default search action
Suman Bhunia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Mohammad Sagor, Amran Haroon, Radu Stoleru, Suman Bhunia, Ala Altaweel, Mengyuan Chao, Liuyi Jin, Maxwell Maurice, Roger Blalock:
DistressNet-NG: A Resilient Data Storage and Sharing Framework for Mobile Edge Computing in Cyber-Physical Systems. ACM Trans. Cyber Phys. Syst. 8(3): 37:1-37:31 (2024) - [j12]Xiazhi Lai, Honglu Jiang, Suman Bhunia, Huy Tran:
Reducing Latency in MEC Networks With Short-Packet Communications. IEEE Trans. Veh. Technol. 73(2): 3000-3004 (2024) - [c38]Hongxiang He, Josh Self, Kelton French, Suman Bhunia, Mohammad Salman, Paulo Alexandre Regis:
Zerologon Explored: In-Depth Analysis and Mitigation Strategies for Microsoft's Critical Vulnerability. CCGridW 2024: 150-157 - [c37]Chloe Stejskal, Alexander Perminov, Aaron Lester, Suman Bhunia, Mohammad Salman, Paulo Alexandre Regis:
Analyzing the Impact and Implications of COMB: A Comprehensive Study of 3 Billion Breached Credentials. CCGridW 2024: 158-167 - [c36]Jacob Sorn, Patrick Carroll, Zachary Pang, Suman Bhunia, Mohammad Salman, Paulo Alexandre Regis:
Exploring the CAM4 Data Breach: Security Vulnerabilities and Response Strategies. CCGridW 2024: 174-179 - [c35]Jintao Cao, Allie Null, Marissa Stewart, Suman Bhunia, Mohammad Salman:
Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 282-287 - [c34]Monu Chaudhary, Suman Bhunia:
Understanding Blockchain Trilemma, Causes and Solutions. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 609-616 - [c33]Suman Bhunia, Yicheng Qian, Mahmudur Khan:
Electronically Steerable Mobile Optical-Wireless Mesh-Network. SysCon 2024: 1-6 - [c32]Suman Bhunia, Owen Campbell, Arthur Carvalho, Vamsi Alluri:
SCeFSTA: Smart Contract enabled Fair, Secure, and Transparent Auction for Healthcare Transportation. SysCon 2024: 1-8 - [c31]Angela Grace Famera, Raj Mani Shukla, Suman Bhunia:
Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT. SysCon 2024: 1-8 - 2023
- [j11]Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity, Suman Bhunia:
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. IEEE Trans. Dependable Secur. Comput. 20(3): 2516-2532 (2023) - [c30]Jack Beerman, David Berent, Zach Falter, Suman Bhunia:
A Review of Colonial Pipeline Ransomware Attack. CCGridW 2023: 8-15 - [c29]Arthur Carvalho, Liudmila Zavolokina, Suman Bhunia, Monu Chaudhary, Nitharsan Yoganathan:
Promoting Inclusiveness and Fairness through NFTs: The Case of Student-Athletes and NILs. CHI 2023: 176:1-176:9 - [c28]Peter Jamieson, Suman Bhunia, Dhananjai M. Rao:
With ChatGPT, Do We have to Rewrite Our Learning Objectives - CASE Study in Cybersecurity. FIE 2023: 1-5 - [c27]Nicholas Perry, Suman Bhunia:
Crossfire Attack Detection in 6G Networks with the Internet of Things (IoT). IFIPIoT (1) 2023: 272-289 - [i4]Peter Jamieson, Suman Bhunia, Dhananjai M. Rao:
With ChatGPT, do we have to rewrite our learning objectives - CASE study in Cybersecurity. CoRR abs/2311.06261 (2023) - [i3]Angela Grace Famera, Raj Mani Shukla, Suman Bhunia:
Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT. CoRR abs/2311.08621 (2023) - 2022
- [j10]Ala Altaweel, Chen Yang, Radu Stoleru, Suman Bhunia, Mohammad Sagor, Maxwell Maurice, Roger Blalock:
RSock: A resilient routing protocol for mobile Fog/Edge networks. Ad Hoc Networks 134: 102926 (2022) - [c26]Lane Rizkallah, Nick Potter, Kyle Reed, Dylan Reynolds, Mohammed Salman, Suman Bhunia:
Red Toad, Blue Toad, Hacked Toad? AIIoT 2022: 379-386 - [c25]Christopher Faircloth, Gavin Hartzell, Nathan Callahan, Suman Bhunia:
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. AIIoT 2022: 501-507 - [c24]Jessica Vazquez-Estrada, Suman Bhunia, Mahmudur Khan, Yicheng Qian, Nero Tran Huu:
Neighbor Discovery in a Multi-Transceiver Free-Space-Optical Ad Hoc Network. CCNC 2022: 509-510 - [c23]Suman Bhunia, Radu Stoleru, Amran Haroon, Mohammad Sagor, Ala Altaweel, Mengyuan Chao, Maxwell Maurice, Roger Blalock:
EdgeKeeper: resilient and lightweight coordination for mobile edge computing systems. MobiSys 2022: 577-578 - [c22]Aversa Prentosito, McKenna Skoczen, Lauren Kahrs, Suman Bhunia:
Case Study on a Session Hijacking Attack: The 2021 CVS Health Data Breach. MobiWIS 2022: 93-105 - [c21]Emily Caroscio, Jack Paul, John Murray, Suman Bhunia:
Analyzing the Ransomware Attack on D.C. Metropolitan Police Department by Babuk. SysCon 2022: 1-8 - [c20]Jessica Vazquez-Estrada, Suman Bhunia, Mahmudur Khan, Yicheng Qian, Nero Tran Huu:
Neighbor Discovery in a LoRa Assisted Multi-Transceiver Free-Space-Optical Network. WCNC 2022: 2703-2708 - [i2]Mohammad Sagor, Radu Stoleru, Suman Bhunia, Mengyuan Chao, Amran Haroon, Ala Altaweel, Maxwell Maurice, Roger Blalock:
R-Drive: Resilient Data Storage and Sharing for Mobile Edge Computing Systems. CoRR abs/2204.10823 (2022) - [i1]Suman Bhunia, Radu Stoleru, Mohammad Sagor, Ala Haroon, Ala Altaweel, Mengyuan Chao, Maxwell Maurice, Roger Blalock:
EdgeKeeper: Resilient and Lightweight Coordination for Mobile Edge Computing Systems. CoRR abs/2204.11095 (2022) - 2021
- [c19]Minh Hieu Nguyen Ba, Jacob Bennett, Michael Gallagher, Suman Bhunia:
A Case Study of Credential Stuffing Attack: Canva Data Breach. CSCI 2021: 735-740 - [c18]J. D. Rudie, Zach Katz, Sam Kuhbander, Suman Bhunia:
Technical Analysis of the NSO Group's Pegasus Spyware. CSCI 2021: 747-752 - [c17]Josh Huddleston, Pu Ji, Suman Bhunia, Joel Cogan:
How VMware Exploits Contributed to SolarWinds Supply-chain Attack. CSCI 2021: 760-765 - [c16]Brandon Gibson, Spencer Townes, Daniel Lewis, Suman Bhunia:
Vulnerability in Massive API Scraping: 2021 LinkedIn Data Breach. CSCI 2021: 777-782 - [c15]Lindsay Sterle, Suman Bhunia:
On SolarWinds Orion Platform Security Breach. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 636-641 - [c14]Paulo Alexandre Regis, Suman Bhunia, Amar Nath Patra, Shamik Sengupta:
Deep-learning assisted Cross-Layer Routing in Multi-hop Wireless Network. WF-IoT 2021: 35-39
2010 – 2019
- 2019
- [j9]Suman Bhunia, Mahmudur Khan, Murat Yuksel, Shamik Sengupta:
In-band LOS discovery using highly directional transceivers. Ad Hoc Networks 91 (2019) - [j8]Mahmudur Khan, Suman Bhunia, Murat Yuksel, Lawrence C. Kane:
Line-of-Sight Discovery in 3D Using Highly Directional Transceivers. IEEE Trans. Mob. Comput. 18(12): 2885-2898 (2019) - [c13]Akshay Murthy, Curtis Green, Radu Stoleru, Suman Bhunia, Charles Swanson, Theodora Chaspari:
Machine Learning-based Irrigation Control Optimization. BuildSys@SenSys 2019: 213-222 - 2018
