A review on attacks and secure routing protocols in MANET HN Saha, D Bhattacharyya, B Banerjee, S Mukherjee, R Singh, D Ghosh International Journal of Innovative Research and Review (JIRR), CIBTech 1 (2), 2013 | 12 | 2013 |
Self-Organized key management based on fidelity relationship list and dynamic path HN Saha, D Bhattacharyya, B Banerjee, S Mukherjee, R Singh, D Ghosh International Journal of Application or Innovation in Engineering …, 2014 | 7 | 2014 |
A Review on MANET Routing Protocols and its Vulnerabilities HN Saha, D Bhattacharyya, PK Banerjee, B Banerjee, S Mukherjee, ... International Journal of Emerging Trends & Technology in Computer Science …, 2013 | 7 | 2013 |
Different Routing Protocols and Their Vulnerabilities and Their Measures HN Saha, D Bhattacharyya, B Banerjee, S Mukherjee, R Singh, D Ghosh The International Conference on Advances in Computer Science and Electronics …, 2014 | 5 | 2014 |
Improving user coverage through resource aware handoff management in heterogeneous networks R Singh, S Mukherjee, SC Ghosh Proceedings of the 13th International Conference on Advances in Mobile …, 2015 | 4 | 2015 |
SoK: The Ghost Trilemma S Mukherjee, S Ravi, P Schmitt, B Raghavan arXiv preprint arXiv:2308.02202, 2023 | | 2023 |