


Остановите войну!
for scientists:


default search action
Muttukrishnan Rajarajan
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j62]Umme Zahoora, Muttukrishnan Rajarajan, Zahoqing Pan, Asifullah Khan
:
Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier. Appl. Intell. 52(12): 13941-13960 (2022) - [j61]Dilara Acarali
, K. Rajesh Rao
, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling smart grid IT-OT dependencies for DDoS impact propagation. Comput. Secur. 112: 102528 (2022) - [c98]Veniamin Boiarkin, Muttukrishnan Rajarajan:
A novel Blockchain-Based Data-Aggregation scheme for Edge-Enabled Microgrid of Prosumers. BCCA 2022: 63-68 - [c97]Akanksha Dixit, Max Smith-Creasey, Muttukrishnan Rajarajan:
A Decentralized IIoT Identity Framework based on Self-Sovereign Identity using Blockchain. LCN 2022: 335-338 - 2021
- [j60]K. Rajesh Rao
, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Role recommender-RBAC: Optimizing user-role assignments in RBAC. Comput. Commun. 166: 140-153 (2021) - [j59]Chithralekha Balamurugan, Kalpana Singh
, Ganeshvani Ganesan, Muttukrishnan Rajarajan:
Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions. Cryptogr. 5(4): 38 (2021) - [j58]Yogachandran Rahulamathavan
, Safak Dogan, Xiyu Shi, Rongxing Lu
, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems. IEEE Internet Things J. 8(3): 1417-1427 (2021) - [j57]Shahzaib Tahir, Hasan Tahir, Ali Sajjad, Muttukrishnan Rajarajan, Fawad Khan
:
Privacy-preserving COVID-19 contact tracing using blockchain. J. Commun. Networks 23(5): 360-373 (2021) - [j56]Sudip Misra
, Anandarup Mukherjee
, Arijit Roy, Nishant Saurabh
, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Blockchain at the Edge: Performance of Resource-Constrained IoT Networks. IEEE Trans. Parallel Distributed Syst. 32(1): 174-183 (2021) - [c96]Abdul Nasir, Hassaan Khaliq Qureshi, Israr Ullah, Muttukrishnan Rajarajan:
EHA-BeeSensor: Hybrid Protocol for Energy Proficient Routing in IoT Network using Swarm Intelligence. CAMAD 2021: 1-7 - [c95]Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan:
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. SEC 2021: 36-50 - [i2]Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
A Characterisation of Smart Grid DoS Attacks. CoRR abs/2107.11202 (2021) - 2020
- [j55]Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:
Securing the LoRaWAN join procedure using blockchains. Clust. Comput. 23(3): 2123-2138 (2020) - [j54]Shahzaib Tahir, Liutauras Steponkus, Sushmita Ruj
, Muttukrishnan Rajarajan, Ali Sajjad:
A parallelized disjunctive query based searchable encryption scheme for big data. Future Gener. Comput. Syst. 109: 583-592 (2020) - [j53]Indranil Ghosh Ray
, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification. IEEE Trans. Cloud Comput. 8(3): 672-684 (2020) - [c94]Faiez Altamimi, Waqar Asif, Muttukrishnan Rajarajan:
DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store. CITS 2020: 1-8 - [c93]Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling DoS Attacks & Interoperability in the Smart Grid. ICCCN 2020: 1-6 - [c92]Akanksha Dixit, Waqar Asif, Muttukrishnan Rajarajan:
Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0. IECON 2020: 2221-2227 - [c91]Aman Framewala, Sarvesh Harale, Shreya Khatal, Dhiren R. Patel, Yann Busnel
, Muttukrishnan Rajarajan:
Blockchain Analysis Tool For Monitoring Coin Flow. SDS 2020: 196-201 - [c90]Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan:
Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment. UEMCON 2020: 323-330 - [i1]Yogachandran Rahulamathavan, Safak Dogan, Rongxing Lu, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-preserving Systems. CoRR abs/2004.01891 (2020)
2010 – 2019
- 2019
- [j52]Iván García-Magariño
, Muttukrishnan Rajarajan, Jaime Lloret
:
Human-Centric AI for Trustworthy IoT Systems With Explainable Multilayer Perceptrons. IEEE Access 7: 125562-125574 (2019) - [j51]K. Rajesh Rao
, Indranil Ghosh Ray, Waqar Asif
, Ashalatha Nayak, Muttukrishnan Rajarajan:
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE Access 7: 133274-133289 (2019) - [j50]Iván García-Magariño
, Raquel Lacuesta
, Muttukrishnan Rajarajan, Jaime Lloret
:
Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Networks 86: 72-82 (2019) - [j49]Shahzaib Tahir, Sushmita Ruj
, Ali Sajjad, Muttukrishnan Rajarajan:
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Comput. Commun. 133: 102-114 (2019) - [j48]Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput. Secur. 83: 140-150 (2019) - [j47]Dilara Acarali
, Muttukrishnan Rajarajan, Nikos Komninos
, Bruno Bogaz Zarpelão
:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Secur. Commun. Networks 2019: 3745619:1-3745619:13 (2019) - [j46]Yogachandran Rahulamathavan
, Kunaraj R. Sutharsini, Indranil Ghosh Ray
, Rongxing Lu
, Muttukrishnan Rajarajan:
Privacy-Preserving iVector-Based Speaker Verification. IEEE ACM Trans. Audio Speech Lang. Process. 27(3): 496-506 (2019) - [j45]Shahzaib Tahir
, Sushmita Ruj
, Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan, Cornelius Glackin:
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Trans. Emerg. Top. Comput. 7(4): 530-544 (2019) - [j44]Fauzia Idrees Abro
, Farzana Rauf, Mobeen Ur Rehman
, B. S. Chowdhry
, Muttukrishnan Rajarajan:
Towards Security of GSM Voice Communication. Wirel. Pers. Commun. 108(3): 1933-1955 (2019) - [c89]Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. ICB 2019: 1-8 - [c88]Syed Muhammad Danish, Marios Lestas, Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure. ICC Workshops 2019: 1-6 - [c87]Iván García-Magariño, Geraldine Gray, Muttukrishnan Rajarajan, Waqar Asif
:
Agent-based IoT Coordination for Smart Cities Considering Security and Privacy. IoTSMS 2019: 221-226 - [c86]Akash Aggarwal, Waqar Asif
, Habibul Azam, Milan Markovic
, Muttukrishnan Rajarajan, Peter Edwards:
User Privacy Risk Analysis For The Internet of Things. IoTSMS 2019: 259-264 - [c85]Syed Naqvi, Sean Enderby, Ian Williams, Waqar Asif
, Muttukrishnan Rajarajan, Cristi Potlog, Monica Florea:
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities. NTMS 2019: 1-6 - [c84]Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif
, Marios Lestas, Muttukrishnan Rajarajan:
Node Criticality Assessment in a Blockchain Network. BlockSys@SenSys 2019: 22-27 - 2018
- [j43]Waqar Asif
, Muttukrishnan Rajarajan, Marios Lestas:
Increasing user controllability on device specific privacy in the Internet of Things. Comput. Commun. 116: 200-211 (2018) - [j42]Max Smith-Creasey, Fatema A. Albalooshi
, Muttukrishnan Rajarajan:
Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocess. Microsystems 63: 147-157 (2018) - [j41]Gaurav Somani
, Manoj Singh Gaur
, Dheeraj Sanghi, Mauro Conti
, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Trans. Dependable Secur. Comput. 15(6): 959-973 (2018) - [j40]Hëna Maloku
, Enver Hamiti, Zana Limani Fazliu
, Vicky Papadopoulou Lesta, Andreas Pitsillides
, Muttukrishnan Rajarajan:
A Decentralized Approach for Self-Coexistence Among Heterogeneous Networks in TVWS. IEEE Trans. Veh. Technol. 67(2): 1302-1312 (2018) - [c83]S. Rahulamathavan, X. Yao, R. Yogachandran, K. Cumanan, Muttukrishnan Rajarajan:
Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition. CyberSA 2018: 1-8 - [c82]Max Smith-Creasey, Fatema A. Albalooshi
, Muttukrishnan Rajarajan:
Context Awareness for Improved Continuous Face Authentication on Mobile Devices. DASC/PiCom/DataCom/CyberSciTech 2018: 644-652 - [c81]Arijit Roy, Chandana Roy, Sudip Misra
, Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
CARE: Criticality-Aware Data Transmission in CPS-Based Healthcare Systems. ICC Workshops 2018: 1-6 - [c80]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
:
Evaluating the Provision of Botnet Defences using Translational Research Concepts. ICETE (2) 2018: 680-685 - [c79]Waqar Asif
, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
An attack tree based risk evaluation approach for the internet of things. IOT 2018: 6:1-6:8 - [c78]Milan Markovic
, David Corsar
, Waqar Asif, Peter Edwards
, Muttukrishnan Rajarajan:
Towards Transparency of IoT Message Brokers. IPAW 2018: 200-203 - [c77]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
:
Modelling Botnet Propagation in Networks with Layered Defences. ISNCC 2018: 1-6 - [c76]Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks. iThings/GreenCom/CPSCom/SmartData 2018: 1628-1633 - [c75]Milan Markovic
, Waqar Asif
, David Corsar, Naomi Jacobs
, Peter Edwards
, Muttukrishnan Rajarajan, Caitlin Doyle Cottrill
:
Towards automated privacy risk assessments in IoT systems. M4IoT@Middleware 2018: 15-18 - [c74]Waqar Asif
, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. SNPD 2018: 329-334 - [c73]Bruno Bogaz Zarpelão
, Rodrigo Sanches Miani
, Muttukrishnan Rajarajan
:
Detection of Bitcoin-Based Botnets Using a One-Class Classifier. WISTP 2018: 174-189 - 2017
- [j39]Muhammad Arsalan, Aqsa Saeed Qureshi, Asifullah Khan
, Muttukrishnan Rajarajan:
Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl. Soft Comput. 51: 168-179 (2017) - [j38]Gaurav Somani
, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
DDoS victim service containment to minimize the internal collateral damages in cloud computing. Comput. Electr. Eng. 59: 165-179 (2017) - [j37]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya:
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. IEEE Cloud Comput. 4(1): 22-32 (2017) - [j36]Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Thomas M. Chen
, Yogachandran Rahulamathavan
:
PIndroid: A novel Android malware detection system using ensemble learning methods. Comput. Secur. 68: 36-46 (2017) - [j35]Seyed Mohammad RezaSaadat Beheshti, Panos Liatsis, Muttukrishnan Rajarajan:
A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Comput. Secur. 70: 596-617 (2017) - [j34]Saritha Arunkumar, Berker Soyluoglu, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location attestation and access control for mobile devices using GeoXACML. J. Netw. Comput. Appl. 80: 181-188 (2017) - [j33]Kim-Kwang Raymond Choo, Omer F. Rana
, Muttukrishnan Rajarajan:
Cloud Security Engineering: Theory, Practice and Future Research. IEEE Trans. Cloud Comput. 5(3): 372-374 (2017) - [j32]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
Efficient Privacy-Preserving Facial Expression Classification. IEEE Trans. Dependable Secur. Comput. 14(3): 326-338 (2017) - [c72]Anandarup Mukherjee, Sudip Misra
, P. Mangrulkar, Muttukrishnan Rajarajan, Yogachandran Rahulamathavan
:
SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications. ANTS 2017: 1-6 - [c71]Yogachandran Rahulamathavan
, Raphael C.-W. Phan, Muttukrishnan Rajarajan, Sudip Misra
, Ahmet M. Kondoz:
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. ANTS 2017: 1-6 - [c70]Jyoti Gajrani, Meenakshi Tripathi
, Vijay Laxmi
, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. CCNC 2017: 854-860 - [c69]Fauzia Idrees Abro, Muttukrishnan Rajarajan, Thomas M. Chen
, Yogachandran Rahulamathavan
:
Android Application Collusion Demystified. FNSS 2017: 176-187 - [c68]Cornelius Glackin, Gérard Chollet, Nazim Dugan
, Nigel Cannings, Julie A. Wall, Shahzaib Tahir, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
Privacy preserving encrypted phonetic search of speech data. ICASSP 2017: 6414-6418 - [c67]Shahzaib Tahir, Muttukrishnan Rajarajan, Ali Sajjad:
A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud. ICOIN 2017: 242-247 - [c66]Indranil Ghosh Ray, Muttukrishnan Rajarajan:
A Public Key Encryption Scheme for String Identification. TrustCom/BigDataSE/ICESS 2017: 104-111 - [c65]Shahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan:
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme. TrustCom/BigDataSE/ICESS 2017: 425-432 - [c64]Max Smith-Creasey, Muttukrishnan Rajarajan:
Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust. TrustCom/BigDataSE/ICESS 2017: 554-561 - 2016
- [j31]Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
Combined Banzhaf & Diversity Index (CBDI) for critical node detection. J. Netw. Comput. Appl. 64: 76-88 (2016) - [j30]Waqar Asif
, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Optimization based spectral partitioning for node criticality assessment. J. Netw. Comput. Appl. 75: 279-292 (2016) - [j29]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
, Ian Herwono:
Survey of approaches and features for the identification of HTTP-based botnet traffic. J. Netw. Comput. Appl. 76: 1-15 (2016) - [j28]Yogachandran Rahulamathavan
, Suresh Veluru, Jinguang Han
, Fei Li, Muttukrishnan Rajarajan, Rongxing Lu:
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Trans. Computers 65(9): 2939-2946 (2016) - [j27]Kamran Zaidi
, Milos B. Milojevic, Veselin Rakocevic, Arumugam Nallanathan
, Muttukrishnan Rajarajan:
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection. IEEE Trans. Veh. Technol. 65(8): 6703-6714 (2016) - [c63]R. K. Shyamasundar, N. V. Narendra Kumar, Muttukrishnan Rajarajan:
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. HPCC/SmartCity/DSS 2016: 1410-1417 - [c62]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan, Raphael C.-W. Phan
:
Smart, secure and seamless access control scheme for mobile devices. ICC 2016: 1-6 - [c61]Max Smith-Creasey, Muttukrishnan Rajarajan:
A continuous user authentication scheme for mobile devices. PST 2016: 104-113 - 2015
- [j26]Labiba Gillani Fahad, Muttukrishnan Rajarajan:
Integration of discriminative and generative models for activity recognition in smart homes. Appl. Soft Comput. 37: 992-1001 (2015) - [j25]Fei Li, Yogachandran Rahulamathavan
, Mauro Conti
, Muttukrishnan Rajarajan:
Robust access control framework for mobile cloud computing network. Comput. Commun. 68: 61-72 (2015) - [j24]Riyanat O. Shittu
, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Intrusion alert prioritisation and attack detection using post-correlation analysis. Comput. Secur. 50: 1-15 (2015) - [j23]Parvez Faruki, Ammar Bharmal, Vijay Laxmi
, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti
, Muttukrishnan Rajarajan:
Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Commun. Surv. Tutorials 17(2): 998-1022 (2015) - [j22]Saritha Arunkumar, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Reasoning with streamed uncertain information from unreliable sources. Expert Syst. Appl. 42(22): 8381-8392 (2015) - [j21]Ali Sajjad, Muttukrishnan Rajarajan, Andrea Zisman, Theo Dimitrakos
:
A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Gener. Comput. Syst. 48: 19-27 (2015) - [j20]Kamran Zaidi, Muttukrishnan Rajarajan:
Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet 7(3): 257-275 (2015) - [j19]Labiba Gillani Fahad, Asifullah Khan
, Muttukrishnan Rajarajan:
Activity recognition in smart homes with self verification of assignments. Neurocomputing 149: 1286-1298 (2015) - [j18]Christopher Köhnen, Christian Überall, Muttukrishnan Rajarajan, Rudolf Jäger, Veselin Rakocevic:
Autonomous QoS Management and Policing in Unmanaged Local Area Networks. J. Comput. Networks Commun. 2015: 790375:1-790375:24 (2015) - [j17]Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
A review paper on preserving privacy in mobile environments. J. Netw. Comput. Appl. 53: 74-90 (2015) - [j16]Smita Naval
, Vijay Laxmi
, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti:
Employing Program Semantics for Malware Detection. IEEE Trans. Inf. Forensics Secur. 10(12): 2591-2604 (2015) - [c60]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan, Omer F. Rana
, Malik S. K. Awan, Pete Burnap
, Sajal K. Das
:
Assessing Data Breach Risk in Cloud Systems. CloudCom 2015: 363-370 - [c59]Labiba Gillani Fahad, Syed Fahad Tahir, Muttukrishnan Rajarajan:
Feature selection and data balancing for activity recognition in smart homes. ICC 2015: 512-517 - [c58]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
Hide-and-seek: Face recognition in private. ICC 2015: 7102-7107 - [c57]Labiba Gillani Fahad, Muttukrishnan Rajarajan:
Anomalies Detection in Smart-Home Activities. ICMLA 2015: 419-422 - [c56]Abimbola Olabelurin, Suresh Veluru, Alex Healing, Muttukrishnan Rajarajan:
Entropy clustering approach for improving forecasting in DDoS attacks. ICNSC 2015: 315-320 - [c55]Waqar Asif
, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Spectral partitioning for node criticality. ISCC 2015: 877-882 - [c54]Saritha Arunkumar, Mudhakar Srivatsa, Murat Sensoy, Muttukrishnan Rajarajan:
Global attestation of location in mobile devices. MILCOM 2015: 1612-1617 - [c53]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. WOOT 2015 - 2014
- [j15]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Stealing bandwidth from BitTorrent seeders. Comput. Secur. 46: 126-140 (2014) - [j14]Yogachandran Rahulamathavan
, Raphael Chung-Wei Phan
, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan:
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. IEEE Trans. Dependable Secur. Comput. 11(5): 467-479 (2014) - [j13]Yogachandran Rahulamathavan
, Suresh Veluru, Raphael C.-W. Phan
, Jonathon A. Chambers, Muttukrishnan Rajarajan:
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification. IEEE J. Biomed. Health Informatics 18(1): 56-66 (2014) - [j12]Mahzeb Fiaz, Roomana Yousaf, Maryam Hanfi, Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks. Wirel. Pers. Commun. 74(2): 989-1004 (2014) - [c52]Yogachandran Rahulamathavan
, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan:
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. ACISP 2014: 430-437 - [c51]Fauzia Idrees, Muttukrishnan Rajarajan:
War against mobile malware with cloud computing and machine learning forces. CloudNet 2014: 278-280 - [c50]Smita Naval
, Vijay Laxmi
, Manoj Singh Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti
:
Environment-Reactive Malware Behavior: Detection and Categorization. DPM/SETOP/QASA 2014: 167-182 - [c49]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Who Is Going to Be the Next BitTorrent Peer Idol? EUC 2014: 293-298 - [c48]Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
CBDI: Combined Banzhaf & diversity index for finding critical nodes. GLOBECOM 2014: 758-763 - [c47]Ali Sajjad, Muttukrishnan Rajarajan, Theo Dimitrakos:
A Low-Overhead Secure Communication Framework for an Inter-cloud Environment. ICC 2014: 121-136 - [c46]Labiba Gillani Fahad, Syed Fahad Tahir, Muttukrishnan Rajarajan:
Activity Recognition in Smart Homes Using Clustering Based Classification. ICPR 2014: 1348-1353 - [c45]Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman:
Trust Assessment Using Cloud Broker. IFIPTM 2014: 237-244 - [c44]Riyanat O. Shittu, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis. LCN 2014: 322-330 - [c43]Fei Li, Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan:
LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment. LCN 2014: 354-361 - [c42]Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location Security - Where to Enforce? MILCOM 2014: 1651-1656 - [c41]Neha Gupta, Smita Naval
, Vijay Laxmi
, Manoj Singh Gaur, Muttukrishnan Rajarajan:
P-SPADE: GPU accelerated malware packer detection. PST 2014: 257-263 - [c40]Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap
, Muttukrishnan Rajarajan, Omer F. Rana
, George Spanoudakis:
Analysing Security requirements in Cloud-based Service Level Agreements. SIN 2014: 73 - [c39]Muhammad Adnan, Antonio Lima, Luca Rossi
, Suresh Veluru, Paul A. Longley, Mirco Musolesi
, Muttukrishnan Rajarajan:
The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. SIN 2014: 254 - [c38]Smita Naval
, Vijay Laxmi
, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan:
Exploring Worm Behaviors using DTW. SIN 2014: 379 - [c37]Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan:
Data-centric Rogue Node Detection in VANETs. TrustCom 2014: 398-405 - [c36]