Sen, K Sharma Contemporary Issues in Communication, Cloud and Big Data Analytics …, 2022 | 2 | 2022 |
Performance analysis of 802.11 and smac protocol under sleep deprivation torture attack in wireless sensor networks G Gautam, B Sen International Journal of Computer Sciences and Engineering 3 (5), 317-322, 2015 | 2 | 2015 |
Effect of Exponential Back-off Mechanism in MACA and MACAW for MANETs: A Survey‖ VK Sing, S Ghatak, L Chetri, B Sen International Journal of Latest Trends in Engineering and Technology 1 (2 …, 2012 | 2 | 2012 |
SwinSight: a hierarchical vision transformer using shifted windows to leverage aerial image classification PK Pradhan, A Das, A Kumar, U Baruah, B Sen, P Ghosal Multimedia Tools and Applications, 1-22, 2024 | 1 | 2024 |
A Comprehensive Study on Natural Language Processing, It’s Techniques and Advancements in Nepali Language S Sharma, K Sharma, B Sen International Conference on Advanced Computational and Communication …, 2023 | 1 | 2023 |
Delay-based approach for prevention of rushing attack in MANETs A Adarsh, TL Tamang, P Pradhan, VK Singh, B Sen, K Sharma Contemporary Issues in Communication, Cloud and Big Data Analytics …, 2021 | 1 | 2021 |