


default search action
Bhed Bahadur Bista
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Yuhong He, Bhed Bahadur Bista, Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
Enhanced 5G Radio Resource Allocation Mechanism Using Game Theory and Firefly Algorithm. NBiS 2024: 45-57 - [c50]Taisei Watanabe, Eiichiro Kodama, Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Proposal of Adversarial Attack Traffic Detection Using Adversarial Attack Techniques for Network Intrusion Detection System. NBiS 2024: 174-186 - 2020
- [j10]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Probabilistic computation offloading for mobile edge computing in dynamic network environment. Internet Things 11: 100225 (2020)
2010 – 2019
- 2019
- [c49]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
A Probabilistic Offloading Approach in Mobile Edge Computing. BWCCA 2019: 266-278 - 2018
- [j9]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Incentive mechanisms for promoting D2D communications in cellular networks. Int. J. Space Based Situated Comput. 8(1): 1-8 (2018) - [j8]Eiichiro Kodama, Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Construction and maintenance of k-hop CDS in MANET with two classes of mobile terminals. Int. J. Space Based Situated Comput. 8(2): 70-79 (2018) - [c48]Tetsuya Hirakawa, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
An Analysis of a Defence Method against Slow HTTP DoS Attack. ISITA 2018: 316-320 - 2017
- [j7]Bhed Bahadur Bista, Danda B. Rawat
:
EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks. J. Commun. 12(6): 304-311 (2017) - [c47]Bhed Bahadur Bista, Danda B. Rawat
:
EA-PRoPHET: An Energy Aware PRoPHET-Based Routing Protocol for Delay Tolerant Networks. AINA 2017: 670-677 - [c46]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Mechanism for Adopting Device-to-Device Communication in Cellular Networks. NBiS 2017: 306-316 - [c45]Danda B. Rawat
, Bhed Bahadur Bista:
On the Performance Enhancement of Vehicular Ad Hoc Network for Transportation Cyber Physical Systems. WCNC Workshops 2017: 1-6 - 2016
- [c44]Bhed Bahadur Bista:
Improving Energy Consumption of Epidemic Routing in Delay Tolerant Networks. IMIS 2016: 278-283 - [c43]Hiroya Takahashi, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A user authentication scheme using keystrokes for smartphones while moving. ISITA 2016: 310-314 - [c42]Masaki Narita, Keisuke Kamada, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A Study of Packet Sampling Methods for Protecting Sensors Deployed on Darknet. NBiS 2016: 76-83 - [c41]Tetsuya Hirakawa, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A Defense Method against Distributed Slow HTTP DoS Attack. NBiS 2016: 152-158 - 2015
- [j6]Danda B. Rawat, Gongjun Yan, Bhed Bahadur Bista, Michele C. Weigle:
Trust On the Security of Wireless Vehicular Ad-hoc Networking. Ad Hoc Sens. Wirel. Networks 24(3-4): 283-305 (2015) - [c40]Nimish Sharma, Danda B. Rawat, Bhed Bahadur Bista, Sachin Shetty
:
A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks. AINA 2015: 735-740 - [c39]Bhed Bahadur Bista, Danda B. Rawat:
A Robust Energy Efficient Epidemic Routing Protocol for Delay Tolerant Networks. DSDIS 2015: 290-296 - [c38]Shingo Sasaki, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A Proposal of QoS-aware Power Saving Scheme for SDN-based Networks. NBiS 2015: 71-77 - [c37]Danda B. Rawat, Swetha Reddy Lenkala, Nimish Sharma, Bhed Bahadur Bista, Sachin Shetty
:
Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems. WCNC 2015: 1942-1947 - 2014
- [c36]Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan, Stephan Olariu:
Vehicle-to-Vehicle Connectivity and Communication Framework for Vehicular Ad-Hoc Networks. CISIS 2014: 44-49 - [c35]Tomoaki Tsuchikawa, Bhed Bahadur Bista, Toyoo Takata:
A proposal of distributed management scheme of content key information for pure P2P networks. ISITA 2014: 241-245 - [c34]Masaki Narita, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack. NBiS 2014: 271-278 - 2013
- [j5]Danda B. Rawat, Geert J. Heijenk
, Michele C. Weigle
, Bhed Bahadur Bista, Yuh-Shyan Chen
:
Special Issue of Ad Hoc Networks on Recent Advances in Vehicular Communications and Networking. Ad Hoc Networks 11(7): 1989-1991 (2013) - [j4]Masaki Narita, Bhed Bahadur Bista, Toyoo Takata:
A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors. Int. J. Space Based Situated Comput. 3(4): 215-226 (2013) - [c33]Masaki Narita, Bhed Bahadur Bista, Toyoo Takata:
A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports. AINA 2013: 98-105 - [c32]Danda B. Rawat, Bhed Bahadur Bista, Sachin Shetty
, Gongjun Yan:
Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks. CISIS 2013: 15-20 - 2012
- [j3]Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista:
Provisioning vehicular ad hoc networks with quality of service. Int. J. Space Based Situated Comput. 2(2): 104-111 (2012) - [c31]Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan:
CoR-VANETs: Game Theoretic Approach for Channel and Rate Selection in Cognitive Radio VANETs. BWCCA 2012: 94-99 - [c30]Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista:
Towards Secure Vehicular Clouds. CISIS 2012: 370-375 - 2011
- [c29]Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace. AINA Workshops 2011: 341-348 - [c28]Gongjun Yan, Bhed Bahadur Bista, Danda B. Rawat, Earl F. Shaner:
General Active Position Detectors Protect VANET Security. BWCCA 2011: 11-17 - [c27]Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan, Michele C. Weigle
:
Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach. CISIS 2011: 146-151 - [c26]Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan:
Precoder Adaptation and Power Control in Wireless Ad-Hoc Networks for Rate Maximization. NBiS 2011: 30-34 - 2010
- [c25]Masayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. AINA 2010: 438-445 - [c24]Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista:
Provisioning Vehicular Ad Hoc Networks with Quality of Service. BWCCA 2010: 102-107 - [c23]Hirotaka Tazawa, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A user authenticaion scheme using multiple passphrases and its arrangement. ISITA 2010: 554-559 - [c22]Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan:
Combined Admission, Power and Rate Control for Cognitive Radios in Dynamic Spectrum Access Ad-Hoc Networks. NBiS 2010: 240-245
2000 – 2009
- 2009
- [c21]Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents. MATES 2009: 91-102 - [c20]Bhed Bahadur Bista:
Energy efficient layered sensor networks with multihop polling. MoMM 2009: 458-463 - [c19]Bhed Bahadur Bista:
A Proactive Fault Resilient Overlay Multicast for Media Streaming. NBiS 2009: 17-23 - 2007
- [c18]Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A New Approach to Early Detection of an Unknown Worm. AINA Workshops (1) 2007: 194-198 - [c17]Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. NBiS 2007: 127-136 - 2006
- [c16]Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
DoS Packet Filter Using DNS Information. AINA (1) 2006: 116-131 - [c15]Atsumu Watanabe, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
On a Watermarking Scheme for MusicXML. AINA (2) 2006: 894-898 - [c14]Takashi Katoh, Hiroki Kuzuno, Takuya Kawahara, Atsumu Watanabe, Yushi Nakai, Bhed Bahadur Bista, Toyoo Takata:
AWide Area Log Analyzing System Based on Mobile Agents. CIMCA/IAWTIC 2006: 26 - [c13]Takashi Hamma, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks. DEXA Workshops 2006: 66-70 - 2005
- [c12]Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata:
Development of Security Scanner with High Portability and Usability. AINA 2005: 407-410 - [c11]Bhed Bahadur Bista, Goutam Chakraborty
:
Resource Reservation with Session Time in Multicast Routing. DEXA Workshops 2005: 111-115 - 2004
- [j2]Noppadol Maneerat, Ruttikorn Varakulsiripunth, Bhed Bahadur Bista, Kaoru Takahashi, Yasushi Kato, Norio Shiratori:
Composition of Service and Protocol Specifications in Asynchronous Communication System. IEICE Trans. Inf. Syst. 87-D(10): 2306-2317 (2004) - [c10]Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata:
Development of Security Scanner with High Usability. AINA (1) 2004: 139-144 - 2003
- [c9]Bhed Bahadur Bista, Goutam Chakraborty, Toyoo Takata:
An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing. ICDCS Workshops 2003: 514-518 - 2002
- [j1]Bhed Bahadur Bista, Kaoru Takahashi, Norio Shiratori:
On Constructing n-Entities Communication Protocol and Service with Alternative and Concurrent Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(11): 2426-2435 (2002) - 2001
- [c8]Bhed Bahadur Bista, Norio Shiratori:
Construction of A Multiple Entities Communication Protocol by Compositional Approach. DEXA Workshop 2001: 162-166 - [c7]Goutam Chakraborty, Bhed Bahadur Bista, Norio Shiratori:
An Intelligent Prediction Based Approach for Mobility Tracking in PCN. International Conference on Internet Computing (1) 2001: 528-534 - [c6]Bhed Bahadur Bista, Kaoru Takahashi, Norio Shiratori:
Composition of Service and Protocol Specifications. ICOIN 2001: 171-180 - [c5]Noppadol Maneerat
, Ruttikorn Varakulsiripunth, Daisuke Seki, Kazuki Yoshida, Kaoru Takahashi, Yasushi Kato, Bhed Bahadur Bista, Norio Shiratori:
Composition method of communication system specifications in asynchronous model and its support system. ICON 2001: 64-69 - 2000
- [c4]Bhed Bahadur Bista, Y. Ujiie, K. Furuya, Kaoru Takahashi, Norio Shiratori:
Support System for Constructing Communication Services and Protocols Based on Compositional Approach. DEXA Workshop 2000: 15-22
1990 – 1999
- 1996
- [c3]Bhed Bahadur Bista, Kaoru Takahashi, Hiroaki Kaminaga, Norio Shiratori:
A flexible protocol synthesis method for adopting requirement changes. ICPADS 1996: 319-326 - 1995
- [c2]Bhed Bahadur Bista, Atsushi Togashi, Norio Shiratori:
Extension of protocol synthesis to structured entities. ICNP 1995: 66-73 - 1994
- [c1]Bhed Bahadur Bista, Zixue Cheng, Atsushi Togashi, Norio Shiratori:
A synthesis algorithm of a protocol model from a single entity. FORTE 1994: 477-492
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-20 00:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint