Suman Bhunia

Orcid: 0000-0003-3587-3509

According to our database1, Suman Bhunia authored at least 53 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DistressNet-NG: A Resilient Data Storage and Sharing Framework for Mobile Edge Computing in Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., July, 2024

Reducing Latency in MEC Networks With Short-Packet Communications.
IEEE Trans. Veh. Technol., 2024

Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT.
Proceedings of the IEEE International Systems Conference, 2024

SCeFSTA: Smart Contract enabled Fair, Secure, and Transparent Auction for Healthcare Transportation.
Proceedings of the IEEE International Systems Conference, 2024

Electronically Steerable Mobile Optical-Wireless Mesh-Network.
Proceedings of the IEEE International Systems Conference, 2024

Understanding Blockchain Trilemma, Causes and Solutions.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

Analyzing the Impact and Implications of COMB: A Comprehensive Study of 3 Billion Breached Credentials.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

Exploring the CAM4 Data Breach: Security Vulnerabilities and Response Strategies.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

Zerologon Explored: In-Depth Analysis and Mitigation Strategies for Microsoft's Critical Vulnerability.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Crossfire Attack Detection in 6G Networks with the Internet of Things (IoT).
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

With ChatGPT, Do We have to Rewrite Our Learning Objectives - CASE Study in Cybersecurity.
Proceedings of the IEEE Frontiers in Education Conference, 2023

Promoting Inclusiveness and Fairness through NFTs: The Case of Student-Athletes and NILs.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

A Review of Colonial Pipeline Ransomware Attack.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
EdgeKeeper: Resilient and Lightweight Coordination for Mobile Edge Computing Systems.
CoRR, 2022

R-Drive: Resilient Data Storage and Sharing for Mobile Edge Computing Systems.
CoRR, 2022

RSock: A resilient routing protocol for mobile Fog/Edge networks.
Ad Hoc Networks, 2022

Neighbor Discovery in a LoRa Assisted Multi-Transceiver Free-Space-Optical Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Analyzing the Ransomware Attack on D.C. Metropolitan Police Department by Babuk.
Proceedings of the IEEE International Systems Conference, 2022

Case Study on a Session Hijacking Attack: The 2021 CVS Health Data Breach.
Proceedings of the Mobile Web and Intelligent Information Systems, 2022

EdgeKeeper: resilient and lightweight coordination for mobile edge computing systems.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Neighbor Discovery in a Multi-Transceiver Free-Space-Optical Ad Hoc Network.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Red Toad, Blue Toad, Hacked Toad?
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

2021
Deep-learning assisted Cross-Layer Routing in Multi-hop Wireless Network.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

On SolarWinds Orion Platform Security Breach.
Proceedings of the 2021 IEEE SmartWorld, 2021

Technical Analysis of the NSO Group's Pegasus Spyware.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

How VMware Exploits Contributed to SolarWinds Supply-chain Attack.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Vulnerability in Massive API Scraping: 2021 LinkedIn Data Breach.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

A Case Study of Credential Stuffing Attack: Canva Data Breach.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2019
Line-of-Sight Discovery in 3D Using Highly Directional Transceivers.
IEEE Trans. Mob. Comput., 2019

In-band LOS discovery using highly directional transceivers.
Ad Hoc Networks, 2019

Machine Learning-based Irrigation Control Optimization.
Proceedings of the 6th ACM International Conference on Systems for Energy-Efficient Buildings, 2019

2018
CR-Honeynet: A Cognitive Radio Learning and Decoy-Based Sustenance Mechanism to Avoid Intelligent Jammer.
IEEE Trans. Cogn. Commun. Netw., 2018

Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks.
Comput. Networks, 2018

2017
A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks.
Pervasive Mob. Comput., 2017

Implementation of interface agility for duplex dynamic spectrum access radio using USRP.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Enhancing performance and longevity of multi-radio multi-channel hetnets through dynamic path-assignment.
Proceedings of the 2017 International Conference on Computing, 2017

Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks.
Proceedings of the 2017 International Conference on Computing, 2017

2016
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion.
Comput. Networks, 2016

Implementation of 3D Obstacle Compliant Mobility Models for UAV Networks in ns-3.
Proceedings of the Workshop on ns-3, 2016

LOS discovery in 3D for highly directional transceivers.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

LOS discovery for highly directional full duplex RF/FSO transceivers.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling.
Pervasive Mob. Comput., 2015

Enhancement of spectrum utilization in non-contiguous DSA with online defragmentation.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Performance of Adaptive Beam Nulling in Multihop Ad-Hoc Networks under Jamming.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention.
Proceedings of the Distributed Computing and Networking - 15th International Conference, 2014

2013
Route Aware Dynamic Channel Scheduling and Selection for Multi-Hop Cognitive Radio Networks.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

2012
An Optimization Technique for Improved VoIP Performance over Wireless LAN.
J. Networks, 2012

2011
Performance study of mobile WiMAX network with changing scenarios under different modulation and coding.
Int. J. Commun. Syst., 2011

Study of enhanced VoIP performance under congested wireless network scenarios.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011


  Loading...