City Research Online

Items where City Author is "Rajarajan, M."

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Publication Type | No Grouping
Number of items: 77.

Article

Tahir, S., Steponkus, L., Ruj, S., Rajarajan, M. and Sajjad, A. (2018). A parallelized disjunctive query based searchable encryption scheme for big data. Future Generation Computer Systems, doi: 10.1016/j.future.2018.05.048

Ghosh Ray, I., Rahulamathavan, Y. and Rajarajan, M. (2018). A New Lightweight Symmetric Searchable Encryption Scheme for String Identification. IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2018.2820014

Asif, W., Rajarajan, M. and Lestas, M. (2018). Increasing user controllability on device specific privacy in the Internet of Things. Computer Communications, 116, pp. 200-211. doi: 10.1016/j.comcom.2017.11.009

Maloku, H., Hamiti, E., Limani, Z., Papadopoulou Lesta, V., Pitsillides, A. and Rajarajan, M. (2017). A decentralized approach for self-coexistence among heterogeneous networks in TVWS. IEEE Transactions on Vehicular Technology, doi: 10.1109/TVT.2017.2755605

Ray, I. G. and Rajarajan, M. (2017). A public key encryption scheme for string identification. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 104-111. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.226

Smith-Creasey, M. and Rajarajan, M. (2017). Adaptive threshold scheme for touchscreen gesture continuous authentication using sensor trust. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 554-561. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.284

Tahir, S. F., Ruj, S. and Rajarajan, M. (2017). An efficient disjunctive query enabled ranked searchable encryption scheme. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 425-433. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.267

Saadat Beheshti, S. M. R., Liatsis, P. and Rajarajan, M. (2017). A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Computers and Security, 70, pp. 596-617. doi: 10.1016/j.cose.2017.08.006

Choo, K-K. R., Rana, O. F. and Rajarajan, M. (2017). Cloud Security Engineering: Theory, Practice and Future Research. IEEE Transactions on Cloud Computing, 5(3), pp. 372-374. doi: 10.1109/TCC.2016.2582278

Tahir, S. F., Ruj, S., Rahulamathavan, Y., Rajarajan, M. and Glackin, C. (2017). A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Transactions on Emerging Topics in Computing, doi: 10.1109/TETC.2017.2737789

Abro, F. I., Rajarajan, M., Chen, T. and Rahulamathavan, Y. (2017). Android application collusion demystified. Communications in Computer and Information Science, 759, pp. 176-187. doi: 10.1007/978-3-319-65548-2_14

Idrees, F., Rajarajan, M., Conti, M., Chen, T. and Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011

Glackin, C., Chollet, G., Dugan, N., Cannings, N., Wall, J., Tahir, S. F., Ray, I. G. and Rajarajan, M. (2017). Privacy preserving encrypted phonetic search of speech data. 2017 IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp. 6414-6418. doi: 10.1109/ICASSP.2017.7953391

Arunkumar, S., Soyluoglu, B., Sensoy, M., Srivatsa, M. and Rajarajan, M. (2017). Location attestation and access control for mobile devices using GeoXACML. Journal of Network and Computer Applications, 80, pp. 181-188. doi: 10.1016/j.jnca.2016.11.028

Arsalan, M., Qureshi, A., Khan, A. U. and Rajarajan, M. (2017). Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Applied Soft Computing Journal, 51, pp. 1668-179. doi: 10.1016/j.asoc.2016.11.044

Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M. and Buyya, R. (2017). Combating DDoS attacks in the cloud: Requirements, trends, and future directions. IEEE Cloud Computing, 4(1), pp. 22-32. doi: 10.1109/MCC.2017.14

Rajarajan, M. and Yogachandran, R. (2017). Efficient Privacy-Preserving Facial Expression Classification. IEEE Transactions on Dependable and Secure Computing, 14(3), pp. 326-338. doi: 10.1109/TDSC.2015.2453963

Gajrani, J., Tripathi, M., Laxmi, V., Gaur, M. S., Conti, M. and Rajarajan, M. (2017). sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 854-860. doi: 10.1109/CCNC.2017.7983245

Somani, G., Gaur, M. S., Sanghi, D., Conti, M. and Rajarajan, M. (2016). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers and Electrical Engineering, doi: 10.1016/j.compeleceng.2016.12.004

Asif, W., Lestas, M., Khaliq Qureshi, H. and Rajarajan, M. (2016). Optimization based spectral partitioning for node criticality assessment. Journal of Network and Computer Applications, 75, pp. 279-292. doi: 10.1016/j.jnca.2016.09.003

Acarali, D., Rajarajan, M., Komninos, N. and Herwono, I. (2016). Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. Journal of Network and Computer Applications, doi: 10.1016/j.jnca.2016.10.007

Rahulamathavan, Y., Rajarajan, M. and Phan, R. C. W. (2016). Smart, secure and seamless access control scheme for mobile devices. 2016 IEEE International Conference on Communications, ICC 2016, pp. 1088-1093. doi: 10.1109/ICC.2016.7510837

Asif, W., Qureshi, H. K., Rajarajan, M. and Lestas, M. (2016). Combined Banzhaf & Diversity Index (CBDI) for critical node detection. Journal of Network and Computer Applications, 64, pp. 76-88. doi: 10.1016/j.jnca.2015.11.025

Rahulamathavan, Y., Veluru, S., Han, J., Li, F., Rajarajan, M. and Lu, R. (2016). User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Transactions on Computers, 65(9), pp. 2939-2946. doi: 10.1109/TC.2015.2510646

Rajarajan, M., Zaidi, K., Nallanathan, A,, Rakocevic, V. and Milojevic, M, (2016). Host Based Intrusion Detection for VANETs: A statistical approach to Rogue Node Detection. IEEE Transactions on Vehicular Technology, 65(8), pp. 6703-6714. doi: 10.1109/TVT.2015.2480244

Fahad, L. G. and Rajarajan, M. (2015). Integration of discriminative and generative models for activity recognition in smart homes. Applied Soft Computing Journal, 37, pp. 992-1001. doi: 10.1016/j.asoc.2015.03.045

Li, F., Rahulamathavan, Y., Conti, M. and Rajarajan, M. (2015). Robust access control framework for mobile cloud computing network. Computer Communications, 68(Sept), pp. 61-72. doi: 10.1016/j.comcom.2015.07.005

Zaidi, K. and Rajarajan, M. (2015). Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet, 7, pp. 257-275. doi: 10.3390/fi7030257

Sajjad, A., Rajarajan, M., Zisman, A. and Dimitrakos, T. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services. Future generation computer systems: the international journal of grid computing and escience, 48(July), pp. 19-27. doi: 10.1016/j.future.2015.01.018

Rajarajan, M. (2015). A review paper on preserving privacy in mobile environments. Journal of Computer Networks and Applications, 53, pp. 74-90. doi: 10.1016/j.jnca.2015.01.008

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. and Rajarajan, M. (2015). Intrusion alert prioritisation and attack detection using post-correlation analysis. Computers & Security, 50, pp. 1-15. doi: 10.1016/j.cose.2014.12.003

Fahad, L. G., Khan, A. U. and Rajarajan, M. (2015). Activity recognition in smart homes with self verification of assignments. Neurocomputing, 149(C), pp. 1286-1298. doi: 10.1016/j.neucom.2014.08.069

Köhnen, C., Überall, C., Rajarajan, M., Jager, R. and Rakocevic, V. (2015). Autonomous QoS Management and Policing in Unmanaged Local Area Networks. Journal of Computer Networks and Communications, 2015, e790375. doi: 10.1155/2015/790375

Asif, W., Lestas, M., Qureshi, H. K. and Rajarajan, M. (2015). Spectral Partitioning for Node Criticality. 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 877-882. doi: 10.1109/ISCC.2015.7405624

Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. and Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials, 17(2), pp. 998-1022. doi: 10.1109/COMST.2014.2386139

Naval, S., Laxmi, V., Rajarajan, M., Gaur, M. S. and Conti, M. (2015). Employing Program Semantics for Malware Detection. IEEE Transactions on Information Forensics and Security, 10(12), pp. 2591-2604. doi: 10.1109/TIFS.2015.2469253

Arunkumar, S., Sensoy, M., Srivatsa, M. and Rajarajan, M. (2015). Reasoning with Streamed Uncertain Information from Unreliable Sources. Expert Systems with Applications, 42(22), pp. 8381-8392. doi: 10.1016/j.eswa.2015.04.031

Adamsky, F., Khayam, S. A., Jaeger, R. and Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009

Asif, W., Qureshi, A., Iqbal, M. and Rajarajan, M. (2014). On the Complexity of Average Path length for Biological Networks and Patterns. International Journal of Biomathematics, 7(4), doi: 10.1142/S1793524514500387

Raoufi, N., Surre, F., Rajarajan, M., Sun, T. and Grattan, K. T. V. (2014). Optical sensor for pH monitoring using a layer-by-layer deposition technique emphasizing enhanced stability and re-usability. Sensors and Actuators B Chemical, 195, pp. 692-701. doi: 10.1016/j.snb.2014.01.080

Li, F., Rahulamathavan, Y. and Rajarajan, M. (2014). LSD-ABAC: Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. 2014 IEEE 39th Conference on Local Computer Networks (LCN), doi: 10.1109/LCN.2014.6925791

Fiaz, M., Yousaf, R., Hanfi, M., Asif, W., Qureshi, H. K. and Rajarajan, M. (2014). Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74(2), pp. 989-1004. doi: 10.1007/s11277-013-1334-2

Rahulamathavan, Y., Veluru, S., Phan, R. C., Chambers, J. A. and Rajarajan, M. (2014). Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE Journal of Biomedical and Health Informatics, 18(1), pp. 56-66. doi: 10.1109/JBHI.2013.2274899

Rahulamathavan, Y., C.-W. Phan, R., Veluru, S., Cumanan, K and Rajarajan, M. (2013). Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. IEEE Transactions on Dependable and Secure Computing, 11(5), pp. 467-479. doi: 10.1109/TDSC.2013.51

Raoufi, N., Surre, F., Rajarajan, M., Sun, T. and Grattan, K. T. V. (2013). Fibre Optic pH Sensor Using Optimized Layer-by-Layer Coating Approach. IEEE Sensors Journal, 14(1), pp. 47-54. doi: 10.1109/JSEN.2013.2280283

Ueberall, C., Koehnen, C., Rakocevic, V., Jaeger, R., Hoy, E. and Rajarajan, M. (2013). Recommendations in a heterogeneous service environment. Multimedia Tools and Applications, 62(3), pp. 785-820. doi: 10.1007/s11042-011-0874-2

Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), pp. 561-592. doi: 10.1007/s11227-012-0831-5

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. and Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks, 19(1), pp. 31-46. doi: 10.1007/s11276-012-0449-9

Veluru, S., Rahulamathavan, Y., Viswanath, P., Longley, P. and Rajarajan, M. (2013). E-mail address categorization based on semantics of surnames. Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, pp. 222-229. doi: 10.1109/CIDM.2013.6597240

Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. and Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), pp. 42-57. doi: 10.1016/j.jnca.2012.05.003

Raoufi, N., Surre, F., Sun, T., Rajarajan, M. and Grattan, K. T. V. (2012). Wavelength dependent pH optical sensor using the layer-by-layer technique. Sensors and Actuators B Chemical, 169, pp. 374-381. doi: 10.1016/j.snb.2012.05.024

Rizvi, S., Qureshi, H. K., Khayam, S. A., Rakocevic, V. and Rajarajan, M. (2012). A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. Journal of Network and Computer Applications, 35, pp. 597-605. doi: 10.1016/j.jnca.2011.11.003

Pawar, P. S., Rajarajan, M., Nair, S. K. and Zisman, A. (2012). Trust Model for Optimized Cloud Services. IFIP Advances in Information and Communication Technology, 374, pp. 97-112. doi: 10.1007/978-3-642-29852-3_7

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. and Rajarajan, M. (2011). Poly: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. Computer Communications, 34(10), pp. 1235-1242. doi: 10.1016/j.comcom.2010.12.016

Mohanty, V., Moliya, D., Hota, C. and Rajarajan, M. (2010). Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. Intelligence and Security Informatics, 6122, pp. 65-72. doi: 10.1007/978-3-642-13601-6_8

Themistos, C., Rajarajan, M., Rahman, B. M. and Grattan, K. T. V. (2009). Characterization of Silica Nanowires for Optical Sensing. Journal of Lightwave Technology, 27(24), pp. 5537-5542.