- [j7]Suman Bhunia, Paulo Alexandre Regis, Shamik Sengupta:
Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks. Comput. Networks 137: 83-97 (2018) - [j6]Suman Bhunia, Edward Miles, Shamik Sengupta, Felisa J. Vázquez-Abad:
CR-Honeynet: A Cognitive Radio Learning and Decoy-Based Sustenance Mechanism to Avoid Intelligent Jammer. IEEE Trans. Cogn. Commun. Netw. 4(3): 567-581 (2018) - 2017
- [j5]Saad Mneimneh, Suman Bhunia, Felisa J. Vázquez-Abad, Shamik Sengupta:
A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks. Pervasive Mob. Comput. 40: 577-592 (2017) - [c12]Suman Bhunia, Shamik Sengupta:
Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks. ICNC 2017: 120-125 - [c11]Paulo Alexandre Regis, Suman Bhunia, Shamik Sengupta:
Enhancing performance and longevity of multi-radio multi-channel hetnets through dynamic path-assignment. ICNC 2017: 498-503 - [c10]Suman Bhunia, Shamik Sengupta:
Implementation of interface agility for duplex dynamic spectrum access radio using USRP. MILCOM 2017: 762-767 - 2016
- [j4]Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta:
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion. Comput. Networks 109: 50-66 (2016) - [c9]Mahmudur Khan, Suman Bhunia, Murat Yuksel, Shamik Sengupta:
LOS discovery in 3D for highly directional transceivers. MILCOM 2016: 325-330 - [c8]Suman Bhunia, Mahmudur Khan, Shamik Sengupta, Murat Yuksel:
LOS discovery for highly directional full duplex RF/FSO transceivers. MILCOM 2016: 337-342 - [c7]Paulo Alexandre Regis, Suman Bhunia, Shamik Sengupta:
Implementation of 3D Obstacle Compliant Mobility Models for UAV Networks in ns-3. WNS3 2016: 124-131 - 2015
- [j3]Suman Bhunia, Shamik Sengupta, Felisa J. Vázquez-Abad:
Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling. Pervasive Mob. Comput. 21: 133-149 (2015) - [c6]Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta:
Performance of Adaptive Beam Nulling in Multihop Ad-Hoc Networks under Jamming. HPCC/CSS/ICESS 2015: 1236-1241 - [c5]Suman Bhunia, Vahid Behzadan, Shamik Sengupta:
Enhancement of spectrum utilization in non-contiguous DSA with online defragmentation. MILCOM 2015: 432-437 - 2014
- [c4]Suman Bhunia, Xing Su, Shamik Sengupta, Felisa J. Vázquez-Abad:
Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention. ICDCN 2014: 438-452 - [c3]Suman Bhunia, Shamik Sengupta, Felisa J. Vázquez-Abad:
CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN. MILCOM 2014: 1173-1180 - 2013
- [c2]Erald Troja, Kenneth Ezirim, Suman Bhunia:
Route Aware Dynamic Channel Scheduling and Selection for Multi-Hop Cognitive Radio Networks. VTC Fall 2013: 1-5 - 2012
- [j2]Tamal Chakraborty, Atri Mukhopadhyay, Suman Bhunia, Iti Saha Misra, Salil Kumar Sanyal:
An Optimization Technique for Improved VoIP Performance over Wireless LAN. J. Networks 7(3): 480-493 (2012) - 2011
- [j1]Suman Bhunia, Iti Saha Misra, Salil Kumar Sanyal, Anindita Kundu:
Performance study of mobile WiMAX network with changing scenarios under different modulation and coding. Int. J. Commun. Syst. 24(8): 1087-1104 (2011) - [c1]Atri Mukhopadhyay, Tamal Chakraborty, Suman Bhunia, Iti Saha Misra, Salil Kumar Sanyal:
Study of enhanced VoIP performance under congested wireless network scenarios. COMSNETS 2011: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint