Anomaly intrusion detection in wireless sensor networks V Bhuse, A Gupta Journal of High Speed Networks 15 (1), 33-51, 2006 | 242 | 2006 |
The concept of opportunistic networks and their research challenges in privacy and security L Lilien, ZH Kamal, V Bhuse, A Gupta Mobile and wireless network security and privacy, 85-117, 2007 | 201 | 2007 |
DPDSN: Detection of packet-dropping attacks for wireless sensor networks V Bhuse, A Gupta, L Lilien Proc. Fourth Trusted Internet Workshop 107, 2005 | 61 | 2005 |
A localization system using wireless network sensors: A comparison of two techniques M Terwilliger, A Gupta, V Bhuse, ZH Kamal, MA Salahuddin Proceedings of the First Workshop on Positioning, Navigation and …, 2004 | 49 | 2004 |
Detection of masquerade attacks on wireless sensor networks V Bhuse, A Gupta, A Al-Fuqaha 2007 IEEE international conference on communications, 1142-1147, 2007 | 31 | 2007 |
Lightweight intrusion detection: A second line of defense for unguarded wireless sensor networks VS Bhuse Western Michigan University, 2007 | 20 | 2007 |
Incorporating lab experience into computer security courses L ben Othmane, V Bhuse, LT Lilien 2013 World Congress on Computer and Information Technology (WCCIT), 1-4, 2013 | 19 | 2013 |
An empirical study to investigate the effect of air density changes on the DSRC performance M El-Said, V Bhuse, A Arendsen Procedia computer science 114, 523-530, 2017 | 13 | 2017 |
Opportunistic networks L Lilien, ZH Kamal, A Gupta, V Bhuse, Z Yang Kalamazoo: WesternMichigan University, Department of Computer Science, 2006 | 12 | 2006 |
Opportunistic networks: The concept and research L Lilien, ZH Kamal, V Bhuse, A Gupta Proceedings of the NSF International Workshop on Research Challenges in …, 2006 | 10 | 2006 |
Opportunistic networks: The concept and research challenges L Lilien, ZH Kamal, V Bhuse, A Gupta Intl. Workshop on Research Challenges in Security and Privacy for Mobile and …, 2006 | 9 | 2006 |
DSRC based sensor-pooling protocol for connected vehicles in future smart cities M El-Said, S Mansour, V Bhuse Procedia Computer Science 140, 70-78, 2018 | 8 | 2018 |
A distributed approach to security in sensornets V Bhuse, A Gupta, R Pidva 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No …, 2003 | 8 | 2003 |
The minimum scheduling time for convergecast in wireless sensor networks C Jung, SJ Lee, V Bhuse Algorithms 7 (1), 145-165, 2014 | 7 | 2014 |
Applied mathematics and algorithms for cloud computing and iot Y Mao, V Bhuse, Z Zhou, P Pichappan, M Abdel-Aty, Y Hayafuji Mathematical Problems in Engineering 2014, 2014 | 7 | 2014 |
Analytical Analysis of Data and Decision Fusion in Sensor Networks. ZH Kamal, MA Salahuddin, A Gupta, MG Terwilliger, V Bhuse, ... ESA/VLSI, 263-272, 2004 | 7 | 2004 |
Forced vacation: A rouge switch detection technique K Prins, V Bhuse European Conference on Cyber Warfare and Security, 390-399, 2018 | 4 | 2018 |
Incorporating Lab Experience into Computer Security Courses: Three Case Studies J Son, V Bhuse, LB Othmane, L Lilien Global Journal of Enterprise Information System 7 (2), 69-80, 2015 | 4 | 2015 |
Using routing data for Information authentication in sensor networks V Bhuse, A Gupta, M Terwilliger, Z Yang, ZEH Kamal 3rd International Trusted Internet Workshop, HiPC, 2004 | 4 | 2004 |
Detection of a Rogue Switch in a Local Area Network V Bhuse, A Kalafut, L Dohn The Fourteenth International Conference on Internet Monitoring and …, 2019 | 3 | 2019 |