Rajarajan, M., Spackova, B., Piliarik, M., Kvasnicka, P., Themistos, C. and Homola, J. (2009). Novel concept of multi-channel fiber optic surface plasmon resonance sensor. Sensors and Actuators B: Chemical, 139(5), pp. 199-203. doi: 10.1016/j.snb.2008.12.020

Elmufti, K., Weerasinghe, D., Rajarajan, M., Rakocevic, V., Khan, S. and MacDonald, J. (2008). Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. International Journal of Information Security, 8(2), pp. 77-87. doi: 10.1007/s10207-008-0065-y

Weerasinghe, D., Rajarajan, M., Elmufti, K. and Rakocevic, V. (2008). Patient privacy protection using anonymous access control techniques. Methods of Information in Medicine, 47(3), pp. 235-240. doi: 10.3414/ME9116

Book Section

Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S. and Rajarajan, M. (2014). An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones. In: Information Security and Privacy. Lecture Notes in Computer Science, 14 (8544). (pp. 430-437). Springer. ISBN 9783319083438

Pawar, P. S., Rajarajan, M., Dimitrakos, T. and Zisman, A. (2014). Trust Assessment Using Cloud Broker. In: Zhou, J., Gal-Oz, N., Zhang, J. and Gudes, E, (Eds.), Trust Management VIII. IFIP Advances in Information and Communication Technology, 430. (pp. 237-244). Springer. ISBN 9783662438121

Conference or Workshop Item

Asif, W., Qureshi, M., Lestas, M. and Rajarajan, M. (2014). CBDI: Combined Banzhaf & Diversity Index for Finding Critical Nodes. Paper presented at the IEEE Globecom, 08-12-2014 - 12-12-2014, Texas, USA.

Zaidi, K., Milojevic, M., Rakocevic, V. and Rajarajan, M. (2014). Data Centric Rogue Node Detection in VANETs. Paper presented at the IEEE Trustcom, 24-09-2014 - 26-09-2014, Beijing, China.

Fahad, L. G., Tahir, S. F. and Rajarajan, M. (2014). Activity Recognition in Smart Homes using Clustering based Classification. Paper presented at the 22nd International Conference on Pattern Recognition (ICPR), 24-08-2014 - 28-08-2014, Stockholm, Sweden.

Veluru, S., Rahulamathavan, Y., Manandhar, S. and Rajarajan, M. (2014). Correlated Community Estimation Models Over a Set of Names. Paper presented at the IEEE Technically Co-Sponsored Science and Information Conference, 27-08-2014 - 29-08-2014, London, UK.

Li, F., Rahulamathavan, Y. and Rajarajan, M. (2014). Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Arunkumar, S., Srivatsa, M. and Rajarajan, M. (2014). Location Security - Where to Enforce?. Paper presented at the IEEE MILCOM, 06-10-2014 - 08-10-2014, Baltimore, USA.

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. and Rajarajan, M. (2014). A New Metric for Prioritising Intrusion Alerts Using Correlation and Outlier Analysis. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Adnan, M., Rosi, L., Veluru, S., Mouseli, M., Longley, P. A. and Rajarajan, M. (2014). Using Digital Traces for User Profiling: the Uncertainty of Identity Toolset. Paper presented at the ACM Security in Information and Networks, (SIN 2014), 09-09-2014 - 11-09-2014, Glasgow, UK.

Adamsky, F., Khayam, S. A., Jager, R. and Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.

Sajjad, A., Rajarajan, M. and Dimitrakos, T. (2014). A low-overhead secure communication framework for an inter-cloud environment. Paper presented at the International Conference on Intelligent Cloud Computing 2014, 24-02-2014 - 26-02-2014, Muscat, Oman.

Pawar, P. S., Nair, S. K., El-Mousaa, F., Dimitrakos, T., Rajarajan, M. and Zisman, A. (2012). Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. Paper presented at the CloudComp 2012 - 3rd International Conference on Cloud Computing, 24 - 26 Sep 2012, Vienna, Austria.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. and Dimitrakos, T. (2012). Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. Paper presented at the ICON 2012: 18th IEEE International Conference on Networks, 12 - 14 Dec 2012, Singapore.

Adamsky, F., Khayam, S. A., Jager, R. and Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China.

Rajarajan, M., Adamsky, F., Khan, H., Khayam, S. A. and Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. and Dimitrakos, T. (2011). Dynamic virtual private network provisioning from multiple cloud infrastructure service providers. Paper presented at the 4th European Conference, ServiceWave 2011, 26 - 28 Oct 2011, Poznan, Poland.

Nair, S. K., Porwal, S., Dimitrakos, T., Ferrer, A. J., Tordsson, J., Sharif, T., Sheridan, C., Rajarajan, M. and Khan, A. U. (2010). Towards secure cloud bursting, brokerage and aggregation. Paper presented at the IEEE European conference on Web Services, 1 Dec 2010 - 3 Dec 2010, Cyprus.

This list was generated on Tue Dec 11 04:35:30 2018 UTC.