Sanjay K. Dhurandher

Orcid: 0000-0002-9573-7069

Affiliations:
  • Netaji Subhas University of Technology, Department of Information Technology, New Delhi, India


According to our database1, Sanjay K. Dhurandher authored at least 203 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A network communication speedup model using multiple fungible and non-fungible paths.
Internet Things, April, 2024

Game Theory-Based Efficient Message Forwarding Scheme for Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Contract-Theory-Based Incentive Design Mechanism for Opportunistic IoT Networks.
IEEE Internet Things J., February, 2023

Double Q-learning based routing protocol for opportunistic networks.
J. High Speed Networks, 2023

Data storage and range queries in ubiquitous mobile data cloud.
J. Ambient Intell. Humaniz. Comput., 2023

SMGSAF: a secure multi-geocasting scheme for opportunistic networks.
Int. J. Grid Util. Comput., 2023

A hybrid channel transmission method for effective spectrum access in cognitive radio networks.
Int. J. Ad Hoc Ubiquitous Comput., 2023

An Analysis of Theoretical Network Communication Speedup Using Multiple Fungible Paths.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

Post-Quantum Based Oblivious Transfer for Authentication in Heterogeneous Internet of Everything.
Proceedings of the IEEE International Conference on Communications, 2023

Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication.
Proceedings of the IEEE Global Communications Conference, 2023

CASE: Channel Allocation for optimized Spectral Efficiency using deep neural network in underlay cognitive radios.
Proceedings of the International Conference on Computer, 2023

A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Bonet Detection Mechanism Using Graph Neural Network.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
LSTM-Based Energy-Efficient Wireless Communication With Reconfigurable Intelligent Surfaces.
IEEE Trans. Green Commun. Netw., 2022

PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything.
Sensors, 2022

A blockchain-based secure routing protocol for opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2022

A jamming attack detection technique for opportunistic networks.
Internet Things, 2022

Deep Q learning based secure routing approach for OppIoT networks.
Internet Things, 2022

An efficient radio-frequency spectrum utilization technique for cognitive radio networks.
Internet Things, 2022

MrFbP: Markov random field-driven spatial entropy-based routing protocol in opportunistic networks.
Int. J. Commun. Syst., 2022

A hybrid spectrum access approach for efficient channel allocation and power control in cognitive radio networks.
Int. J. Commun. Syst., 2022

Reliable data communication using post-quantum encryption in Internet of Everything.
Int. J. Commun. Syst., 2022

Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems.
Comput. Commun., 2022

Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Approach.
Proceedings of the Advances in Network-Based Information Systems, 2022

Multivariate Gaussian Mixture-based Prediction Model for Opportunistic Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Reinforcement Learning Based Congestion Control Mechanism for Opportunistic Networks.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Geocommunity Based Data Forwarding in Social Delay Tolerant Networks.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

A Comprehensive Review on Edge Computing: Focusing on Mobile Users.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

Game Theory-Based Energy Efficient Routing in Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT.
Wirel. Pers. Commun., 2021

Efficient caching method in fog computing for internet of everything.
Peer-to-Peer Netw. Appl., 2021

Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks.
J. High Speed Networks, 2021

Integer multiplication ranking method for cloud services selection.
J. Ambient Intell. Humaniz. Comput., 2021

Internet of Things Design, Architectures and Protocols.
Internet Things, 2021

Reinforcement learning-based fuzzy geocast routing protocol for opportunistic networks.
Internet Things, 2021

Random forest classifier-based safe and reliable routing for opportunistic IoT networks.
Int. J. Commun. Syst., 2021

Energy Efficient Multi-Objectives Optimized Routing for Opportunistic Networks.
Proceedings of the ICC 2021, 2021

Location based Routing in Opportunistic Networks using Cascade Learning.
Proceedings of the International Conference on Computer, 2021

Performance Analysis of the Spectrum Access Strategies in Cognitive Radio Networks.
Proceedings of the International Conference on Computer, 2021

Energy-Efficient Fuzzy Geocast Routing Protocol for Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
A Contract Theory Approach-Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks.
IEEE Syst. J., 2020

Pareto set based optimized routing in opportunistic network.
J. Ambient Intell. Humaniz. Comput., 2020

Energy-Efficient Check-and-Spray Geocast Routing Protocol for Opportunistic Networks.
Inf., 2020

Policies and mechanisms for enhancing the resource management in cloud computing: a performance perspective.
Int. J. Grid Util. Comput., 2020

Convergence of user and service provider perspectives in mobile cloud computing environment: Taxonomy and challenges.
Int. J. Commun. Syst., 2020

Conjoint belief adaption functionality for statistically secure communication paradigm for CR-IIoTs.
Int. J. Commun. Syst., 2020

Cross-layer perspective for channel assignment in cognitive radio networks: A survey.
Int. J. Commun. Syst., 2020

Message trust-based secure multipath routing protocol for opportunistic networks.
Int. J. Commun. Syst., 2020

Best fit power weighted difference method for fog node selection in smart cities.
IET Commun., 2020

VTE-AKA: an optimum vector time encoding scheme for synchronising authenticated key agreements in cognitive radio ad hoc networks.
IET Commun., 2020

Reinforcement Learning-Based Routing Protocol for Opportunistic Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Contract Theory Based Medium Access Contention Resolution in TDMA Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2019

kROp: k-Means clustering based routing protocol for opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2019

GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks.
Int. J. Adv. Intell. Paradigms, 2019

Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system.
Int. J. Adv. Intell. Paradigms, 2019

Energy aware routing for efficient green communication in opportunistic networks.
IET Networks, 2019

T_CAFE: A Trust based Security approach for Opportunistic IoT.
IET Commun., 2019

An Asymmetric RSA-Based Security Approach for Opportunistic IoT.
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019

Priority Based Buffer Management Technique for Opportunistic Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Fuzzy Geocasting in Opportunistic Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Centrality Based Geocasting for Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2019

An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks.
Proceedings of the Advanced Information Networking and Applications, 2019

Geometric Shapes-based PSO Approach for Routing in Vehicular Networks.
Proceedings of the 2019 IEEE AFRICON, Accra, Ghana, September 25-27, 2019, 2019

2018
A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks.
IEEE Syst. J., 2018

Demand-Based Computation Offloading Framework for Mobile Devices.
IEEE Syst. J., 2018

Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems.
IEEE Syst. J., 2018

Special Issue on security and privacy in Internet of Things and cloud computing systems.
Secur. Priv., 2018

Passphrase protected device-to-device mutual authentication schemes for smart homes.
Secur. Priv., 2018

A location Prediction-based routing scheme for opportunistic networks in an IoT scenario.
J. Parallel Distributed Comput., 2018

DEEP: Distance and encounter based energy-efficient protocol for opportunistic networks.
J. High Speed Networks, 2018

Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack.
J. Ambient Intell. Humaniz. Comput., 2018

A multi-objectives based technique for optimized routing in opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2018

On the target channel sequence selection for multiple handoffs in cognitive radio-based wireless regional area networks.
Int. J. Space Based Situated Comput., 2018

EMCloud: A hierarchical volunteer cloud with explicit mobile devices.
Int. J. Commun. Syst., 2018

A survey of overlay and underlay paradigms in cognitive radio networks.
Int. J. Commun. Syst., 2018

Efficient mobility prediction scheme for pervasive networks.
Int. J. Commun. Syst., 2018

Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach.
Trans. Emerg. Telecommun. Technol., 2018

An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018

Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN.
Proceedings of the IEEE INFOCOM 2018, 2018

Proactive Decision Based Handoff Scheme for Cognitive Radio Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Energy-Efficient Location Prediction-Based Forwarding Scheme for Opportunistic Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An IoT Automated Curtain System for Smart Homes.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the IEEE Globecom Workshops, 2018

A Novel and Efficient Geocasting in OppNets.
Proceedings of the 2018 International Conference on Computer, 2018

Intelligent and Efficient Channel Allocation in Smart Grid Neighhorhood Area Network.
Proceedings of the 2018 International Conference on Computer, 2018

Online Signature Verification Using the Information Set Based Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks.
Soft Comput., 2017

A* search based next hop selection for routing in opportunistic networks.
Int. J. Space Based Situated Comput., 2017

An altruism-based trust-dependent message forwarding protocol for opportunistic networks.
Int. J. Commun. Syst., 2017

An energy-efficient history-based routing scheme for opportunistic networks.
Int. J. Commun. Syst., 2017

A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario.
Comput. Networks, 2017

GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks.
Proceedings of the Advances in Network-Based Information Systems, 2017

An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Genetic algorithm and probability based routing protocol for Opportunistic Networks.
Proceedings of the International Conference on Computer, 2017

Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2016

Introduction to the special section on cognitive radios as next-generation wireless networks.
Comput. Electr. Eng., 2016

Channel Allocation in Cognitive Radio Networks using Evolutionary Technique.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Power Control Scheme for Underlay Approach in Cognitive Radio Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Graph colouring technique for efficient channel allocation in cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Game Theory-Based Channel Allocation in Cognitive Radio Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A priority based message forwarding scheme for Opportunistic Networks.
Proceedings of the International Conference on Computer, 2016

A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks.
Proceedings of the 10th International Conference on Complex, 2016

A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks.
J. Supercomput., 2015

A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks.
IEEE Syst. J., 2015

Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks.
J. Networks, 2015

Probability-based Controlled Flooding in Opportunistic Networks.
Proceedings of the WINSYS 2015, 2015

A Centrality-Based ACK Forwarding Mechanism for Efficient Routing in Infrastructureless Opportunistic Networks.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Wormhole prevention using COTA mechanism in position based environment over MANETs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Markovian Model Based Channel Allocation in Cognitive Radio Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks.
J. Supercomput., 2014

Vehicular Security Through Reputation and Plausibility Checks.
IEEE Syst. J., 2014

A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2014

Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the Security in Computing and Communications, 2014

Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs.
Proceedings of the Intelligent Distributed Computing, 2014

A cluster-based load balancing algorithm in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
An ant-swarm inspired dynamic multiresolution data dissemination protocol for wireless sensor networks.
J. Supercomput., 2013

Energized geocasting model for underwater wireless sensor networks.
Simul. Model. Pract. Theory, 2013

Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks.
J. Internet Serv. Inf. Secur., 2013

Trust-based Security Protocol against blackhole attacks in opportunistic networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

MOCLO: A Cloud Framework for Mobile Devices.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013

A Priority Based Differentiation for Contention Mechanism in Legacy DCF Method.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Providing reliable and link stability-based geocasting model in underwater environment.
Int. J. Commun. Syst., 2012

An acoustic communication based AQUA-GLOMO simulator for underwater networks.
Hum. centric Comput. Inf. Sci., 2012

Optimizing Energy using Probabilistic Routing in Underwater Sensor Network.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

Trust-enhanced message security protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2012

Traffic optimization through information dissemination.
Proceedings of IEEE International Conference on Communications, 2012

Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

GROOV: A geographic routing over VANETs and its performance evaluation.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems.
IEEE Syst. J., 2011

An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation.
Simul. Model. Pract. Theory, 2011

Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks.
J. Netw. Comput. Appl., 2011

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks.
J. Inf. Process. Syst., 2011

Using ant-based agents for congestion control in ad-hoc wireless sensor networks.
Clust. Comput., 2011

Application of Ant Colony Optimization to Develop Energy Efficient Protocol in Mobile Ad-Hoc Networks.
Proceedings of the WINSYS 2011, 2011

Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher.
Proceedings of the Global Communications Conference, 2011

Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011

Performance evaluation of various routing protocols in Opportunistic Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Optimizing Energy through Parabola Based Routing in Underwater Sensor Networks.
Proceedings of the Global Communications Conference, 2011

A Dot Net framework based physical testbed for ad hoc network routing protocols.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
A low-overhead fault-tolerant routing algorithm for mobile ad hoc networks: A scheme and its simulation analysis.
Simul. Model. Pract. Theory, 2010

An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks.
J. Syst. Softw., 2010

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments.
J. Inf. Process. Syst., 2010

Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks.
IET Commun., 2010

Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks.
Comput. Electr. Eng., 2010

Network Layer based Secure Routing Protocol for Wireless Ad Hoc Sensor Networks in Urban Environments.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010

Link stability based geocasting model for underwater sensor networks.
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010

A reactive Optimized Link State Routing protocol for Mobile ad hoc networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

A mechanism for reducing congestion while routing bulky data in Mobile Ad Hoc Networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Object Location in Cluster Based Mobile Ad Hoc Networks.
Proceedings of the Information Processing and Management, 2010

Predictive multi-hop stable routing in Vehicular Ad Hoc Networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

A novel Geocast technique with hole detection in underwater sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Swarm Intelligence Approach for Ad-Hoc Networks.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Evolutionary Computing Approach for Ad-Hoc Networks.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Efficient data acquisition in underwater wireless sensor Ad Hoc networks.
IEEE Wirel. Commun., 2009

An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks.
Secur. Commun. Networks, 2009

EEAODR: An energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2009

Efficient solutions to various routing issues involved in mobile ad hoc bio-sensor networks: applying appropriate motion trajectories.
IET Commun., 2009

E2-SCAN: an extended credit strategy-based energy-efficient security scheme for wireless ad hoc networks.
IET Commun., 2009

An efficient power-aware broadcast technique for wireless ad hoc networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Using Ant-Like Agents for Fault-Tolerant Routing in Mobile Ad-Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks.
Proceedings of IEEE International Conference on Communications, 2009

An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms.
Proceedings of IEEE International Conference on Communications, 2009

Tarantula - A Scalable and Extensible Web Spider.
Proceedings of the KMIS 2009 - Proceedings of the International Conference on Knowledge Management and Information Sharing, Funchal, 2009

Aragog Semantic Search Engine - Beyond the Limits of Keyword Search.
Proceedings of the KEOD 2009 - Proceedings of the International Conference on Knowledge Engineering and Ontology Development, Funchal, 2009

Optimizing Power Utilization in Vehicular Ad Hoc Networks through Angular Routing: A Protocol and Its Performance Evaluation.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Swarm Intelligence-based P2P file sharing protocol using Bee Algorithm.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Simulating Peer-to-Peer networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Node Stability-Based Location Updating in Mobile <i>Ad-Hoc</i> Networks.
IEEE Syst. J., 2008

UWSim: A Simulator for Underwater Sensor Networks.
Simul., 2008

Highly stable and adaptive clustering with efficient routing in wireless ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2008

Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing.
Comput. Commun., 2008

QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

An Energy-Efficient On-Demand Routing algorithm for Mobile Ad-Hoc Networks.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

An Efficient Approach for Location Updating in Mobile Ad Hoc Networks.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008

2007
Stable Clustering with Efficient Routing in Wireless Ad Hoc Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2005
Power Aware Cluster Efficient Routing in Wireless Ad Hoc Networks.
Proceedings of the Distributed Computing, 2005


  Loading...