default search action
Sanjay K. Dhurandher
Person information
- affiliation: Netaji Subhas University of Technology, Department of Information Technology, New Delhi, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j93]Sanjay K. Dhurandher, Nisha Kandhoul, Isaac Woungang, Han-Chieh Chao:
Energy efficient random forest classifier-based secure routing for opportunistic internet of things. Int. J. Ad Hoc Ubiquitous Comput. 46(2): 80-89 (2024) - [j92]Moulik Bhardwaj, Jagdeep Singh, Nitin Gupta, Kuldeep Singh Jadon, Sanjay Kumar Dhurandher:
A novel federated learning approach for routing optimisation in opportunistic IoT networks. Int. J. Sens. Networks 46(1): 24-38 (2024) - [j91]David W. White, Isaac Woungang, Felix O. Akinladejo, Sanjay Kumar Dhurandher, Leonard Barolli:
A network communication speedup model using multiple fungible and non-fungible paths. Internet Things 25: 101040 (2024) - [c111]Vinesh Kumar, Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Game Theory-Based Efficient Message Forwarding Scheme for Opportunistic Networks. AINA (1) 2024: 1-10 - [c110]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Federated Learning Empowered Routing for Opportunistic Network Environments. ICC Workshops 2024: 1998-2004 - 2023
- [j90]Sanjay Kumar Dhurandher, Bhoopendra Kumar, Isaac Woungang, Han-Chieh Chao:
A hybrid channel transmission method for effective spectrum access in cognitive radio networks. Int. J. Ad Hoc Ubiquitous Comput. 44(4): 221-232 (2023) - [j89]Jagdeep Singh, Sanjay Kumar Dhurandher:
SMGSAF: a secure multi-geocasting scheme for opportunistic networks. Int. J. Grid Util. Comput. 14(5): 526-538 (2023) - [j88]Nitin Gupta, Jagdeep Singh, Sanjay Kumar Dhurandher, Zhu Han:
Contract-Theory-Based Incentive Design Mechanism for Opportunistic IoT Networks. IEEE Internet Things J. 10(4): 2881-2892 (2023) - [j87]Amarjit Malhotra, Sanjay K. Dhurandher, Megha Gupta:
Data storage and range queries in ubiquitous mobile data cloud. J. Ambient Intell. Humaniz. Comput. 14(6): 7231-7245 (2023) - [j86]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Leonard Barolli:
Double Q-learning based routing protocol for opportunistic networks. J. High Speed Networks 29(1): 1-14 (2023) - [c109]Aleksander Maksimoski, Isaac Woungang, Issa Traoré, Sanjay K. Dhurandher:
Bonet Detection Mechanism Using Graph Neural Network. AINA (2) 2023: 247-257 - [c108]David W. White, Isaac Woungang, Felix O. Akinladejo, Sanjay K. Dhurandher:
A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths. BWCCA 2023: 199-208 - [c107]Karan Gupta, Sanjay Kumar Dhurandher:
CASE: Channel Allocation for optimized Spectral Efficiency using deep neural network in underlay cognitive radios. CITS 2023: 1-6 - [c106]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication. GLOBECOM 2023: 1283-1289 - [c105]Ashwin Balaji, Sanjay Kumar Dhurandher, Karan Gupta, Isaac Woungang:
Post-Quantum Based Oblivious Transfer for Authentication in Heterogeneous Internet of Everything. ICC Workshops 2023: 194-199 - [c104]David W. White, Isaac Woungang, Felix O. Akinladejo, Sanjay K. Dhurandher:
An Analysis of Theoretical Network Communication Speedup Using Multiple Fungible Paths. IMIS 2023: 68-77 - 2022
- [j85]Deepak Kumar Sharma, Sanjay K. Dhurandher, Shubham Kumaram, Koyel Datta Gupta, Pradip Kumar Sharma:
Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems. Comput. Commun. 189: 182-192 (2022) - [j84]Arun Kumar, Aniruddha A. Dutta, Nayan Jain, Sanjay K. Dhurandher:
MrFbP: Markov random field-driven spatial entropy-based routing protocol in opportunistic networks. Int. J. Commun. Syst. 35(1) (2022) - [j83]Sanjay Kumar Dhurandher, Bhoopendra Kumar:
A hybrid spectrum access approach for efficient channel allocation and power control in cognitive radio networks. Int. J. Commun. Syst. 35(6) (2022) - [j82]Ashwin Balaji, Sanjay Kumar Dhurandher:
Reliable data communication using post-quantum encryption in Internet of Everything. Int. J. Commun. Syst. 35(13) (2022) - [j81]Jagdeep Singh, Isaac Woungang, Sanjay Kumar Dhurandher, Khuram Khalid:
A jamming attack detection technique for opportunistic networks. Internet Things 17: 100464 (2022) - [j80]Sanjay Kumar Dhurandher, Bhoopendra Kumar:
An efficient radio-frequency spectrum utilization technique for cognitive radio networks. Internet Things 20: 100586 (2022) - [j79]Nisha Kandhoul, Sanjay K. Dhurandher:
Deep Q learning based secure routing approach for OppIoT networks. Internet Things 20: 100597 (2022) - [j78]Sanjay K. Dhurandher, Jagdeep Singh, Petros Nicopolitidis, Raghav Kumar, Geetanshu Gupta:
A blockchain-based secure routing protocol for opportunistic networks. J. Ambient Intell. Humaniz. Comput. 13(4): 2191-2203 (2022) - [j77]Ashwin Balaji, Sanjay Kumar Dhurandher, Isaac Woungang:
PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything. Sensors 22(18): 6928 (2022) - [j76]Koyel Datta Gupta, Ritu Nigam, Deepak Kumar Sharma, Sanjay K. Dhurandher:
LSTM-Based Energy-Efficient Wireless Communication With Reconfigurable Intelligent Surfaces. IEEE Trans. Green Commun. Netw. 6(2): 704-712 (2022) - [c103]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Game Theory-Based Energy Efficient Routing in Opportunistic Networks. AINA (1) 2022: 627-639 - [c102]A. Dimou, C. Iliopoulos, E. Polytidou, Sanjay K. Dhurandher, Georgios Papadimitriou, Petros Nicopolitidis:
A Comprehensive Review on Edge Computing: Focusing on Mobile Users. Honoring Professor Mohammad S. Obaidat 2022: 121-152 - [c101]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Geocommunity Based Data Forwarding in Social Delay Tolerant Networks. Honoring Professor Mohammad S. Obaidat 2022: 421-442 - [c100]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Periklis Chatzimisios, Joel J. P. C. Rodrigues:
Reinforcement Learning Based Congestion Control Mechanism for Opportunistic Networks. GLOBECOM (Workshops) 2022: 67-73 - [c99]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Periklis Chatzimisios:
Multivariate Gaussian Mixture-based Prediction Model for Opportunistic Networks. ICC 2022: 4932-4937 - [c98]Vinesh Kumar, Sanjay Kumar Dhurandher, Isaac Woungang, Shashank Gupta, Surajpratap Singh:
Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Approach. NBiS 2022: 182-192 - 2021
- [j75]Nisha Kandhoul, Sanjay Kumar Dhurandher, Isaac Woungang:
Random forest classifier-based safe and reliable routing for opportunistic IoT networks. Int. J. Commun. Syst. 34(1) (2021) - [j74]Isaac Woungang, Sanjay K. Dhurandher, Andrea Visconti:
Internet of Things Design, Architectures and Protocols. Internet Things 14: 100267 (2021) - [j73]Khuram Khalid, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh:
Reinforcement learning-based fuzzy geocast routing protocol for opportunistic networks. Internet Things 14: 100384 (2021) - [j72]Amarjit Malhotra, Sanjay K. Dhurandher, Megha Gupta, Bijendra Kumar:
Integer multiplication ranking method for cloud services selection. J. Ambient Intell. Humaniz. Comput. 12(2): 2003-2017 (2021) - [j71]Khuram Khalid, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh, Leonard Barolli:
A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks. J. High Speed Networks 27(1): 1-12 (2021) - [j70]Arun Kumar, Sanjay K. Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues:
Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 99-113 (2021) - [j69]Riya, Nitin Gupta, Sanjay Kumar Dhurandher:
Efficient caching method in fog computing for internet of everything. Peer-to-Peer Netw. Appl. 14(1): 439-452 (2021) - [j68]Nisha Kandhoul, Sanjay K. Dhurandher:
An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT. Wirel. Pers. Commun. 118(1): 217-237 (2021) - [c97]Khuram Khalid, Isaac Woungang, Sanjay Kumar Dhurandher, Jagdeep Singh:
Energy-Efficient Fuzzy Geocast Routing Protocol for Opportunistic Networks. AINA (1) 2021: 553-565 - [c96]Bhoopendra Kumar, Sanjay Kumar Dhurandher, Mohammad S. Obaidat:
Performance Analysis of the Spectrum Access Strategies in Cognitive Radio Networks. CITS 2021: 1-5 - [c95]Jagdeep Singh, Mohammad S. Obaidat, Sanjay K. Dhurandher:
Location based Routing in Opportunistic Networks using Cascade Learning. CITS 2021: 1-5 - [c94]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Shivin Diwakar, Periklis Chatzimisios:
Energy Efficient Multi-Objectives Optimized Routing for Opportunistic Networks. ICC 2021: 1-6 - 2020
- [j67]Amarjit Malhotra, Sanjay K. Dhurandher, Megha Gupta, Bijendra Kumar:
Best fit power weighted difference method for fog node selection in smart cities. IET Commun. 14(19): 3448-3457 (2020) - [j66]Sanjay Kumar Dhurandher, Gaurav Indra:
VTE-AKA: an optimum vector time encoding scheme for synchronising authenticated key agreements in cognitive radio ad hoc networks. IET Commun. 14(20): 3529-3540 (2020) - [j65]Nitin Gupta, Sanjay Kumar Dhurandher:
Cross-layer perspective for channel assignment in cognitive radio networks: A survey. Int. J. Commun. Syst. 33(5) (2020) - [j64]Sanjay K. Dhurandher, Jagdeep Singh, Isaac Woungang, Raghav Kumar, Geetanshu Gupta:
Message trust-based secure multipath routing protocol for opportunistic networks. Int. J. Commun. Syst. 33(8) (2020) - [j63]Gaurav Indra, Sanjay Kumar Dhurandher, Richa Raj:
Conjoint belief adaption functionality for statistically secure communication paradigm for CR-IIoTs. Int. J. Commun. Syst. 33(18) (2020) - [j62]Jitender Kumar, Amita Rani, Sanjay Kumar Dhurandher:
Convergence of user and service provider perspectives in mobile cloud computing environment: Taxonomy and challenges. Int. J. Commun. Syst. 33(18) (2020) - [j61]Mitali Bansal, Sanjay Kumar Malik, Sanjay Kumar Dhurandher, Isaac Woungang:
Policies and mechanisms for enhancing the resource management in cloud computing: a performance perspective. Int. J. Grid Util. Comput. 11(3): 345-366 (2020) - [j60]Khuram Khalid, Isaac Woungang, Sanjay Kumar Dhurandher, Jagdeep Singh, Joel J. P. C. Rodrigues:
Energy-Efficient Check-and-Spray Geocast Routing Protocol for Opportunistic Networks. Inf. 11(11): 504 (2020) - [j59]Pragya Kuchhal, Sanjay K. Dhurandher, Isaac Woungang, Vinesh Kumar, Satbir Jain, Sahil Gupta, Leonard Barolli:
Pareto set based optimized routing in opportunistic network. J. Ambient Intell. Humaniz. Comput. 11(2): 777-797 (2020) - [j58]Nitin Gupta, Sanjay Kumar Dhurandher, Aarushi Sehgal:
A Contract Theory Approach-Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks. IEEE Syst. J. 14(2): 2400-2410 (2020) - [c93]Amir Mohammadi Bagha, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré:
A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones. AINA 2020: 845-857 - [c92]Sanjay Kumar Dhurandher, Jagdeep Singh, Mohammad S. Obaidat, Isaac Woungang, Samariddhi Srivastava, Joel J. P. C. Rodrigues:
Reinforcement Learning-Based Routing Protocol for Opportunistic Networks. ICC 2020: 1-6
2010 – 2019
- 2019
- [j57]Nisha Kandhoul, Sanjay K. Dhurandher, Isaac Woungang:
T_CAFE: A Trust based Security approach for Opportunistic IoT. IET Commun. 13(20): 3463-3471 (2019) - [j56]Sanjay K. Dhurandher, Isaac Woungang, Jagdeep Singh, Satya Jyoti Borah:
Energy aware routing for efficient green communication in opportunistic networks. IET Networks 8(4): 272-279 (2019) - [j55]Deepika Kukreja, Deepak Kumar Sharma, Sanjay K. Dhurandher, B. V. Ramana Reddy:
GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks. Int. J. Adv. Intell. Paradigms 13(1/2): 230-259 (2019) - [j54]Deepika Kukreja, Sanjay K. Dhurandher, B. V. Ramana Reddy:
Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system. Int. J. Adv. Intell. Paradigms 13(3/4): 430-448 (2019) - [j53]Deepak Kumar Sharma, Sanjay Kumar Dhurandher, Divyansh Agarwal, Kunal Arora:
kROp: k-Means clustering based routing protocol for opportunistic networks. J. Ambient Intell. Humaniz. Comput. 10(4): 1289-1306 (2019) - [j52]Sanjay Kumar Dhurandher, Nitin Gupta, Petros Nicopolitidis:
Contract Theory Based Medium Access Contention Resolution in TDMA Cognitive Radio Networks. IEEE Trans. Veh. Technol. 68(8): 8026-8035 (2019) - [c91]Sanjay K. Dhurandher, Jagdeep Singh, Isaac Woungang, Mrigali Gupta, Nakul Sabharwal:
Geometric Shapes-based PSO Approach for Routing in Vehicular Networks. AFRICON 2019: 1-7 - [c90]Jagdeep Singh, Sanjay K. Dhurandher, Isaac Woungang, Makoto Takizawa:
Centrality Based Geocasting for Opportunistic Networks. AINA 2019: 702-712 - [c89]Richa Siddavaatam, Isaac Woungang, Sanjay Kumar Dhurandher:
An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks. AINA 2019: 713-724 - [c88]Sanjay K. Dhurandher, Jagdeep Singh, Isaac Woungang, Makoto Takizawa, Geetanshu Gupta, Raghav Kumar:
Fuzzy Geocasting in Opportunistic Networks. BWCCA 2019: 279-292 - [c87]Sanjay K. Dhurandher, Jagdeep Singh, Isaac Woungang, Joel J. P. C. Rodrigues:
Priority Based Buffer Management Technique for Opportunistic Networks. GLOBECOM 2019: 1-6 - [c86]Nisha Kandhoul, Sanjay Kumar Dhurandher:
An Asymmetric RSA-Based Security Approach for Opportunistic IoT. WIDECOM 2019: 47-60 - [e1]Isaac Woungang, Sanjay Kumar Dhurandher:
2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, WIDECOM 2019, Milan, Italy, February 11-13, 2019. Lecture Notes on Data Engineering and Communications Technologies 27, Springer 2019, ISBN 978-3-030-11436-7 [contents] - 2018
- [j51]Nitin Gupta, Sanjay Kumar Dhurandher, Isaac Woungang:
Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach. Trans. Emerg. Telecommun. Technol. 29(11) (2018) - [j50]Bhoopendra Kumar, Sanjay Kumar Dhurandher, Isaac Woungang:
A survey of overlay and underlay paradigms in cognitive radio networks. Int. J. Commun. Syst. 31(2) (2018) - [j49]Neeraj Garg, Sanjay K. Dhurandher, Petros Nicopolitidis, J. S. Lather:
Efficient mobility prediction scheme for pervasive networks. Int. J. Commun. Syst. 31(6) (2018) - [j48]Amarjit Malhotra, Sanjay Kumar Dhurandher, Megha Gupta, Bijendra Kumar:
EMCloud: A hierarchical volunteer cloud with explicit mobile devices. Int. J. Commun. Syst. 31(17) (2018) - [j47]Nitin Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues:
On the target channel sequence selection for multiple handoffs in cognitive radio-based wireless regional area networks. Int. J. Space Based Situated Comput. 8(4): 214-224 (2018) - [j46]Satya Jyoti Borah, Sanjay K. Dhurandher, Isaac Woungang, Vinesh Kumar, Leonard Barolli:
A multi-objectives based technique for optimized routing in opportunistic networks. J. Ambient Intell. Humaniz. Comput. 9(3): 655-666 (2018) - [j45]Deepika Kukreja, Sanjay K. Dhurandher, B. V. Ramana Reddy:
Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J. Ambient Intell. Humaniz. Comput. 9(4): 941-956 (2018) - [j44]Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Suryansh Tibarewala, Leonard Barolli:
DEEP: Distance and encounter based energy-efficient protocol for opportunistic networks. J. High Speed Networks 24(2): 119-131 (2018) - [j43]Sanjay K. Dhurandher, Satya Jyoti Borah, Isaac Woungang, Aman Bansal, Apoorv Gupta:
A location Prediction-based routing scheme for opportunistic networks in an IoT scenario. J. Parallel Distributed Comput. 118(Part): 369-378 (2018) - [j42]Maninder Singh Raniyal, Isaac Woungang, Sanjay Kumar Dhurandher, Sherif Saad Ahmed:
Passphrase protected device-to-device mutual authentication schemes for smart homes. Secur. Priv. 1(3) (2018) - [j41]Isaac Woungang, Sanjay Kumar Dhurandher, Joel J. P. C. Rodrigues, Ahmed Awad:
Special Issue on security and privacy in Internet of Things and cloud computing systems. Secur. Priv. 1(3) (2018) - [j40]Deepak Kr. Sharma, Sanjay K. Dhurandher, Isaac Woungang, Rohit Kumar Srivastava, Anhad Mohananey, Joel J. P. C. Rodrigues:
A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks. IEEE Syst. J. 12(3): 2207-2213 (2018) - [j39]Sanjay K. Dhurandher, Arun Kumar, Mohammad S. Obaidat:
Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems. IEEE Syst. J. 12(4): 3191-3202 (2018) - [j38]Jitender Kumar, Amita Malik, Sanjay K. Dhurandher, Petros Nicopolitidis:
Demand-Based Computation Offloading Framework for Mobile Devices. IEEE Syst. J. 12(4): 3693-3702 (2018) - [c85]Urvashi Choudhary, Sanjay Kumar Dhurandher, Vinesh Kumar, Isaac Woungang, Joel J. P. C. Rodrigues:
Online Signature Verification Using the Information Set Based Models. AINA 2018: 1104-1109 - [c84]Megha Gupta, Sanjay K. Dhurandher, Petros Nicopolitidis:
Intelligent and Efficient Channel Allocation in Smart Grid Neighhorhood Area Network. CITS 2018: 1-5 - [c83]Megha Gupta, Sanjay Kumar Dhurandher, Petros Nicopolitidis:
A Novel and Efficient Geocasting in OppNets. CITS 2018: 1-5 - [c82]Sanjay K. Dhurandher, Isaac Woungang, Nitin Gupta, Rishabh Jain, Devesh Singhal, Joshika Agarwal, Mohammad S. Obaidat:
Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks. GLOBECOM Workshops 2018: 1-6 - [c81]Letícia Carneiro de Souza, Joel J. P. C. Rodrigues, Gabriel Dias Scarpioni, Diego A. A. Santos, Victor Hugo C. de Albuquerque, Sanjay K. Dhurandher:
An IoT Automated Curtain System for Smart Homes. ICACCI 2018: 249-253 - [c80]Satya Jyoti Borah, Sanjay K. Dhurandher, Isaac Woungang, Nisha Kandhoul, Joel J. P. C. Rodrigues:
An Energy-Efficient Location Prediction-Based Forwarding Scheme for Opportunistic Networks. ICC 2018: 1-6 - [c79]Nitin Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat:
Proactive Decision Based Handoff Scheme for Cognitive Radio Networks. ICC 2018: 1-6 - [c78]Joshika Agarwal, Rishabh Jain, Sanjay Kumar Dhurandher, Isaac Woungang, Nitin Gupta:
Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN. INFOCOM Workshops 2018: 571-576 - [c77]Maninder Singh Raniyal, Isaac Woungang, Sanjay Kumar Dhurandher:
An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card. ISDDC 2018: 16-29 - 2017
- [j37]Satya Jyoti Borah, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar:
A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario. Comput. Networks 129: 572-584 (2017) - [j36]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Aakanksha Saini:
An energy-efficient history-based routing scheme for opportunistic networks. Int. J. Commun. Syst. 30(7) (2017) - [j35]Arun Kumar, Sanjay K. Dhurandher, Isaac Woungang, Mohammad S. Obaidat, Sahil Gupta, Joel J. P. C. Rodrigues:
An altruism-based trust-dependent message forwarding protocol for opportunistic networks. Int. J. Commun. Syst. 30(10) (2017) - [j34]Pragya Kuchhal, Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Satbir Jain, Sahil Gupta:
A* search based next hop selection for routing in opportunistic networks. Int. J. Space Based Situated Comput. 7(3): 177-186 (2017) - [j33]Sanjay Kumar Malik, Mayank Dave, Sanjay K. Dhurandher, Isaac Woungang, Leonard Barolli:
An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks. Soft Comput. 21(21): 6225-6236 (2017) - [c76]Sanjay K. Dhurandher, Arun Kumar, Isaac Woungang, Mohammad S. Obaidat:
Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks. AINA 2017: 387-391 - [c75]Abhishek Kumar, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar, Makoto Takizawa:
Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks. BWCCA 2017: 502-515 - [c74]Deepak Kr. Sharma, Sanjay K. Dhurandher, Mohammad S. Obaidat, Aman Bansal, Apoorv Gupta:
Genetic algorithm and probability based routing protocol for Opportunistic Networks. CITS 2017: 58-62 - [c73]Satya Jyoti Borah, Sanjay K. Dhurandher, Suryansh Tibarewala, Isaac Woungang, Mohammad S. Obaidat:
Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks. GLOBECOM 2017: 1-6 - [c72]Nitin Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues:
Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks. GLOBECOM 2017: 1-6 - [c71]Maninder Singh Raniyal, Isaac Woungang, Sanjay Kumar Dhurandher:
An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel. ISDDC 2017: 95-117 - [c70]Deepak Kumar Sharma, Sanjay Kumar Dhurandher, Isaac Woungang, Aman Bansal, Apoorv Gupta:
GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks. NBiS 2017: 611-622 - 2016
- [j32]Isaac Woungang, Sanjay Kumar Dhurandher:
Introduction to the special section on cognitive radios as next-generation wireless networks. Comput. Electr. Eng. 52: 223-225 (2016) - [j31]Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Rajender Dheeraj Peddi:
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks. Secur. Commun. Networks 9(5): 420-428 (2016) - [c69]Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Deepak Kumar Sharma, Kunal Arora, Divyansh Agarwal:
EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks. AINA 2016: 297-302 - [c68]Sanjay K. Dhurandher, Satya Jyoti Borah, Isaac Woungang, Sahil Gupta, Pragya Kuchal, Makoto Takizawa, Leonard Barolli:
A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks. BWCCA 2016: 491-499 - [c67]Amarpreet Bamrah, Isaac Woungang, Leonard Barolli, Sanjay Kumar Dhurandher, Glaucio H. S. Carvalho, Makoto Takizawa:
A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks. CISIS 2016: 130-136 - [c66]Deepak Kumar Sharma, Sanjay K. Dhurandher, Mohammad S. Obaidat, Sahil Pruthi, Balqies Sadoun:
A priority based message forwarding scheme for Opportunistic Networks. CITS 2016: 1-5 - [c65]Vani Shrivastav, Sanjay K. Dhurandher, Isaac Woungang, Vinesh Kumar, Joel J. P. C. Rodrigues:
Game Theory-Based Channel Allocation in Cognitive Radio Networks. GLOBECOM 2016: 1-5 - [c64]Bhagyashri Tushir, Sanjay K. Dhurandher, Isaac Woungang, Mohammad S. Obaidat, Vinesh Teotia:
Graph colouring technique for efficient channel allocation in cognitive radio networks. ICC 2016: 1-5 - [c63]Khuram Khalid, Isaac Woungang, Sanjay K. Dhurandher, Leonard Barolli, Glaucio H. S. Carvalho, Makoto Takizawa:
An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks. IMIS 2016: 237-244 - [c62]Monika Pathak, Sanjay K. Dhurandher, Isaac Woungang, Bhagyashri Tushir, Vinesh Kumar, Makoto Takizawa, Leonard Barolli:
Power Control Scheme for Underlay Approach in Cognitive Radio Networks. NBiS 2016: 114-118 - [c61]Vinesh Kumar, Sanjay K. Dhurandher, Bhagyashri Tushir, Mohammad S. Obaidat:
Channel Allocation in Cognitive Radio Networks using Evolutionary Technique. WINSYS 2016: 106-112 - 2015
- [j30]Sanjay Kumar Dhurandher, Deepak Kr. Sharma, Sahil Gupta, Isaac Woungang, Mohammad S. Obaidat:
Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks. J. Networks 10(12): 642-657 (2015) - [j29]Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat, Kirti Kumar, Mamta Joshi, Monika Verma:
A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks. IEEE Syst. J. 9(2): 595-604 (2015) - [j28]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Aakanksha Saini:
Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks. J. Supercomput. 71(5): 1694-1711 (2015) - [c60]Ssowjanya Harishankar, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré, Shakira Banu Kaleel:
E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks. AINA 2015: 29-36 - [c59]Parampreet Sidhu, Isaac Woungang, Glaucio H. S. Carvalho, Alagan Anpalagan, Sanjay K. Dhurandher:
An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks. AINA Workshops 2015: 332-337 - [c58]Vinesh Teotia, Sanjay K. Dhurandher, Isaac Woungang, Mohammad S. Obaidat:
Markovian Model Based Channel Allocation in Cognitive Radio Networks. DSDIS 2015: 478-482 - [c57]Vinesh Teotia, Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat:
Wormhole prevention using COTA mechanism in position based environment over MANETs. ICC 2015: 7036-7040 - [c56]Sanjay K. Dhurandher, Isaac Woungang, Anshu Rajendra, Piyush Ghai, Periklis Chatzimisios:
A Centrality-Based ACK Forwarding Mechanism for Efficient Routing in Infrastructureless Opportunistic Networks. IoT 360 (1) 2015: 99-108 - [c55]Sanjay K. Dhurandher, Satya Jyoti Borah, Mohammad S. Obaidat, Deepak Kr. Sharma, Sahil Gupta, Bikash Baruah:
Probability-based Controlled Flooding in Opportunistic Networks. WINSYS 2015: 3-8 - 2014
- [j27]Mohammad S. Obaidat, Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo:
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks. Secur. Commun. Networks 7(2): 376-384 (2014) - [j26]Sanjay K. Dhurandher, Mohammad S. Obaidat, Amrit Jaiswal, Akanksha Tiwari, Ankur Tyagi:
Vehicular Security Through Reputation and Plausibility Checks. IEEE Syst. J. 8(2): 384-394 (2014) - [j25]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Rohan Gupta, Sanjay Garg:
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks. J. Supercomput. 69(3): 1183-1214 (2014) - [c54]Sanjay K. Dhurandher, Isaac Woungang, Issa Traoré:
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks. AINA Workshops 2014: 530-535 - [c53]Sanjay K. Dhurandher, Mohammad S. Obaidat, Isaac Woungang, Pragya Agarwal, Abhishek Gupta, Prateek Gupta:
A cluster-based load balancing algorithm in cloud computing. ICC 2014: 2921-2925 - [c52]Deepika Kukreja, Sanjay Kumar Dhurandher, B. V. Ramana Reddy:
Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs. ISI (2) 2014: 83-94 - [c51]Mohit Miglani, Deepika Kukreja, Sanjay Kumar Dhurandher, B. V. Ramana Reddy:
Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks. SSCC 2014: 45-56 - 2013
- [j24]Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang:
Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks. J. Internet Serv. Inf. Secur. 3(1/2): 37-48 (2013) - [j23]Sanjay K. Dhurandher, Mohammad S. Obaidat, Megha Gupta:
Energized geocasting model for underwater wireless sensor networks. Simul. Model. Pract. Theory 37: 125-138 (2013) - [j22]Isaac Woungang, Sanjay Kumar Dhurandher, Lakshaya Agnani, Ankit Mahendru, Alagan Anpalagan:
An ant-swarm inspired dynamic multiresolution data dissemination protocol for wireless sensor networks. J. Supercomput. 65(2): 524-542 (2013) - [c50]Sanjay K. Dhurandher, Isaac Woungang, Raveena Mathur, Prashant Khurana:
GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs. AINA Workshops 2013: 357-362 - [c49]Sanjay K. Dhurandher, Isaac Woungang, Sahil Sharma, Veeresh Goswami:
A Priority Based Differentiation for Contention Mechanism in Legacy DCF Method. AINA Workshops 2013: 478-482 - [c48]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Shruti Bhati:
HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks. AINA 2013: 931-936 - [c47]Isaac Woungang, Mohammad S. Obaidat, Sanjay Kumar Dhurandher, Issa Traoré:
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks. CITS 2013: 1-5 - [c46]Isaac Woungang, Sanjay Kumar Dhurandher, Michael Sahai:
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath. GPC 2013: 517-525 - [c45]Akash Gangil, Sanjay K. Dhurandher, Mohammad S. Obaidat, Vijit Singh, Sushant Bhatia:
MOCLO: A Cloud Framework for Mobile Devices. GreenCom/iThings/CPScom 2013: 632-637 - [c44]Isaac Woungang, Mohammad S. Obaidat, Sanjay Kumar Dhurandher, Alexander Ferworn, Waqas Shah:
An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks. ICC 2013: 3645-3649 - [c43]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang:
Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks. MobiQuitous 2013: 757-767 - [c42]Sahil Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Arun Kumar, Mohammad S. Obaidat:
Trust-based Security Protocol against blackhole attacks in opportunistic networks. WiMob 2013: 724-729 - 2012
- [j21]Sanjay K. Dhurandher, Mohammad S. Obaidat, Megha Gupta:
An acoustic communication based AQUA-GLOMO simulator for underwater networks. Hum. centric Comput. Inf. Sci. 2: 3 (2012) - [j20]Sanjay K. Dhurandher, Mohammad S. Obaidat, Megha Gupta:
Providing reliable and link stability-based geocasting model in underwater environment. Int. J. Commun. Syst. 25(3): 356-375 (2012) - [c41]Sanjay Kumar Dhurandher, Isaac Woungang, Kirti Kumar, Mamta Joshi, Monika Verma:
A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks. AINA 2012: 38-43 - [c40]Sanjay Kumar Dhurandher, Isaac Woungang, Abhishek Gupta, Bharat K. Bhargava:
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks. AINA Workshops 2012: 472-477 - [c39]Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré:
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. FPS 2012: 308-323 - [c38]Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo, Issa Traoré:
Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks. GLOBECOM Workshops 2012: 1037-1041 - [c37]Sanjay K. Dhurandher, Mohammad S. Obaidat, Deepti Bhardwaj, Ankush Garg:
GROOV: A geographic routing over VANETs and its performance evaluation. GLOBECOM 2012: 1670-1675 - [c36]Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Han-Chieh Chao, Chris Liu:
Trust-enhanced message security protocol for mobile ad hoc networks. ICC 2012: 988-992 - [c35]Sanjay K. Dhurandher, Mohammad S. Obaidat, Amit Kumar Jaiswal, Akanksha Tiwari, Ankur Tyagi:
Traffic optimization through information dissemination. ICC 2012: 1928-1932 - [c34]Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Abhishek Gupta, Prateek Gupta, Siddharth Goel:
Optimizing Energy using Probabilistic Routing in Underwater Sensor Network. SIMULTECH 2012: 409-416 - 2011
- [j19]Sanjay K. Dhurandher, Sudip Misra, Harsh Mittal, Anubhav Agarwal, Isaac Woungang:
Using ant-based agents for congestion control in ad-hoc wireless sensor networks. Clust. Comput. 14(1): 41-53 (2011) - [j18]Mohammad S. Obaidat, Sanjay K. Dhurandher, Khushboo Diwakar:
CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks. J. Inf. Process. Syst. 7(2): 241-260 (2011) - [j17]Sanjay K. Dhurandher, Sudip Misra, Puneet Pruthi, Shubham Singhal, Saurabh Aggarwal, Isaac Woungang:
Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks. J. Netw. Comput. Appl. 34(5): 1498-1508 (2011) - [j16]Sanjay K. Dhurandher, Mohammad S. Obaidat, Megha Gupta:
An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation. Simul. Model. Pract. Theory 19(9): 2102-2116 (2011) - [j15]Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta, Pravina Dhurandher:
FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems. IEEE Syst. J. 5(2): 176-188 (2011) - [c33]Sanjay K. Dhurandher, Isaac Woungang, Ishan Uppal, Hitesh Bhanushali, Deepank Gupta:
A Dot Net framework based physical testbed for ad hoc network routing protocols. CCECE 2011: 229-233 - [c32]Sanjay K. Dhurandher, Mohammad S. Obaidat, Siddharth Goel, Abhishek Gupta:
Optimizing Energy through Parabola Based Routing in Underwater Sensor Networks. GLOBECOM 2011: 1-5 - [c31]Jing-Wei Huang, Isaac Woungang, Han-Chieh Chao, Mohammad S. Obaidat, Ting-Yun Chi, Sanjay K. Dhurandher:
Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks. GLOBECOM 2011: 1-5 - [c30]Che-Yu Liu, Isaac Woungang, Han-Chieh Chao, Sanjay K. Dhurandher, Ting-Yun Chi, Mohammad S. Obaidat:
Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher. GLOBECOM 2011: 1-5 - [c29]Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Han-Chieh Chao:
Performance evaluation of various routing protocols in Opportunistic Networks. GLOBECOM Workshops 2011: 1067-1071 - [c28]Sanjay K. Dhurandher, Ankit Aggarwal, Aashish Bhandari, Abhishek Verma, Mohammad S. Obaidat, Isaac Woungang:
Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture. iThings/CPSCom 2011: 67-73 - [c27]Mohammad S. Obaidat, Harsh Bedi, Aashish Bhandari, M. S. Don Bosco, Ankur Maheshwari, Sanjay K. Dhurandher, Isaac Woungang:
Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System. iThings/CPSCom 2011: 82-88 - [c26]Sanjay K. Dhurandher, Mohammad S. Obaidat, Ankit Mahendru, Lakshaya Agnani:
Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation. SpringSim (CNS) 2011: 5-10 - [c25]Sanjay K. Dhurandher, Mohammad S. Obaidat, Mayank Gupta:
Application of Ant Colony Optimization to Develop Energy Efficient Protocol in Mobile Ad-Hoc Networks. WINSYS 2011: 12-17 - 2010
- [j14]Sudip Misra, Sanjay K. Dhurandher, Avanish Rayankula, Deepansh Agrawal:
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Comput. Electr. Eng. 36(2): 367-382 (2010) - [j13]Sanjay K. Dhurandher, Sudip Misra, Mohammad S. Obaidat, Mukta Gupta, Khushboo Diwakar, Pushkar Gupta:
Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks. IET Commun. 4(7): 826-836 (2010) - [j12]Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta, Anupriya Asthana:
DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments. J. Inf. Process. Syst. 6(3): 269-294 (2010) - [j11]Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, Pushkar Gupta, Karan Verma, Prayag Narula:
An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks. J. Syst. Softw. 83(11): 2188-2199 (2010) - [j10]Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta:
A low-overhead fault-tolerant routing algorithm for mobile ad hoc networks: A scheme and its simulation analysis. Simul. Model. Pract. Theory 18(5): 637-649 (2010) - [c24]Sanjay K. Dhurandher, Mohammad S. Obaidat, Megha Gupta:
A novel Geocast technique with hole detection in underwater sensor networks. AICCSA 2010: 1-8 - [c23]Sanjay K. Dhurandher, Mohammad S. Obaidat, Pulkit Jindal, Rajneesh Chavli, Sanchit Valecha:
Predictive multi-hop stable routing in Vehicular Ad Hoc Networks. AICCSA 2010: 1-6 - [c22]Prasad Naik Hamsavath, G. V. Singh, Sanjay K. Dhurandher:
Object Location in Cluster Based Mobile Ad Hoc Networks. BAIP 2010: 53-59 - [c21]Sanjay K. Dhurandher, Mohammad S. Obaidat, Gaurav Jain, Isha Mani Ganesh, Vinay Shashidhar:
An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting. GreenCom/CPSCom 2010: 374-379 - [c20]Sanjay K. Dhurandher, Mohammad S. Obaidat, Khushboo Diwakar:
A mechanism for reducing congestion while routing bulky data in Mobile Ad Hoc Networks. ICECS 2010: 142-145 - [c19]Sanjay K. Dhurandher, Mohammad S. Obaidat, Mukta Gupta:
A reactive Optimized Link State Routing protocol for Mobile ad hoc networks. ICECS 2010: 367-370 - [c18]Sanjay K. Dhurandher, Megha Gupta:
Link stability based geocasting model for underwater sensor networks. ICWET 2010: 380-386 - [c17]Sanjay K. Dhurandher, Mohammad S. Obaidat, Deepank Gupta, Nidhi Gupta, Anupriya Asthana:
Network Layer based Secure Routing Protocol for Wireless Ad Hoc Sensor Networks in Urban Environments. WINSYS 2010: 23-28
2000 – 2009
- 2009
- [j9]Sanjay K. Dhurandher, Sudip Misra, Sombir Ahlawat, Neelesh Gupta, Nitesh Gupta:
E2-SCAN: an extended credit strategy-based energy-efficient security scheme for wireless ad hoc networks. IET Commun. 3(5): 808-819 (2009) - [j8]Sanjay K. Dhurandher, Sudip Misra, A. Dhawan, Akanksha Tiwari:
Efficient solutions to various routing issues involved in mobile ad hoc bio-sensor networks: applying appropriate motion trajectories. IET Commun. 3(5): 830-845 (2009) - [j7]Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Vikrant Bansal, Prithvi Raj Singh, Vikas Punia:
EEAODR: An energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks. Int. J. Commun. Syst. 22(7): 789-817 (2009) - [j6]Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Nidhi Gupta:
An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Secur. Commun. Networks 2(2): 215-224 (2009) - [j5]Sanjay K. Dhurandher, Sushil Khairwal, Mohammad S. Obaidat, Sudip Misra:
Efficient data acquisition in underwater wireless sensor Ad Hoc networks. IEEE Wirel. Commun. 16(6): 70-78 (2009) - [c16]Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Inderpreet Singh, Raghu Agarwal, Bhuvnesh Bhambhani:
Simulating Peer-to-Peer networks. AICCSA 2009: 336-341 - [c15]Sanjay Kumar Dhurandher, Sudip Misra, Harsh Mittal, Anubhav Agarwal, Isaac Woungang:
Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks. AICCSA 2009: 492-497 - [c14]Sanjay Kumar Dhurandher, Shubham Singhal, Saurabh Aggarwal, Puneet Pruthi, Sudip Misra, Isaac Woungang:
A Swarm Intelligence-based P2P file sharing protocol using Bee Algorithm. AICCSA 2009: 690-696 - [c13]Sudip Misra, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Mukta Gupta, Khushboo Diwakar, Pooja Gupta:
Optimizing Power Utilization in Vehicular Ad Hoc Networks through Angular Routing: A Protocol and Its Performance Evaluation. GLOBECOM 2009: 1-5 - [c12]Madhur Garg, Jaspreet Singh, Jitesh Sachdeva, Harsh Mittal, Sanjay K. Dhurandher:
Aragog Semantic Search Engine - Beyond the Limits of Keyword Search. KEOD 2009: 21-27 - [c11]Anshul Saxena, Keshav Dubey, Sanjay K. Dhurandher, Isaac Woungang:
Tarantula - A Scalable and Extensible Web Spider. KMIS 2009: 167-172 - [c10]Sanjay K. Dhurandher, Sudip Misra, Mohammad S. Obaidat, Pushkar Gupta, Karan Verma, Prayag Narula:
An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms. ICC 2009: 1-5 - [c9]Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, Inderpreet Singh, Bhuvnesh Bhambhani, Raghu Agarwal:
On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks. ICC 2009: 1-5 - [c8]Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta:
Using Ant-Like Agents for Fault-Tolerant Routing in Mobile Ad-Hoc Networks. ICC 2009: 1-5 - [c7]Sanjay K. Dhurandher, Sudip Misra, Mohammad S. Obaidat, Priyedev Lochab, Varun Kumar Sharma, Siddharth Gautam:
An efficient power-aware broadcast technique for wireless ad hoc networks. SpringSim 2009 - [r2]Prayag Narula, Sudip Misra, Sanjay Kumar Dhurandher:
Evolutionary Computing Approach for Ad-Hoc Networks. Encyclopedia of Artificial Intelligence 2009: 589-595 - [r1]Prayag Narula, Sudip Misra, Sanjay Kumar Dhurandher:
Swarm Intelligence Approach for Ad-Hoc Networks. Encyclopedia of Artificial Intelligence 2009: 1530-1536 - 2008
- [j4]Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang:
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Comput. Commun. 31(4): 760-769 (2008) - [j3]Sanjay Kumar Dhurandher, G. V. Singh:
Highly stable and adaptive clustering with efficient routing in wireless ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 3(2): 68-81 (2008) - [j2]Sanjay K. Dhurandher, Sudip Misra, Mohammad S. Obaidat, Sushil Khairwal:
UWSim: A Simulator for Underwater Sensor Networks. Simul. 84(7): 327-338 (2008) - [j1]Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, Namit Nangia, Nitin Bhardwaj, Pankaj Goyal, Sumit Aggarwal:
Node Stability-Based Location Updating in Mobile Ad-Hoc Networks. IEEE Syst. J. 2(2): 237-247 (2008) - [c6]Sanjay K. Dhurandher, Sudip Misra, Namit Nangia, Nitin Bhardwaj, Pankaj Goyal, Sumit Aggarwal, Mohammad S. Obaidat:
An Efficient Approach for Location Updating in Mobile Ad Hoc Networks. Annual Simulation Symposium 2008: 61-67 - [c5]Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Vikrant Bansal, Prithvi Raj Singh, Vikas Punia:
An Energy-Efficient On-Demand Routing algorithm for Mobile Ad-Hoc Networks. ICECS 2008: 958-961 - [c4]Sanjay K. Dhurandher, Sudip Misra, Deepansh Agrawal, Avanish Rayankula:
Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks. ICSNC 2008: 197-201 - [c3]Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Nidhi Gupta:
QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization. WiMob 2008: 598-602 - 2007
- [c2]Sanjay Kumar Dhurandher, G. V. Singh:
Stable Clustering with Efficient Routing in Wireless Ad Hoc Networks. COMSWARE 2007 - 2005
- [c1]Sanjay Kumar Dhurandher, G. V. Singh:
Power Aware Cluster Efficient Routing in Wireless Ad Hoc Networks. IWDC 2005: 281-286
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint