Follow
Vijay Bhuse
Title
Cited by
Cited by
Year
Anomaly intrusion detection in wireless sensor networks
V Bhuse, A Gupta
Journal of High Speed Networks 15 (1), 33-51, 2006
2422006
The concept of opportunistic networks and their research challenges in privacy and security
L Lilien, ZH Kamal, V Bhuse, A Gupta
Mobile and wireless network security and privacy, 85-117, 2007
2002007
DPDSN: Detection of packet-dropping attacks for wireless sensor networks
V Bhuse, A Gupta, L Lilien
Proc. Fourth Trusted Internet Workshop 107, 2005
612005
A localization system using wireless network sensors: A comparison of two techniques
M Terwilliger, A Gupta, V Bhuse, ZH Kamal, MA Salahuddin
Proceedings of the First Workshop on Positioning, Navigation and …, 2004
492004
Detection of masquerade attacks on wireless sensor networks
V Bhuse, A Gupta, A Al-Fuqaha
2007 IEEE international conference on communications, 1142-1147, 2007
312007
Lightweight intrusion detection: A second line of defense for unguarded wireless sensor networks
VS Bhuse
Western Michigan University, 2007
202007
Incorporating lab experience into computer security courses
L ben Othmane, V Bhuse, LT Lilien
2013 World Congress on Computer and Information Technology (WCCIT), 1-4, 2013
192013
An empirical study to investigate the effect of air density changes on the DSRC performance
M El-Said, V Bhuse, A Arendsen
Procedia computer science 114, 523-530, 2017
132017
Opportunistic networks
L Lilien, ZH Kamal, A Gupta, V Bhuse, Z Yang
Kalamazoo: WesternMichigan University, Department of Computer Science, 2006
122006
Opportunistic networks: The concept and research
L Lilien, ZH Kamal, V Bhuse, A Gupta
Proceedings of the NSF International Workshop on Research Challenges in …, 2006
102006
Opportunistic networks: The concept and research challenges
L Lilien, ZH Kamal, V Bhuse, A Gupta
Intl. Workshop on Research Challenges in Security and Privacy for Mobile and …, 2006
92006
DSRC based sensor-pooling protocol for connected vehicles in future smart cities
M El-Said, S Mansour, V Bhuse
Procedia Computer Science 140, 70-78, 2018
82018
A distributed approach to security in sensornets
V Bhuse, A Gupta, R Pidva
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No …, 2003
82003
The minimum scheduling time for convergecast in wireless sensor networks
C Jung, SJ Lee, V Bhuse
Algorithms 7 (1), 145-165, 2014
72014
Analytical Analysis of Data and Decision Fusion in Sensor Networks.
ZH Kamal, MA Salahuddin, A Gupta, MG Terwilliger, V Bhuse, ...
ESA/VLSI, 263-272, 2004
72004
Applied mathematics and algorithms for cloud computing and iot
Y Mao, V Bhuse, Z Zhou, P Pichappan, M Abdel-Aty, Y Hayafuji
Mathematical Problems in Engineering 2014, 2014
62014
Forced vacation: A rouge switch detection technique
K Prins, V Bhuse
European Conference on Cyber Warfare and Security, 390-399, 2018
42018
Incorporating Lab Experience into Computer Security Courses: Three Case Studies
J Son, V Bhuse, LB Othmane, L Lilien
Global Journal of Enterprise Information System 7 (2), 69-80, 2015
42015
Using routing data for Information authentication in sensor networks
V Bhuse, A Gupta, M Terwilliger, Z Yang, ZEH Kamal
3rd International Trusted Internet Workshop, HiPC, 2004
42004
Detection of a Rogue Switch in a Local Area Network
V Bhuse, A Kalafut, L Dohn
The Fourteenth International Conference on Internet Monitoring and …, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20