Items where City Author is "Rajarajan, M."

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Item Type | No Grouping
Number of items: 68.

Article

Saadat Beheshti, S. M. R., Liatsis, P. & Rajarajan, M. (2017). A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Computers and Security, 70, pp. 596-617. doi: 10.1016/j.cose.2017.08.006

Tahir, S. F., Ruj, S., Rahulamathavan, Y., Rajarajan, M. & Glackin, C. (2017). A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Transactions on Emerging Topics in Computing, doi: 10.1109/TETC.2017.2737789

Abro, F. I., Rajarajan, M., Chen, T. & Rahulamathavan, Y. (2017). Android application collusion demystified. Communications in Computer and Information Science, 759, pp. 176-187. doi: 10.1007/978-3-319-65548-2_14

Idrees, F., Rajarajan, M., Conti, M., Chen, T. & Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011

Glackin, C., Chollet, G., Dugan, N., Cannings, N., Wall, J., Tahir, S. F., Ray, I. G. & Rajarajan, M. (2017). Privacy preserving encrypted phonetic search of speech data. 2017 IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp. 6414-6418. doi: 10.1109/ICASSP.2017.7953391

Arunkumar, S., Soyluoglu, B., Sensoy, M., Srivatsa, M. & Rajarajan, M. (2017). Location attestation and access control for mobile devices using GeoXACML. Journal of Network and Computer Applications, 80, pp. 181-188. doi: 10.1016/j.jnca.2016.11.028

Arsalan, M., Qureshi, A., Khan, A. U. & Rajarajan, M. (2017). Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Applied Soft Computing Journal, 51, pp. 1668-179. doi: 10.1016/j.asoc.2016.11.044

Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M. & Buyya, R. (2017). Combating DDoS attacks in the cloud: Requirements, trends, and future directions. IEEE Cloud Computing, 4(1), pp. 22-32. doi: 10.1109/MCC.2017.14

Rajarajan, M. & Yogachandran, R. (2017). Efficient Privacy-Preserving Facial Expression Classification. IEEE Transactions on Dependable and Secure Computing, 14(3), pp. 326-338. doi: 10.1109/TDSC.2015.2453963

Somani, G., Gaur, M. S., Sanghi, D., Conti, M. & Rajarajan, M. (2016). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers and Electrical Engineering, doi: 10.1016/j.compeleceng.2016.12.004

Asif, W., Lestas, M., Khaliq Qureshi, H. & Rajarajan, M. (2016). Optimization based spectral partitioning for node criticality assessment. Journal of Network and Computer Applications, 75, pp. 279-292. doi: 10.1016/j.jnca.2016.09.003

Acarali, D., Rajarajan, M., Komninos, N. & Herwono, I. (2016). Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. Journal of Network and Computer Applications, doi: 10.1016/j.jnca.2016.10.007

Rahulamathavan, Y., Rajarajan, M. & Phan, R. C. W. (2016). Smart, secure and seamless access control scheme for mobile devices. 2016 IEEE International Conference on Communications, ICC 2016, pp. 1088-1093. doi: 10.1109/ICC.2016.7510837

Asif, W., Qureshi, H. K., Rajarajan, M. & Lestas, M. (2016). Combined Banzhaf & Diversity Index (CBDI) for critical node detection. Journal of Network and Computer Applications, 64, pp. 76-88. doi: 10.1016/j.jnca.2015.11.025

Rahulamathavan, Y., Veluru, S., Han, J., Li, F., Rajarajan, M. & Lu, R. (2016). User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Transactions on Computers, 65(9), pp. 2939-2946. doi: 10.1109/TC.2015.2510646

Rajarajan, M., Zaidi, K., Nallanathan, A,, Rakocevic, V. & Milojevic, M, (2016). Host Based Intrusion Detection for VANETs: A statistical approach to Rogue Node Detection. IEEE Transactions on Vehicular Technology, 65(8), pp. 6703-6714. doi: 10.1109/TVT.2015.2480244

Fahad, L. G. & Rajarajan, M. (2015). Integration of discriminative and generative models for activity recognition in smart homes. Applied Soft Computing Journal, 37, pp. 992-1001. doi: 10.1016/j.asoc.2015.03.045

Li, F., Rahulamathavan, Y., Conti, M. & Rajarajan, M. (2015). Robust access control framework for mobile cloud computing network. Computer Communications, 68(Sept), pp. 61-72. doi: 10.1016/j.comcom.2015.07.005

Zaidi, K. & Rajarajan, M. (2015). Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet, 7, pp. 257-275. doi: 10.3390/fi7030257

Sajjad, A., Rajarajan, M., Zisman, A. & Dimitrakos, T. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services. Future generation computer systems: the international journal of grid computing and escience, 48(July), pp. 19-27. doi: 10.1016/j.future.2015.01.018

Rajarajan, M. (2015). A review paper on preserving privacy in mobile environments. Journal of Computer Networks and Applications, 53, pp. 74-90. doi: 10.1016/j.jnca.2015.01.008

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. & Rajarajan, M. (2015). Intrusion alert prioritisation and attack detection using post-correlation analysis. Computers & Security, 50, pp. 1-15. doi: 10.1016/j.cose.2014.12.003

Fahad, L. G., Khan, A. U. & Rajarajan, M. (2015). Activity recognition in smart homes with self verification of assignments. Neurocomputing, 149(C), pp. 1286-1298. doi: 10.1016/j.neucom.2014.08.069

Köhnen, C., Überall, C., Rajarajan, M., Jager, R. & Rakocevic, V. (2015). Autonomous QoS Management and Policing in Unmanaged Local Area Networks. Journal of Computer Networks and Communications, 2015, e790375. doi: 10.1155/2015/790375

Asif, W., Lestas, M., Qureshi, H. K. & Rajarajan, M. (2015). Spectral Partitioning for Node Criticality. 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 877-882. doi: 10.1109/ISCC.2015.7405624

Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. & Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials, 17(2), pp. 998-1022. doi: 10.1109/COMST.2014.2386139

Naval, S., Laxmi, V., Rajarajan, M., Gaur, M. S. & Conti, M. (2015). Employing Program Semantics for Malware Detection. IEEE Transactions on Information Forensics and Security, 10(12), pp. 2591-2604. doi: 10.1109/TIFS.2015.2469253

Arunkumar, S., Sensoy, M., Srivatsa, M. & Rajarajan, M. (2015). Reasoning with Streamed Uncertain Information from Unreliable Sources. Expert Systems with Applications, 42(22), pp. 8381-8392. doi: 10.1016/j.eswa.2015.04.031

Adamsky, F., Khayam, S. A., Jaeger, R. & Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009

Asif, W., Qureshi, A., Iqbal, M. & Rajarajan, M. (2014). On the Complexity of Average Path length for Biological Networks and Patterns. International Journal of Biomathematics, 7(4), doi: 10.1142/S1793524514500387

Raoufi, N., Surre, F., Rajarajan, M., Sun, T. & Grattan, K. T. V. (2014). Optical sensor for pH monitoring using a layer-by-layer deposition technique emphasizing enhanced stability and re-usability. Sensors and Actuators B Chemical, 195, pp. 692-701. doi: 10.1016/j.snb.2014.01.080

Li, F., Rahulamathavan, Y. & Rajarajan, M. (2014). LSD-ABAC: Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. 2014 IEEE 39th Conference on Local Computer Networks (LCN), doi: 10.1109/LCN.2014.6925791

Fiaz, M., Yousaf, R., Hanfi, M., Asif, W., Qureshi, H. K. & Rajarajan, M. (2014). Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74(2), pp. 989-1004. doi: 10.1007/s11277-013-1334-2

Rahulamathavan, Y., Veluru, S., Phan, R. C., Chambers, J. A. & Rajarajan, M. (2014). Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE Journal of Biomedical and Health Informatics, 18(1), pp. 56-66. doi: 10.1109/JBHI.2013.2274899

Rahulamathavan, Y., C.-W. Phan, R., Veluru, S., Cumanan, K & Rajarajan, M. (2013). Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. IEEE Transactions on Dependable and Secure Computing, 11(5), pp. 467-479. doi: 10.1109/TDSC.2013.51

Raoufi, N., Surre, F., Rajarajan, M., Sun, T. & Grattan, K. T. V. (2013). Fibre Optic pH Sensor Using Optimized Layer-by-Layer Coating Approach. IEEE Sensors Journal, 14(1), pp. 47-54. doi: 10.1109/JSEN.2013.2280283

Ueberall, C., Koehnen, C., Rakocevic, V., Jaeger, R., Hoy, E. & Rajarajan, M. (2013). Recommendations in a heterogeneous service environment. Multimedia Tools and Applications, 62(3), pp. 785-820. doi: 10.1007/s11042-011-0874-2

Modi, C., Patel, D., Borisaniya, B., Patel, A. & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), pp. 561-592. doi: 10.1007/s11227-012-0831-5

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks, 19(1), pp. 31-46. doi: 10.1007/s11276-012-0449-9

Veluru, S., Rahulamathavan, Y., Viswanath, P., Longley, P. & Rajarajan, M. (2013). E-mail address categorization based on semantics of surnames. Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, pp. 222-229. doi: 10.1109/CIDM.2013.6597240

Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), pp. 42-57. doi: 10.1016/j.jnca.2012.05.003

Raoufi, N., Surre, F., Sun, T., Rajarajan, M. & Grattan, K. T. V. (2012). Wavelength dependent pH optical sensor using the layer-by-layer technique. Sensors and Actuators B Chemical, 169, pp. 374-381. doi: 10.1016/j.snb.2012.05.024

Rizvi, S., Qureshi, H. K., Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2012). A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. Journal of Network and Computer Applications, 35, pp. 597-605. doi: 10.1016/j.jnca.2011.11.003

Pawar, P. S., Rajarajan, M., Nair, S. K. & Zisman, A. (2012). Trust Model for Optimized Cloud Services. IFIP Advances in Information and Communication Technology, 374, pp. 97-112. doi: 10.1007/978-3-642-29852-3_7

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2011). Poly: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. Computer Communications, 34(10), pp. 1235-1242. doi: 10.1016/j.comcom.2010.12.016

Mohanty, V., Moliya, D., Hota, C. & Rajarajan, M. (2010). Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. Intelligence and Security Informatics, 6122, pp. 65-72. doi: 10.1007/978-3-642-13601-6_8

Themistos, C., Rajarajan, M., Rahman, B. M. & Grattan, K. T. V. (2009). Characterization of Silica Nanowires for Optical Sensing. Journal of Lightwave Technology, 27(24), pp. 5537-5542.

Rajarajan, M., Spackova, B., Piliarik, M., Kvasnicka, P., Themistos, C. & Homola, J. (2009). Novel concept of multi-channel fiber optic surface plasmon resonance sensor. Sensors and Actuators B: Chemical, 139(5), pp. 199-203. doi: 10.1016/j.snb.2008.12.020

Elmufti, K., Weerasinghe, D., Rajarajan, M., Rakocevic, V., Khan, S. & MacDonald, J. (2008). Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. International Journal of Information Security, 8(2), pp. 77-87. doi: 10.1007/s10207-008-0065-y

Weerasinghe, D., Rajarajan, M., Elmufti, K. & Rakocevic, V. (2008). Patient privacy protection using anonymous access control techniques. Methods of Information in Medicine, 47(3), pp. 235-240. doi: 10.3414/ME9116

Book Section

Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S. & Rajarajan, M. (2014). An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones. In: Information Security and Privacy. Lecture Notes in Computer Science, 14 (8544). (pp. 430-437). Springer. ISBN 9783319083438

Pawar, P. S., Rajarajan, M., Dimitrakos, T. & Zisman, A. (2014). Trust Assessment Using Cloud Broker. In: J. Zhou, N. Gal-Oz, J. Zhang & E, Gudes (Eds.), Trust Management VIII. IFIP Advances in Information and Communication Technology, 430. (pp. 237-244). Springer. ISBN 9783662438121

Conference or Workshop Item

Asif, W., Qureshi, M., Lestas, M. & Rajarajan, M. (2014). CBDI: Combined Banzhaf & Diversity Index for Finding Critical Nodes. Paper presented at the IEEE Globecom, 08-12-2014 - 12-12-2014, Texas, USA.

Zaidi, K., Milojevic, M., Rakocevic, V. & Rajarajan, M. (2014). Data Centric Rogue Node Detection in VANETs. Paper presented at the IEEE Trustcom, 24-09-2014 - 26-09-2014, Beijing, China.

Fahad, L. G., Tahir, S. F. & Rajarajan, M. (2014). Activity Recognition in Smart Homes using Clustering based Classification. Paper presented at the 22nd International Conference on Pattern Recognition (ICPR), 24-08-2014 - 28-08-2014, Stockholm, Sweden.

Veluru, S., Rahulamathavan, Y., Manandhar, S. & Rajarajan, M. (2014). Correlated Community Estimation Models Over a Set of Names. Paper presented at the IEEE Technically Co-Sponsored Science and Information Conference, 27-08-2014 - 29-08-2014, London, UK.

Li, F., Rahulamathavan, Y. & Rajarajan, M. (2014). Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Arunkumar, S., Srivatsa, M. & Rajarajan, M. (2014). Location Security - Where to Enforce?. Paper presented at the IEEE MILCOM, 06-10-2014 - 08-10-2014, Baltimore, USA.

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. & Rajarajan, M. (2014). A New Metric for Prioritising Intrusion Alerts Using Correlation and Outlier Analysis. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Adnan, M., Rosi, L., Veluru, S., Mouseli, M., Longley, P. A. & Rajarajan, M. (2014). Using Digital Traces for User Profiling: the Uncertainty of Identity Toolset. Paper presented at the ACM Security in Information and Networks, (SIN 2014), 09-09-2014 - 11-09-2014, Glasgow, UK.

Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.

Sajjad, A., Rajarajan, M. & Dimitrakos, T. (2014). A low-overhead secure communication framework for an inter-cloud environment. Paper presented at the International Conference on Intelligent Cloud Computing 2014, 24-02-2014 - 26-02-2014, Muscat, Oman.

Pawar, P. S., Nair, S. K., El-Mousaa, F., Dimitrakos, T., Rajarajan, M. & Zisman, A. (2012). Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. Paper presented at the CloudComp 2012 - 3rd International Conference on Cloud Computing, 24 - 26 Sep 2012, Vienna, Austria.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. & Dimitrakos, T. (2012). Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. Paper presented at the ICON 2012: 18th IEEE International Conference on Networks, 12 - 14 Dec 2012, Singapore.

Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China.

Rajarajan, M., Adamsky, F., Khan, H., Khayam, S. A. & Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. & Dimitrakos, T. (2011). Dynamic virtual private network provisioning from multiple cloud infrastructure service providers. Paper presented at the 4th European Conference, ServiceWave 2011, 26 - 28 Oct 2011, Poznan, Poland.

Nair, S. K., Porwal, S., Dimitrakos, T., Ferrer, A. J., Tordsson, J., Sharif, T., Sheridan, C., Rajarajan, M. & Khan, A. U. (2010). Towards secure cloud bursting, brokerage and aggregation. Paper presented at the IEEE European conference on Web Services, 1 Dec 2010 - 3 Dec 2010, Cyprus.

This list was generated on Tue Nov 21 06:11:59 2017 UTC.