@inproceedings{SenUBP08, title = {A distributed intrusion detection system for wireless ad hoc networks}, author = {Jaydip Sen and Arijit Ukil and Debasish Bera and Arpan Pal}, year = {2008}, doi = {10.1109/ICON.2008.4772624}, url = {http://dx.doi.org/10.1109/ICON.2008.4772624}, tags = {redundancy, protocol, source-to-source, security, routing, partitioning, mobile, systematic-approach, open-source}, researchr = {https://researchr.org/publication/SenUBP08}, cites = {0}, citedby = {0}, pages = {1-6}, booktitle = {Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India}, publisher = {IEEE}, } @inproceedings{SenCBGR07, title = {A Scheme of Certificate Authority for Ad Hoc Networks}, author = {Jaydip Sen and M. Girish Chandra and P. Balamuralidhar and Harihara S. G. and Harish Reddy}, year = {2007}, doi = {10.1109/DEXA.2007.22}, url = {http://doi.ieeecomputersociety.org/10.1109/DEXA.2007.22}, tags = {rule-based, deployment, protocol, certification, security}, researchr = {https://researchr.org/publication/SenCBGR07}, cites = {0}, citedby = {0}, pages = {615-619}, booktitle = {18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany}, publisher = {IEEE Computer Society}, isbn = {0-7695-2932-1}, } @inproceedings{SenS07:0, title = {An Efficient Certificate Authority for Ad Hoc Networks}, author = {Jaydip Sen and Harihara Subramanyam}, year = {2007}, doi = {10.1007/978-3-540-77115-9_10}, url = {http://dx.doi.org/10.1007/978-3-540-77115-9_10}, tags = {rule-based, deployment, protocol, certification, security}, researchr = {https://researchr.org/publication/SenS07%3A0}, cites = {0}, citedby = {0}, pages = {97-109}, booktitle = {Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20, Proceedings}, editor = {Tomasz Janowski and Hrushikesha Mohanty}, volume = {4882}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-77112-8}, } @inproceedings{SenS05:0, title = {Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System}, author = {Jaydip Sen and Indranil Sengupta}, year = {2005}, doi = {10.1007/11604655_16}, url = {http://dx.doi.org/10.1007/11604655_16}, tags = {rule-based, design complexity, architecture, design research, security, Meta-Environment, design, systematic-approach}, researchr = {https://researchr.org/publication/SenS05%3A0}, cites = {0}, citedby = {0}, pages = {125-131}, booktitle = {Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings}, editor = {Goutam Chakraborty}, volume = {3816}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-30999-3}, } @incollection{springerlink:10.1007-978-3-642-14478-353, title = {A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network}, author = {Jaydip Sen}, year = {2010}, url = {http://dx.doi.org/10.1007/978-3-642-14478-3_53}, note = {10.1007/978-3-642-14478-3_53}, tags = {rule-based, data-flow, source-to-source, peer-to-peer, routing, open-source}, researchr = {https://researchr.org/publication/springerlink%3A10.1007-978-3-642-14478-353}, cites = {0}, citedby = {0}, booktitle = {Recent Trends in Network Security and Applications}, volume = {89}, series = {Communications in Computer and Information Science}, publisher = {Springer Berlin Heidelberg}, isbn = {978-3-642-14478-3}, } @inproceedings{SenCS07, title = {A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks}, author = {Jaydip Sen and Piyali Roy Chowdhury and Indranil Sengupta}, year = {2007}, doi = {10.1109/ICCTA.2007.3}, url = {http://doi.ieeecomputersociety.org/10.1109/ICCTA.2007.3}, tags = {rule-based, application framework, meta-model, protocol, security, Meta-Environment, mobile, systematic-approach}, researchr = {https://researchr.org/publication/SenCS07}, cites = {0}, citedby = {0}, pages = {51-58}, booktitle = {2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 5-7 March 2007, Kolkata, India}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-2770-3}, } @inproceedings{DBLP:conf-iccsa-Sen10, title = {An Efficient and Reliable Routing Protocol for Wireless Mesh Networks}, author = {Jaydip Sen}, year = {2010}, month = {March}, doi = {10.1007/978-3-642-12179-1}, url = {http://dx.doi.org/10.1007/978-3-642-12179-1}, tags = {rule-based, protocol, maintenance, routing, coverage}, researchr = {https://researchr.org/publication/DBLP%3Aconf-iccsa-Sen10}, cites = {0}, citedby = {0}, booktitle = {ICCSA (3)}, volume = {6018}, series = {Lecture Notes in Computer Science, Springer}, address = {Fukuoka, Japan}, publisher = {Springer, Lecture Notes in Computer Science, Volume 6018, }, } @inproceedings{SenCS06, title = {A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks}, author = {Jaydip Sen and Piyali Roy Chowdhury and Indranil Sengupta}, year = {2006}, doi = {10.1007/11947950_16}, url = {http://dx.doi.org/10.1007/11947950_16}, tags = {rule-based, web service, source-to-source, rules, security, web services, open-source}, researchr = {https://researchr.org/publication/SenCS06}, cites = {0}, citedby = {0}, pages = {139-144}, booktitle = {Distributed Computing and Networking, 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006}, editor = {Soma Chaudhuri and Samir R. Das and Himadri S. Paul and Srikanta Tirthapura}, volume = {4308}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-68139-6}, } @incollection{springerlink:10.1007-978-3-642-14478-354, title = {A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks}, author = {Jaydip Sen}, year = {2010}, url = {http://dx.doi.org/10.1007/978-3-642-14478-3_54}, note = {10.1007/978-3-642-14478-3_54}, tags = {rule-based, protocol, security, reputation, mobile}, researchr = {https://researchr.org/publication/springerlink%3A10.1007-978-3-642-14478-354}, cites = {0}, citedby = {0}, booktitle = {Recent Trends in Network Security and Applications}, volume = {89}, series = {Communications in Computer and Information Science}, publisher = {Springer Berlin Heidelberg}, isbn = {978-3-642-14478-3}, } @inproceedings{DBLP:conf-iccsa-SenU10, title = {A Secure Routing Protocol for Wireless Sensor Networks}, author = {Jaydip Sen and Arijit Ukil}, year = {2010}, month = {March }, doi = {10.1007/978-3-642-12179-1_25}, url = {http://dx.doi.org/10.1007/978-3-642-12179-1_25}, tags = {rule-based, protocol, wireless sensor networks, data-flow, routing, reliability, systematic-approach}, researchr = {https://researchr.org/publication/DBLP%3Aconf-iccsa-SenU10}, cites = {0}, citedby = {0}, booktitle = {ICCSA (3)}, volume = {6019}, number = {3}, series = {Lecture Notes in Computer Science, Springer}, address = {Fukuoka, Japan}, organization = {Kyushu University, Japan}, publisher = {Springer-Verlag, Heidelberg, Germany}, } @inproceedings{SenU10, title = {A QoS-aware end-to-end connectivity management algorithm for mobile applications}, author = {Jaydip Sen and Arijit Ukil}, year = {2010}, doi = {10.1145/1754288.1754292}, url = {http://doi.acm.org/10.1145/1754288.1754292}, tags = {context-aware, Meta-Environment, mobile, systematic-approach}, researchr = {https://researchr.org/publication/SenU10}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010}, editor = {R. K. Shyamasundar and Prasad Deshpande}, publisher = {ACM}, isbn = {978-1-4503-0001-8}, }