


Остановите войну!
for scientists:
Muttukrishnan Rajarajan
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j61]Dilara Acarali
, K. Rajesh Rao
, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling smart grid IT-OT dependencies for DDoS impact propagation. Comput. Secur. 112: 102528 (2022) - 2021
- [j60]K. Rajesh Rao
, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Role recommender-RBAC: Optimizing user-role assignments in RBAC. Comput. Commun. 166: 140-153 (2021) - [j59]Chithralekha Balamurugan, Kalpana Singh
, Ganeshvani Ganesan, Muttukrishnan Rajarajan:
Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions. Cryptogr. 5(4): 38 (2021) - [j58]Yogachandran Rahulamathavan
, Safak Dogan, Xiyu Shi, Rongxing Lu
, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems. IEEE Internet Things J. 8(3): 1417-1427 (2021) - [j57]Shahzaib Tahir, Hasan Tahir, Ali Sajjad, Muttukrishnan Rajarajan, Fawad Khan
:
Privacy-preserving COVID-19 contact tracing using blockchain. J. Commun. Networks 23(5): 360-373 (2021) - [j56]Sudip Misra
, Anandarup Mukherjee
, Arijit Roy, Nishant Saurabh
, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Blockchain at the Edge: Performance of Resource-Constrained IoT Networks. IEEE Trans. Parallel Distributed Syst. 32(1): 174-183 (2021) - [c95]Abdul Nasir, Hassaan Khaliq Qureshi, Israr Ullah, Muttukrishnan Rajarajan:
EHA-BeeSensor: Hybrid Protocol for Energy Proficient Routing in IoT Network using Swarm Intelligence. CAMAD 2021: 1-7 - [c94]Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan:
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. SEC 2021: 36-50 - [i2]Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
A Characterisation of Smart Grid DoS Attacks. CoRR abs/2107.11202 (2021) - 2020
- [j55]Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:
Securing the LoRaWAN join procedure using blockchains. Clust. Comput. 23(3): 2123-2138 (2020) - [j54]Shahzaib Tahir, Liutauras Steponkus, Sushmita Ruj, Muttukrishnan Rajarajan, Ali Sajjad:
A parallelized disjunctive query based searchable encryption scheme for big data. Future Gener. Comput. Syst. 109: 583-592 (2020) - [j53]Indranil Ghosh Ray
, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification. IEEE Trans. Cloud Comput. 8(3): 672-684 (2020) - [c93]Faiez Altamimi, Waqar Asif, Muttukrishnan Rajarajan:
DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store. CITS 2020: 1-8 - [c92]Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling DoS Attacks & Interoperability in the Smart Grid. ICCCN 2020: 1-6 - [c91]Akanksha Dixit, Waqar Asif, Muttukrishnan Rajarajan:
Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0. IECON 2020: 2221-2227 - [c90]Aman Framewala, Sarvesh Harale, Shreya Khatal, Dhiren R. Patel, Yann Busnel
, Muttukrishnan Rajarajan:
Blockchain Analysis Tool For Monitoring Coin Flow. SDS 2020: 196-201 - [c89]Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan:
Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment. UEMCON 2020: 323-330 - [i1]Yogachandran Rahulamathavan, Safak Dogan, Rongxing Lu, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-preserving Systems. CoRR abs/2004.01891 (2020)
2010 – 2019
- 2019
- [j52]Iván García-Magariño
, Muttukrishnan Rajarajan, Jaime Lloret
:
Human-Centric AI for Trustworthy IoT Systems With Explainable Multilayer Perceptrons. IEEE Access 7: 125562-125574 (2019) - [j51]K. Rajesh Rao
, Indranil Ghosh Ray, Waqar Asif
, Ashalatha Nayak, Muttukrishnan Rajarajan:
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE Access 7: 133274-133289 (2019) - [j50]Iván García-Magariño
, Raquel Lacuesta
, Muttukrishnan Rajarajan, Jaime Lloret
:
Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Networks 86: 72-82 (2019) - [j49]Shahzaib Tahir, Sushmita Ruj, Ali Sajjad, Muttukrishnan Rajarajan:
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Comput. Commun. 133: 102-114 (2019) - [j48]Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput. Secur. 83: 140-150 (2019) - [j47]Dilara Acarali
, Muttukrishnan Rajarajan, Nikos Komninos
, Bruno Bogaz Zarpelão
:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Secur. Commun. Networks 2019: 3745619:1-3745619:13 (2019) - [j46]Yogachandran Rahulamathavan
, Kunaraj R. Sutharsini, Indranil Ghosh Ray
, Rongxing Lu
, Muttukrishnan Rajarajan:
Privacy-Preserving iVector-Based Speaker Verification. IEEE ACM Trans. Audio Speech Lang. Process. 27(3): 496-506 (2019) - [j45]Shahzaib Tahir
, Sushmita Ruj
, Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan, Cornelius Glackin:
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Trans. Emerg. Top. Comput. 7(4): 530-544 (2019) - [j44]Fauzia Idrees Abro
, Farzana Rauf, Mobeen Ur Rehman
, B. S. Chowdhry
, Muttukrishnan Rajarajan:
Towards Security of GSM Voice Communication. Wirel. Pers. Commun. 108(3): 1933-1955 (2019) - [c88]Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. ICB 2019: 1-8 - [c87]Syed Muhammad Danish, Marios Lestas, Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure. ICC Workshops 2019: 1-6 - [c86]Iván García-Magariño, Geraldine Gray, Muttukrishnan Rajarajan, Waqar Asif
:
Agent-based IoT Coordination for Smart Cities Considering Security and Privacy. IoTSMS 2019: 221-226 - [c85]Akash Aggarwal, Waqar Asif
, Habibul Azam, Milan Markovic
, Muttukrishnan Rajarajan, Peter Edwards:
User Privacy Risk Analysis For The Internet of Things. IoTSMS 2019: 259-264 - [c84]Syed Naqvi, Sean Enderby, Ian Williams, Waqar Asif
, Muttukrishnan Rajarajan, Cristi Potlog, Monica Florea:
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities. NTMS 2019: 1-6 - [c83]Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif
, Marios Lestas, Muttukrishnan Rajarajan:
Node Criticality Assessment in a Blockchain Network. BlockSys@SenSys 2019: 22-27 - 2018
- [j43]Waqar Asif
, Muttukrishnan Rajarajan, Marios Lestas:
Increasing user controllability on device specific privacy in the Internet of Things. Comput. Commun. 116: 200-211 (2018) - [j42]Max Smith-Creasey, Fatema A. Albalooshi
, Muttukrishnan Rajarajan:
Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocess. Microsystems 63: 147-157 (2018) - [j41]Gaurav Somani
, Manoj Singh Gaur
, Dheeraj Sanghi, Mauro Conti
, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Trans. Dependable Secur. Comput. 15(6): 959-973 (2018) - [j40]Hëna Maloku
, Enver Hamiti, Zana Limani Fazliu
, Vicky Papadopoulou Lesta, Andreas Pitsillides
, Muttukrishnan Rajarajan:
A Decentralized Approach for Self-Coexistence Among Heterogeneous Networks in TVWS. IEEE Trans. Veh. Technol. 67(2): 1302-1312 (2018) - [c82]S. Rahulamathavan, X. Yao, R. Yogachandran, K. Cumanan, Muttukrishnan Rajarajan:
Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition. CyberSA 2018: 1-8 - [c81]Max Smith-Creasey, Fatema A. Albalooshi
, Muttukrishnan Rajarajan:
Context Awareness for Improved Continuous Face Authentication on Mobile Devices. DASC/PiCom/DataCom/CyberSciTech 2018: 644-652 - [c80]Arijit Roy, Chandana Roy, Sudip Misra
, Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
CARE: Criticality-Aware Data Transmission in CPS-Based Healthcare Systems. ICC Workshops 2018: 1-6 - [c79]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
:
Evaluating the Provision of Botnet Defences using Translational Research Concepts. ICETE (2) 2018: 680-685 - [c78]Waqar Asif
, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
An attack tree based risk evaluation approach for the internet of things. IOT 2018: 6:1-6:8 - [c77]Milan Markovic
, David Corsar
, Waqar Asif, Peter Edwards
, Muttukrishnan Rajarajan:
Towards Transparency of IoT Message Brokers. IPAW 2018: 200-203 - [c76]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
:
Modelling Botnet Propagation in Networks with Layered Defences. ISNCC 2018: 1-6 - [c75]Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks. iThings/GreenCom/CPSCom/SmartData 2018: 1628-1633 - [c74]Milan Markovic
, Waqar Asif
, David Corsar, Naomi Jacobs
, Peter Edwards
, Muttukrishnan Rajarajan, Caitlin Doyle Cottrill
:
Towards automated privacy risk assessments in IoT systems. M4IoT@Middleware 2018: 15-18 - [c73]Waqar Asif
, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. SNPD 2018: 329-334 - [c72]Bruno Bogaz Zarpelão
, Rodrigo Sanches Miani
, Muttukrishnan Rajarajan
:
Detection of Bitcoin-Based Botnets Using a One-Class Classifier. WISTP 2018: 174-189 - 2017
- [j39]Muhammad Arsalan, Aqsa Saeed Qureshi, Asifullah Khan, Muttukrishnan Rajarajan:
Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl. Soft Comput. 51: 168-179 (2017) - [j38]Gaurav Somani
, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
DDoS victim service containment to minimize the internal collateral damages in cloud computing. Comput. Electr. Eng. 59: 165-179 (2017) - [j37]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya:
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. IEEE Cloud Comput. 4(1): 22-32 (2017) - [j36]Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Thomas M. Chen
, Yogachandran Rahulamathavan
:
PIndroid: A novel Android malware detection system using ensemble learning methods. Comput. Secur. 68: 36-46 (2017) - [j35]Seyed Mohammad RezaSaadat Beheshti, Panos Liatsis, Muttukrishnan Rajarajan:
A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Comput. Secur. 70: 596-617 (2017) - [j34]Saritha Arunkumar, Berker Soyluoglu, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location attestation and access control for mobile devices using GeoXACML. J. Netw. Comput. Appl. 80: 181-188 (2017) - [j33]Kim-Kwang Raymond Choo, Omer F. Rana, Muttukrishnan Rajarajan:
Cloud Security Engineering: Theory, Practice and Future Research. IEEE Trans. Cloud Comput. 5(3): 372-374 (2017) - [j32]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
Efficient Privacy-Preserving Facial Expression Classification. IEEE Trans. Dependable Secur. Comput. 14(3): 326-338 (2017) - [c71]Anandarup Mukherjee, Sudip Misra
, P. Mangrulkar, Muttukrishnan Rajarajan, Yogachandran Rahulamathavan
:
SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications. ANTS 2017: 1-6 - [c70]Yogachandran Rahulamathavan
, Raphael C.-W. Phan, Muttukrishnan Rajarajan, Sudip Misra
, Ahmet M. Kondoz:
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. ANTS 2017: 1-6 - [c69]Jyoti Gajrani, Meenakshi Tripathi
, Vijay Laxmi
, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. CCNC 2017: 854-860 - [c68]Fauzia Idrees Abro, Muttukrishnan Rajarajan, Thomas M. Chen
, Yogachandran Rahulamathavan
:
Android Application Collusion Demystified. FNSS 2017: 176-187 - [c67]Cornelius Glackin, Gérard Chollet, Nazim Dugan
, Nigel Cannings, Julie A. Wall, Shahzaib Tahir, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
Privacy preserving encrypted phonetic search of speech data. ICASSP 2017: 6414-6418 - [c66]Shahzaib Tahir, Muttukrishnan Rajarajan, Ali Sajjad:
A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud. ICOIN 2017: 242-247 - [c65]Indranil Ghosh Ray, Muttukrishnan Rajarajan:
A Public Key Encryption Scheme for String Identification. TrustCom/BigDataSE/ICESS 2017: 104-111 - [c64]Shahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan:
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme. TrustCom/BigDataSE/ICESS 2017: 425-432 - [c63]Max Smith-Creasey, Muttukrishnan Rajarajan:
Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust. TrustCom/BigDataSE/ICESS 2017: 554-561 - 2016
- [j31]Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
Combined Banzhaf & Diversity Index (CBDI) for critical node detection. J. Netw. Comput. Appl. 64: 76-88 (2016) - [j30]Waqar Asif
, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Optimization based spectral partitioning for node criticality assessment. J. Netw. Comput. Appl. 75: 279-292 (2016) - [j29]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
, Ian Herwono:
Survey of approaches and features for the identification of HTTP-based botnet traffic. J. Netw. Comput. Appl. 76: 1-15 (2016) - [j28]Yogachandran Rahulamathavan
, Suresh Veluru, Jinguang Han
, Fei Li, Muttukrishnan Rajarajan, Rongxing Lu:
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Trans. Computers 65(9): 2939-2946 (2016) - [j27]Kamran Zaidi
, Milos B. Milojevic, Veselin Rakocevic, Arumugam Nallanathan
, Muttukrishnan Rajarajan:
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection. IEEE Trans. Veh. Technol. 65(8): 6703-6714 (2016) - [c62]R. K. Shyamasundar, N. V. Narendra Kumar, Muttukrishnan Rajarajan:
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. HPCC/SmartCity/DSS 2016: 1410-1417 - [c61]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan, Raphael C.-W. Phan
:
Smart, secure and seamless access control scheme for mobile devices. ICC 2016: 1-6 - [c60]Max Smith-Creasey, Muttukrishnan Rajarajan:
A continuous user authentication scheme for mobile devices. PST 2016: 104-113 - 2015
- [j26]Labiba Gillani Fahad, Muttukrishnan Rajarajan:
Integration of discriminative and generative models for activity recognition in smart homes. Appl. Soft Comput. 37: 992-1001 (2015) - [j25]Fei Li, Yogachandran Rahulamathavan
, Mauro Conti
, Muttukrishnan Rajarajan:
Robust access control framework for mobile cloud computing network. Comput. Commun. 68: 61-72 (2015) - [j24]Riyanat O. Shittu
, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Intrusion alert prioritisation and attack detection using post-correlation analysis. Comput. Secur. 50: 1-15 (2015) - [j23]Parvez Faruki, Ammar Bharmal, Vijay Laxmi
, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti
, Muttukrishnan Rajarajan:
Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Commun. Surv. Tutorials 17(2): 998-1022 (2015) - [j22]Saritha Arunkumar, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Reasoning with streamed uncertain information from unreliable sources. Expert Syst. Appl. 42(22): 8381-8392 (2015) - [j21]Ali Sajjad, Muttukrishnan Rajarajan, Andrea Zisman, Theo Dimitrakos:
A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Gener. Comput. Syst. 48: 19-27 (2015) - [j20]Kamran Zaidi, Muttukrishnan Rajarajan:
Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet 7(3): 257-275 (2015) - [j19]Labiba Gillani Fahad, Asifullah Khan, Muttukrishnan Rajarajan:
Activity recognition in smart homes with self verification of assignments. Neurocomputing 149: 1286-1298 (2015) - [j18]Christopher Köhnen, Christian Überall, Muttukrishnan Rajarajan, Rudolf Jäger, Veselin Rakocevic:
Autonomous QoS Management and Policing in Unmanaged Local Area Networks. J. Comput. Networks Commun. 2015: 790375:1-790375:24 (2015) - [j17]Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
A review paper on preserving privacy in mobile environments. J. Netw. Comput. Appl. 53: 74-90 (2015) - [j16]Smita Naval
, Vijay Laxmi
, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti:
Employing Program Semantics for Malware Detection. IEEE Trans. Inf. Forensics Secur. 10(12): 2591-2604 (2015) - [c59]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan, Omer F. Rana
, Malik S. K. Awan, Pete Burnap
, Sajal K. Das
:
Assessing Data Breach Risk in Cloud Systems. CloudCom 2015: 363-370 - [c58]Labiba Gillani Fahad, Syed Fahad Tahir, Muttukrishnan Rajarajan:
Feature selection and data balancing for activity recognition in smart homes. ICC 2015: 512-517 - [c57]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
Hide-and-seek: Face recognition in private. ICC 2015: 7102-7107 - [c56]Labiba Gillani Fahad, Muttukrishnan Rajarajan:
Anomalies Detection in Smart-Home Activities. ICMLA 2015: 419-422 - [c55]Abimbola Olabelurin, Suresh Veluru, Alex Healing, Muttukrishnan Rajarajan:
Entropy clustering approach for improving forecasting in DDoS attacks. ICNSC 2015: 315-320 - [c54]Waqar Asif
, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Spectral partitioning for node criticality. ISCC 2015: 877-882 - [c53]Saritha Arunkumar, Mudhakar Srivatsa, Murat Sensoy, Muttukrishnan Rajarajan:
Global attestation of location in mobile devices. MILCOM 2015: 1612-1617 - [c52]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. WOOT 2015 - 2014
- [j15]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Stealing bandwidth from BitTorrent seeders. Comput. Secur. 46: 126-140 (2014) - [j14]Yogachandran Rahulamathavan
, Raphael Chung-Wei Phan
, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan:
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. IEEE Trans. Dependable Secur. Comput. 11(5): 467-479 (2014) - [j13]Yogachandran Rahulamathavan
, Suresh Veluru, Raphael C.-W. Phan
, Jonathon A. Chambers, Muttukrishnan Rajarajan:
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification. IEEE J. Biomed. Health Informatics 18(1): 56-66 (2014) - [j12]Mahzeb Fiaz, Roomana Yousaf, Maryam Hanfi, Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks. Wirel. Pers. Commun. 74(2): 989-1004 (2014) - [c51]Yogachandran Rahulamathavan
, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan:
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. ACISP 2014: 430-437 - [c50]Fauzia Idrees, Muttukrishnan Rajarajan:
War against mobile malware with cloud computing and machine learning forces. CloudNet 2014: 278-280 - [c49]Smita Naval
, Vijay Laxmi
, Manoj Singh Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti
:
Environment-Reactive Malware Behavior: Detection and Categorization. DPM/SETOP/QASA 2014: 167-182 - [c48]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Who Is Going to Be the Next BitTorrent Peer Idol? EUC 2014: 293-298 - [c47]Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
CBDI: Combined Banzhaf & diversity index for finding critical nodes. GLOBECOM 2014: 758-763 - [c46]Ali Sajjad, Muttukrishnan Rajarajan, Theo Dimitrakos:
A Low-Overhead Secure Communication Framework for an Inter-cloud Environment. ICC 2014: 121-136 - [c45]Labiba Gillani Fahad, Syed Fahad Tahir, Muttukrishnan Rajarajan:
Activity Recognition in Smart Homes Using Clustering Based Classification. ICPR 2014: 1348-1353 - [c44]Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman:
Trust Assessment Using Cloud Broker. IFIPTM 2014: 237-244 - [c43]Riyanat O. Shittu, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis. LCN 2014: 322-330 - [c42]Fei Li, Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment. LCN 2014: 354-361 - [c41]Neha Gupta, Smita Naval
, Vijay Laxmi
, Manoj Singh Gaur, Muttukrishnan Rajarajan:
P-SPADE: GPU accelerated malware packer detection. PST 2014: 257-263 - [c40]Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap
, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis:
Analysing Security requirements in Cloud-based Service Level Agreements. SIN 2014: 73 - [c39]Muhammad Adnan, Antonio Lima, Luca Rossi
, Suresh Veluru, Paul A. Longley, Mirco Musolesi
, Muttukrishnan Rajarajan:
The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. SIN 2014: 254 - [c38]Smita Naval
, Vijay Laxmi
, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan:
Exploring Worm Behaviors using DTW. SIN 2014: 379 - [c37]Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan:
Data-centric Rogue Node Detection in VANETs. TrustCom 2014: 398-405 - [c36]Parvez Faruki, Ammar Bharmal, Vijay Laxmi
, Manoj Singh Gaur, Mauro Conti
, Muttukrishnan Rajarajan:
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. TrustCom 2014: 414-421 - [c35]