default search action
Muttukrishnan Rajarajan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Veniamin Boiarkin, Bruno Bogaz Zarpelão, Jafar Al-Zaili, Muttukrishnan Rajarajan:
A Privacy-Preserving User-Centric Data-Sharing Scheme. IEEE Access 12: 149977-149987 (2024) - [j71]Akanksha Dixit, Bruno Bogaz Zarpelão, Max Smith-Creasey, Muttukrishnan Rajarajan:
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace. Comput. Secur. 146: 104050 (2024) - [c103]Hamid Yazdaninejad, Muttukrishnan Rajarajan, Michal Król:
A Blockchain-enabled and Transparent Evaluation of ML Models in the Decentralised Marketplace. Blockchain 2024: 458-463 - [c102]Ammar Bukhari, Jarmo Miettinen, Muttukrishnan Rajarajan:
Defining Unified Signature API Library for Mobile Apps to Integrate with Secure Signature Creation Devices (SSCDs). Blockchain 2024: 619-624 - 2023
- [j70]Chetana Pujari, Balachandra Muniyal, C. B. Chandrakala, Anirudha Rao, Vasudeva Sadiname, Muttukrishnan Rajarajan:
Identity resilience in the digital health ecosystem: A key recovery-enabled framework. Comput. Biol. Medicine 167: 107702 (2023) - [j69]Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan, Ashok Kumar Das, Joel J. P. C. Rodrigues:
SUACC-IoT: secure unified authentication and access control system based on capability for IoT. Clust. Comput. 26(4): 2409-2428 (2023) - [j68]Akanksha Dixit, Arjun Singh, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
FAST DATA: A Fair, Secure, and Trusted Decentralized IIoT Data Marketplace Enabled by Blockchain. IEEE Internet Things J. 10(4): 2934-2944 (2023) - [j67]Dawood Behbehani, Nikos Komninos, Khalid Al-Begain, Muttukrishnan Rajarajan:
Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment. J. Cloud Comput. 12(1): 79 (2023) - [j66]Safwana Haque, Fadi El-Moussa, Nikos Komninos, Muttukrishnan Rajarajan:
A Systematic Review of Data-Driven Attack Detection Trends in IoT. Sensors 23(16): 7191 (2023) - [j65]Aiman Sultan, Shahzaib Tahir, Hasan Tahir, Tayyaba Anwer, Fawad Khan, Muttukrishnan Rajarajan, Omer F. Rana:
A Novel Image-Based Homomorphic Approach for Preserving the Privacy of Autonomous Vehicles Connected to the Cloud. IEEE Trans. Intell. Transp. Syst. 24(2): 1936-1948 (2023) - [j64]Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan, Ashok Kumar Das:
A New Scalable and Secure Access Control Scheme Using Blockchain Technology for IoT. IEEE Trans. Netw. Serv. Manag. 20(3): 2957-2974 (2023) - [c101]Safwana Haque, Fadi El-Moussa, Nikos Komninos, Muttukrishnan Rajarajan:
Identification of Important Features at Different IoT layers for Dynamic Attack Detection. BigDataSecurity/HPSC/IDS 2023: 84-90 - [c100]Dawood Behbehani, Nikos Komninos, Khalid Al-Begain, Muttukrishnan Rajarajan:
Open Banking API Security: Anomalous Access Behaviour. INISTA 2023: 1-4 - [c99]Mathuranthagaa Selvarathnam, Roshan G. Ragel, Constantino Carlos Reyes-Aldasoro, Muttukrishnan Rajarajan:
Privacy vs Utility analysis when applying Differential Privacy on Machine Learning Classifiers. WiMob 2023: 306-311 - 2022
- [j63]Umme Zahoora, Muttukrishnan Rajarajan, Zahoqing Pan, Asifullah Khan:
Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier. Appl. Intell. 52(12): 13941-13960 (2022) - [j62]Dilara Acarali, K. Rajesh Rao, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling smart grid IT-OT dependencies for DDoS impact propagation. Comput. Secur. 112: 102528 (2022) - [j61]Max Smith-Creasey, Steven Furnell, Muttukrishnan Rajarajan:
Continuous authentication for IoT smart home environments. Netw. Secur. 2022(4) (2022) - [c98]Veniamin Boiarkin, Muttukrishnan Rajarajan:
A novel Blockchain-Based Data-Aggregation scheme for Edge-Enabled Microgrid of Prosumers. BCCA 2022: 63-68 - [c97]Akanksha Dixit, Max Smith-Creasey, Muttukrishnan Rajarajan:
A Decentralized IIoT Identity Framework based on Self-Sovereign Identity using Blockchain. LCN 2022: 335-338 - 2021
- [j60]K. Rajesh Rao, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Role recommender-RBAC: Optimizing user-role assignments in RBAC. Comput. Commun. 166: 140-153 (2021) - [j59]Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan:
Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions. Cryptogr. 5(4): 38 (2021) - [j58]Yogachandran Rahulamathavan, Safak Dogan, Xiyu Shi, Rongxing Lu, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems. IEEE Internet Things J. 8(3): 1417-1427 (2021) - [j57]Shahzaib Tahir, Hasan Tahir, Ali Sajjad, Muttukrishnan Rajarajan, Fawad Khan:
Privacy-preserving COVID-19 contact tracing using blockchain. J. Commun. Networks 23(5): 360-373 (2021) - [j56]Sudip Misra, Anandarup Mukherjee, Arijit Roy, Nishant Saurabh, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Blockchain at the Edge: Performance of Resource-Constrained IoT Networks. IEEE Trans. Parallel Distributed Syst. 32(1): 174-183 (2021) - [c96]Abdul Nasir, Hassaan Khaliq Qureshi, Israr Ullah, Muttukrishnan Rajarajan:
EHA-BeeSensor: Hybrid Protocol for Energy Proficient Routing in IoT Network using Swarm Intelligence. CAMAD 2021: 1-7 - [c95]Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan:
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. SEC 2021: 36-50 - [i2]Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
A Characterisation of Smart Grid DoS Attacks. CoRR abs/2107.11202 (2021) - 2020
- [j55]Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:
Securing the LoRaWAN join procedure using blockchains. Clust. Comput. 23(3): 2123-2138 (2020) - [j54]Shahzaib Tahir, Liutauras Steponkus, Sushmita Ruj, Muttukrishnan Rajarajan, Ali Sajjad:
A parallelized disjunctive query based searchable encryption scheme for big data. Future Gener. Comput. Syst. 109: 583-592 (2020) - [j53]Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification. IEEE Trans. Cloud Comput. 8(3): 672-684 (2020) - [c94]Faiez Altamimi, Waqar Asif, Muttukrishnan Rajarajan:
DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store. CITS 2020: 1-8 - [c93]Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling DoS Attacks & Interoperability in the Smart Grid. ICCCN 2020: 1-6 - [c92]Akanksha Dixit, Waqar Asif, Muttukrishnan Rajarajan:
Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0. IECON 2020: 2221-2227 - [c91]Aman Framewala, Sarvesh Harale, Shreya Khatal, Dhiren R. Patel, Yann Busnel, Muttukrishnan Rajarajan:
Blockchain Analysis Tool For Monitoring Coin Flow. SDS 2020: 196-201 - [c90]Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan:
Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment. UEMCON 2020: 323-330 - [i1]Yogachandran Rahulamathavan, Safak Dogan, Rongxing Lu, Muttukrishnan Rajarajan, Ahmet M. Kondoz:
Scalar Product Lattice Computation for Efficient Privacy-preserving Systems. CoRR abs/2004.01891 (2020)
2010 – 2019
- 2019
- [j52]Iván García-Magariño, Muttukrishnan Rajarajan, Jaime Lloret:
Human-Centric AI for Trustworthy IoT Systems With Explainable Multilayer Perceptrons. IEEE Access 7: 125562-125574 (2019) - [j51]K. Rajesh Rao, Indranil Ghosh Ray, Waqar Asif, Ashalatha Nayak, Muttukrishnan Rajarajan:
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE Access 7: 133274-133289 (2019) - [j50]Iván García-Magariño, Raquel Lacuesta, Muttukrishnan Rajarajan, Jaime Lloret:
Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Networks 86: 72-82 (2019) - [j49]Shahzaib Tahir, Sushmita Ruj, Ali Sajjad, Muttukrishnan Rajarajan:
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Comput. Commun. 133: 102-114 (2019) - [j48]Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput. Secur. 83: 140-150 (2019) - [j47]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Bruno Bogaz Zarpelão:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Secur. Commun. Networks 2019: 3745619:1-3745619:13 (2019) - [j46]Yogachandran Rahulamathavan, Kunaraj R. Sutharsini, Indranil Ghosh Ray, Rongxing Lu, Muttukrishnan Rajarajan:
Privacy-Preserving iVector-Based Speaker Verification. IEEE ACM Trans. Audio Speech Lang. Process. 27(3): 496-506 (2019) - [j45]Shahzaib Tahir, Sushmita Ruj, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan, Cornelius Glackin:
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Trans. Emerg. Top. Comput. 7(4): 530-544 (2019) - [j44]Fauzia Idrees Abro, Farzana Rauf, Mobeen Ur Rehman, B. S. Chowdhry, Muttukrishnan Rajarajan:
Towards Security of GSM Voice Communication. Wirel. Pers. Commun. 108(3): 1933-1955 (2019) - [c89]Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. ICB 2019: 1-8 - [c88]Syed Muhammad Danish, Marios Lestas, Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure. ICC Workshops 2019: 1-6 - [c87]Iván García-Magariño, Geraldine Gray, Muttukrishnan Rajarajan, Waqar Asif:
Agent-based IoT Coordination for Smart Cities Considering Security and Privacy. IoTSMS 2019: 221-226 - [c86]Akash Aggarwal, Waqar Asif, Habibul Azam, Milan Markovic, Muttukrishnan Rajarajan, Peter Edwards:
User Privacy Risk Analysis For The Internet of Things. IoTSMS 2019: 259-264 - [c85]Syed Naqvi, Sean Enderby, Ian Williams, Waqar Asif, Muttukrishnan Rajarajan, Cristi Potlog, Monica Florea:
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities. NTMS 2019: 1-6 - [c84]Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif, Marios Lestas, Muttukrishnan Rajarajan:
Node Criticality Assessment in a Blockchain Network. BlockSys@SenSys 2019: 22-27 - 2018
- [j43]Waqar Asif, Muttukrishnan Rajarajan, Marios Lestas:
Increasing user controllability on device specific privacy in the Internet of Things. Comput. Commun. 116: 200-211 (2018) - [j42]Max Smith-Creasey, Fatema A. Albalooshi, Muttukrishnan Rajarajan:
Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocess. Microsystems 63: 147-157 (2018) - [j41]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Trans. Dependable Secur. Comput. 15(6): 959-973 (2018) - [j40]Hëna Maloku, Enver Hamiti, Zana Limani Fazliu, Vicky Papadopoulou Lesta, Andreas Pitsillides, Muttukrishnan Rajarajan:
A Decentralized Approach for Self-Coexistence Among Heterogeneous Networks in TVWS. IEEE Trans. Veh. Technol. 67(2): 1302-1312 (2018) - [c83]S. Rahulamathavan, Xuewen Yao, R. Yogachandran, K. Cumanan, Muttukrishnan Rajarajan:
Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition. CyberSA 2018: 1-8 - [c82]Max Smith-Creasey, Fatema A. Albalooshi, Muttukrishnan Rajarajan:
Context Awareness for Improved Continuous Face Authentication on Mobile Devices. DASC/PiCom/DataCom/CyberSciTech 2018: 644-652 - [c81]Arijit Roy, Chandana Roy, Sudip Misra, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
CARE: Criticality-Aware Data Transmission in CPS-Based Healthcare Systems. ICC Workshops 2018: 1-6 - [c80]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos:
Evaluating the Provision of Botnet Defences using Translational Research Concepts. ICETE (2) 2018: 680-685 - [c79]Waqar Asif, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
An attack tree based risk evaluation approach for the internet of things. IOT 2018: 6:1-6:8 - [c78]Milan Markovic, David Corsar, Waqar Asif, Peter Edwards, Muttukrishnan Rajarajan:
Towards Transparency of IoT Message Brokers. IPAW 2018: 200-203 - [c77]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos:
Modelling Botnet Propagation in Networks with Layered Defences. ISNCC 2018: 1-6 - [c76]Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks. iThings/GreenCom/CPSCom/SmartData 2018: 1628-1633 - [c75]Milan Markovic, Waqar Asif, David Corsar, Naomi Jacobs, Peter Edwards, Muttukrishnan Rajarajan, Caitlin Doyle Cottrill:
Towards automated privacy risk assessments in IoT systems. M4IoT@Middleware 2018: 15-18 - [c74]Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. SNPD 2018: 329-334 - [c73]Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Muttukrishnan Rajarajan:
Detection of Bitcoin-Based Botnets Using a One-Class Classifier. WISTP 2018: 174-189 - 2017
- [j39]Muhammad Arsalan, Aqsa Saeed Qureshi, Asifullah Khan, Muttukrishnan Rajarajan:
Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl. Soft Comput. 51: 168-179 (2017) - [j38]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
DDoS victim service containment to minimize the internal collateral damages in cloud computing. Comput. Electr. Eng. 59: 165-179 (2017) - [j37]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya:
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. IEEE Cloud Comput. 4(1): 22-32 (2017) - [j36]Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Thomas M. Chen, Yogachandran Rahulamathavan:
PIndroid: A novel Android malware detection system using ensemble learning methods. Comput. Secur. 68: 36-46 (2017) - [j35]Seyed Mohammad RezaSaadat Beheshti, Panos Liatsis, Muttukrishnan Rajarajan:
A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Comput. Secur. 70: 596-617 (2017) - [j34]Saritha Arunkumar, Berker Soyluoglu, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location attestation and access control for mobile devices using GeoXACML. J. Netw. Comput. Appl. 80: 181-188 (2017) - [j33]Kim-Kwang Raymond Choo, Omer F. Rana, Muttukrishnan Rajarajan:
Cloud Security Engineering: Theory, Practice and Future Research. IEEE Trans. Cloud Comput. 5(3): 372-374 (2017) - [j32]Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Efficient Privacy-Preserving Facial Expression Classification. IEEE Trans. Dependable Secur. Comput. 14(3): 326-338 (2017) - [c72]Anandarup Mukherjee, Sudip Misra, P. Mangrulkar, Muttukrishnan Rajarajan, Yogachandran Rahulamathavan:
SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications. ANTS 2017: 1-6 - [c71]Yogachandran Rahulamathavan, Raphael C.-W. Phan, Muttukrishnan Rajarajan, Sudip Misra, Ahmet M. Kondoz:
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. ANTS 2017: 1-6 - [c70]Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. CCNC 2017: 854-860 - [c69]Fauzia Idrees Abro, Muttukrishnan Rajarajan, Thomas M. Chen, Yogachandran Rahulamathavan:
Android Application Collusion Demystified. FNSS 2017: 176-187 - [c68]Cornelius Glackin, Gérard Chollet, Nazim Dugan, Nigel Cannings, Julie A. Wall, Shahzaib Tahir, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
Privacy preserving encrypted phonetic search of speech data. ICASSP 2017: 6414-6418 - [c67]Shahzaib Tahir, Muttukrishnan Rajarajan, Ali Sajjad:
A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud. ICOIN 2017: 242-247 - [c66]Indranil Ghosh Ray, Muttukrishnan Rajarajan:
A Public Key Encryption Scheme for String Identification. TrustCom/BigDataSE/ICESS 2017: 104-111 - [c65]Shahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan:
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme. TrustCom/BigDataSE/ICESS 2017: 425-432 - [c64]Max Smith-Creasey, Muttukrishnan Rajarajan:
Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust. TrustCom/BigDataSE/ICESS 2017: 554-561 - 2016
- [j31]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
Combined Banzhaf & Diversity Index (CBDI) for critical node detection. J. Netw. Comput. Appl. 64: 76-88 (2016) - [j30]Waqar Asif, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Optimization based spectral partitioning for node criticality assessment. J. Netw. Comput. Appl. 75: 279-292 (2016) - [j29]Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Ian Herwono:
Survey of approaches and features for the identification of HTTP-based botnet traffic. J. Netw. Comput. Appl. 76: 1-15 (2016) - [j28]Yogachandran Rahulamathavan, Suresh Veluru, Jinguang Han, Fei Li, Muttukrishnan Rajarajan, Rongxing Lu:
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Trans. Computers 65(9): 2939-2946 (2016) - [j27]Kamran Zaidi, Milos B. Milojevic, Veselin Rakocevic, Arumugam Nallanathan, Muttukrishnan Rajarajan:
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection. IEEE Trans. Veh. Technol. 65(8): 6703-6714 (2016) - [c63]R. K. Shyamasundar, N. V. Narendra Kumar, Muttukrishnan Rajarajan:
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. HPCC/SmartCity/DSS 2016: 1410-1417 - [c62]Yogachandran Rahulamathavan, Muttukrishnan Rajarajan, Raphael C.-W. Phan:
Smart, secure and seamless access control scheme for mobile devices. ICC 2016: 1-6 - [c61]Max Smith-Creasey, Muttukrishnan Rajarajan:
A continuous user authentication scheme for mobile devices. PST 2016: 104-113 - 2015
- [j26]Labiba Gillani Fahad, Muttukrishnan Rajarajan:
Integration of discriminative and generative models for activity recognition in smart homes. Appl. Soft Comput. 37: 992-1001 (2015) - [j25]Fei Li, Yogachandran Rahulamathavan, Mauro Conti, Muttukrishnan Rajarajan:
Robust access control framework for mobile cloud computing network. Comput. Commun. 68: 61-72 (2015) - [j24]Riyanat O. Shittu, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Intrusion alert prioritisation and attack detection using post-correlation analysis. Comput. Secur. 50: 1-15 (2015) - [j23]Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Commun. Surv. Tutorials 17(2): 998-1022 (2015) - [j22]Saritha Arunkumar, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Reasoning with streamed uncertain information from unreliable sources. Expert Syst. Appl. 42(22): 8381-8392 (2015) - [j21]Ali Sajjad, Muttukrishnan Rajarajan, Andrea Zisman, Theo Dimitrakos:
A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Gener. Comput. Syst. 48: 19-27 (2015) - [j20]Kamran Zaidi, Muttukrishnan Rajarajan:
Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet 7(3): 257-275 (2015) - [j19]Labiba Gillani Fahad, Asifullah Khan, Muttukrishnan Rajarajan:
Activity recognition in smart homes with self verification of assignments. Neurocomputing 149: 1286-1298 (2015) - [j18]Christopher Köhnen, Christian Überall, Muttukrishnan Rajarajan, Rudolf Jäger, Veselin Rakocevic:
Autonomous QoS Management and Policing in Unmanaged Local Area Networks. J. Comput. Networks Commun. 2015: 790375:1-790375:24 (2015) - [j17]Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
A review paper on preserving privacy in mobile environments. J. Netw. Comput. Appl. 53: 74-90 (2015) - [j16]Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti:
Employing Program Semantics for Malware Detection. IEEE Trans. Inf. Forensics Secur. 10(12): 2591-2604 (2015) - [c60]Yogachandran Rahulamathavan, Muttukrishnan Rajarajan, Omer F. Rana, Malik S. K. Awan, Pete Burnap, Sajal K. Das:
Assessing Data Breach Risk in Cloud Systems. CloudCom 2015: 363-370 - [c59]Labiba Gillani Fahad, Syed Fahad Tahir, Muttukrishnan Rajarajan:
Feature selection and data balancing for activity recognition in smart homes. ICC 2015: 512-517 - [c58]Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Hide-and-seek: Face recognition in private. ICC 2015: 7102-7107 - [c57]Labiba Gillani Fahad, Muttukrishnan Rajarajan:
Anomalies Detection in Smart-Home Activities. ICMLA 2015: 419-422 - [c56]Abimbola Olabelurin, Suresh Veluru, Alex Healing, Muttukrishnan Rajarajan:
Entropy clustering approach for improving forecasting in DDoS attacks. ICNSC 2015: 315-320 - [c55]Waqar Asif, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Spectral partitioning for node criticality. ISCC 2015: 877-882 - [c54]Saritha Arunkumar, Mudhakar Srivatsa, Murat Sensoy, Muttukrishnan Rajarajan:
Global attestation of location in mobile devices. MILCOM 2015: 1612-1617 - [c53]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. WOOT 2015 - 2014
- [j15]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Stealing bandwidth from BitTorrent seeders. Comput. Secur. 46: 126-140 (2014) - [j14]Yogachandran Rahulamathavan, Raphael Chung-Wei Phan, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan:
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. IEEE Trans. Dependable Secur. Comput. 11(5): 467-479 (2014) - [j13]Yogachandran Rahulamathavan, Suresh Veluru, Raphael C.-W. Phan, Jonathon A. Chambers, Muttukrishnan Rajarajan:
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification. IEEE J. Biomed. Health Informatics 18(1): 56-66 (2014) - [j12]Mahzeb Fiaz, Roomana Yousaf, Maryam Hanfi, Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks. Wirel. Pers. Commun. 74(2): 989-1004 (2014) - [c52]Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan:
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. ACISP 2014: 430-437 - [c51]Fauzia Idrees, Muttukrishnan Rajarajan:
War against mobile malware with cloud computing and machine learning forces. CloudNet 2014: 278-280 - [c50]Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti:
Environment-Reactive Malware Behavior: Detection and Categorization. DPM/SETOP/QASA 2014: 167-182 - [c49]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Who Is Going to Be the Next BitTorrent Peer Idol? EUC 2014: 293-298 - [c48]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
CBDI: Combined Banzhaf & diversity index for finding critical nodes. GLOBECOM 2014: 758-763 - [c47]Ali Sajjad, Muttukrishnan Rajarajan, Theo Dimitrakos:
A Low-Overhead Secure Communication Framework for an Inter-cloud Environment. ICC 2014: 121-136 - [c46]Labiba Gillani Fahad, Syed Fahad Tahir, Muttukrishnan Rajarajan:
Activity Recognition in Smart Homes Using Clustering Based Classification. ICPR 2014: 1348-1353 - [c45]Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman:
Trust Assessment Using Cloud Broker. IFIPTM 2014: 237-244 - [c44]Riyanat O. Shittu, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis. LCN 2014: 322-330 - [c43]Fei Li, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment. LCN 2014: 354-361 - [c42]Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location Security - Where to Enforce? MILCOM 2014: 1651-1656 - [c41]Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan:
P-SPADE: GPU accelerated malware packer detection. PST 2014: 257-263 - [c40]Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis:
Analysing Security requirements in Cloud-based Service Level Agreements. SIN 2014: 73 - [c39]Muhammad Adnan, Antonio Lima, Luca Rossi, Suresh Veluru, Paul A. Longley, Mirco Musolesi, Muttukrishnan Rajarajan:
The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. SIN 2014: 254 - [c38]Smita Naval, Vijay Laxmi, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan:
Exploring Worm Behaviors using DTW. SIN 2014: 379 - [c37]Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan:
Data-centric Rogue Node Detection in VANETs. TrustCom 2014: 398-405 - [c36]Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. TrustCom 2014: 414-421 - [c35]Fauzia Idrees, Muttukrishnan Rajarajan:
Investigating the android intents and permissions for malware detection. WiMob 2014: 354-358 - [e3]Ron Poet, Muttukrishnan Rajarajan:
Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. ACM 2014, ISBN 978-1-4503-3033-6 [contents] - 2013
- [j11]Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan:
A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1): 42-57 (2013) - [j10]Muttukrishnan Rajarajan, Steven Furnell:
Editorial for Security and Privacy in Wireless Networks Special Issue. Mob. Networks Appl. 18(5): 664-665 (2013) - [j9]Christian Überall, Christopher Köhnen, Veselin Rakocevic, Rudolf Jäger, Erich Hoy, Muttukrishnan Rajarajan:
Recommendations in a heterogeneous service environment. Multim. Tools Appl. 62(3): 785-820 (2013) - [j8]Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan:
A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2): 561-592 (2013) - [j7]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wirel. Networks 19(1): 31-46 (2013) - [c34]Suresh Veluru, Yogachandran Rahulamathavan, P. Viswanath, Paul A. Longley, Muttukrishnan Rajarajan:
E-mail address categorization based on semantics of surnames. CIDM 2013: 222-229 - [c33]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs. CISS 2013: 1-6 - [c32]Labiba Gillani Fahad, Arshad Ali, Muttukrishnan Rajarajan:
Long term analysis of daily activities in smart home. ESANN 2013 - [c31]Vikram Nunia, Bhavesh Kakadiya, Chittaranjan Hota, Muttukrishnan Rajarajan:
Adaptive Task Scheduling in Service Oriented Crowd Using SLURM. ICDCIT 2013: 373-385 - [c30]Kamran Zaidi, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
DIVA - Digital Identity in VANETs: A multi-authority framework for VANETs. ICON 2013: 1-6 - [c29]Fauzia Idrees, Muttukrishnan Rajarajan, Attaullah Y. Memon:
Framework for distributed and self-healing hybrid intrusion detection and prevention system. ICTC 2013: 277-282 - [c28]Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman:
Trust Model for Cloud Based on Cloud Characteristics. IFIPTM 2013: 239-246 - [c27]Fei Li, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan, Raphael C.-W. Phan:
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing. SOSE 2013: 573-577 - [e2]Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan:
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 8300, Springer 2013, ISBN 978-3-319-03583-3 [contents] - 2012
- [j6]Sajjad Rizvi, Hassaan Khaliq Qureshi, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. J. Netw. Comput. Appl. 35(2): 597-605 (2012) - [c26]Muttukrishnan Rajarajan:
Novel framework for secure mobile financial services. AMCIS 2012 - [c25]Pramod S. Pawar, Srijith K. Nair, Fadi Ali El-Moussa, Theo Dimitrakos, Muttukrishnan Rajarajan, Andrea Zisman:
Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. CloudComp 2012: 103-113 - [c24]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver. CyberC 2012: 143-150 - [c23]Riyanat O. Shittu, Alex Healing, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Visual Analytic Agent-Based Framework for Intrusion Alert Analysis. CyberC 2012: 201-207 - [c22]Ali Sajjad, Andrea Zisman, Muttukrishnan Rajarajan, Srijith K. Nair, Theo Dimitrakos:
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. ICON 2012: 428-433 - [c21]Pramod S. Pawar, Muttukrishnan Rajarajan, Srijith Krishnan Nair, Andrea Zisman:
Trust Model for Optimized Cloud Services. IFIPTM 2012: 97-112 - [c20]Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan:
A novel framework for intrusion detection in cloud. SIN 2012: 67-74 - [e1]Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2 [contents] - 2011
- [j5]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks. Comput. Commun. 34(10): 1235-1242 (2011) - [j4]Hassaan Khaliq Qureshi, Junaid Jameel Ahmad, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Graph-Theoretic Complexity Reduction for Markovian Wireless Channel Models. Wirel. Pers. Commun. 58(4): 831-849 (2011) - [c19]Florian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger:
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers. CCS 2011: 725-728 - [c18]Fei Li, Dasun Weerasinghe, Dhiren R. Patel, Muttukrishnan Rajarajan:
An User-Centric Attribute Based Access Control Model for Ubuquitous Environments. MobiCASE 2011: 361-367 - 2010
- [c17]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Muttukrishnan Rajarajan, Veselin Rakocevic:
An energy efficient Clique-based CDS discovery protocol for wireless sensor networks. CISS 2010: 1-6 - [c16]Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Muttukrishnan Rajarajan, Andrea Zisman:
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. CNSA 2010: 152-163 - [c15]Srijith K. Nair, Sakshi Porwal, Theo Dimitrakos, Ana Juan Ferrer, Johan Tordsson, Tabassum Sharif, Craig Sheridan, Muttukrishnan Rajarajan, Afnan Ullah Khan:
Towards Secure Cloud Bursting, Brokerage and Aggregation. ECOWS 2010: 189-196 - [c14]Christopher Köhnen, Christian Überall, Florian Adamsky, Veselin Rakocevic, Muttukrishnan Rajarajan, Rudolf Jäger:
Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs. ICCCN 2010: 1-6 - [c13]Dasun Weerasinghe, Veselin Rakocevic, Muttukrishnan Rajarajan:
Security framework for mobile banking. MoMM 2010: 421-424 - [c12]Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, Muttukrishnan Rajarajan:
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. PAISI 2010: 65-72
2000 – 2009
- 2009
- [j3]Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan, John A. MacDonald:
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. Int. J. Inf. Sec. 8(2): 77-87 (2009) - [c11]Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic:
Security Protection on Trust Delegated Data in Public Mobile Networks. eHealth 2009: 200-207 - [c10]Christian Überall, Muttukrishnan Rajarajan, Veselin Rakocevic, Rudolf Jäger, Christopher Köhnen:
Recommendation index for DVB content using Service information. ICME 2009: 1178-1181 - [c9]Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic:
Parameter Based Access Control Model for Mobile Handsets. ISDF 2009: 66-75 - [c8]Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic:
Trust delegation for medical records access using public mobile networks. PervasiveHealth 2009: 1-7 - 2008
- [j2]Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic:
Anonymous authentication for mobile Single Sign-On to protect user privacy. Int. J. Mob. Commun. 6(6): 760-769 (2008) - [c7]Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic:
Device Data Protection in Mobile Healthcare Applications. eHealth 2008: 82-89 - [c6]Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan:
Timestamp authentication protocol for remote monitoring in eHealth. PervasiveHealth 2008: 73-76 - [c5]Dasun Weerasinghe, Kalid Elmufti, Muttukrishnan Rajarajan, Veselin Rakocevic:
Patient's privacy protection with anonymous access to medical services. PervasiveHealth 2008: 127-130 - 2007
- [j1]Dasun Weerasinghe, Kalid Elmufti, Muttukrishnan Rajarajan, Veselin Rakocevic:
Securing electronic health records with novel mobile encryption schemes. Int. J. Electron. Heal. 3(4): 395-416 (2007) - 2006
- [c4]John A. MacDonald, Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan:
A Web Services Shopping Mall for Mobile Users. ECOWS 2006: 99-108 - [c3]Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan:
Privacy in Mobile Web Services eHealth. PervasiveHealth 2006: 1-6 - [c2]Dasun Weerasinghe, Kalid Elmufti, Muttukrishnan Rajarajan, Veselin Rakocevic:
XML Security based Access Control for Healthcare Information in Mobile Environment. PervasiveHealth 2006: 1-6 - 2004
- [c1]Veselin Rakocevic, Muttukrishnan Rajarajan, Kerry-Ann McCalla, Charbel Boumitri:
QoS Constraints in Bluetooth-Based Wireless Sensor Networks. QofIS 2004: 214-223
1990 – 1999
- 1999
- [b1]Muttukrishnan Rajarajan:
Computer modelling of compact photonics devices for optical communications. City University London, UK, 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint