City Research Online

Items where City Author is "Rajarajan, M."

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Type | No Grouping
Number of items: 110.

Article

Zahoora, U., Rajarajan, M. ORCID: 0000-0001-5814-9922, Pan, Z. & Khan, A. (2022). Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier. Applied Intelligence, 52, pp. 13941-13960. doi: 10.1007/s10489-022-03244-6

Zahoora, U., Khan, A., Rajarajan, M. ORCID: 0000-0001-5814-9922 , Khan, S. H., Asam, M. & Jamal, T. (2022). Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier. Scientific Reports, 12, 15647. doi: 10.1038/s41598-022-19443-7

Sivaselvan, N., Bhattacharyya, K., Rajarajan, M. ORCID: 0000-0001-5814-9922 , Das, A. & Rodrigues, J. (2022). SUACC-IoT: secure unified authentication and access control system based on capability for IoT. Cluster Computing, doi: 10.1007/s10586-022-03733-w

Tahir, S., Tahir, H., Tahir, R. , Rajarajan, M. ORCID: 0000-0001-5814-9922 & Abbas, H. (2022). Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint. Electronics, 11(5), 818. doi: 10.3390/electronics11050818

Acarali, D. ORCID: 0000-0003-1787-6300, Rajesh Rao, K., Rajarajan, M. ORCID: 0000-0001-5814-9922 , Chema, D. & Ginzburg, M. (2022). Modelling smart grid IT-OT dependencies for DDoS impact propagation. Computers & Security, 112, 102528. doi: 10.1016/j.cose.2021.102528

Balamurugan, C., Singh, K., Ganesan, G. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2021). Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions. Cryptography, 5(4), 38. doi: 10.3390/cryptography5040038

Dixit, A., Singh, A., Rahulamathavan, Y. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2021). FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain. IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3120640

Tahir, S., Tahir, H., Sajjad, A. , Rajarajan, M. ORCID: 0000-0001-5814-9922 & Khan, F. (2021). Privacy-preserving COVID-19 Contact Tracing Blockchain. Journal of Communications and Networks, 23(5), pp. 360-373. doi: 10.23919/JCN.2021.000031

Rahulamathavan, Y., Dogan, S., Shi, X. , Lu, R., Rajarajan, M. ORCID: 0000-0001-5814-9922 & Kondoz, A. (2021). Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems. IEEE Internet of Things Journal, 8(3), pp. 1417-1427. doi: 10.1109/JIOT.2020.3014686

Rao, K. R., Nayak, A., Ray, I. G. , Rahulamathavan, Y. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2021). Role recommender-RBAC: Optimizing user-role assignments in RBAC. Computer Communications, 166, 140`-153. doi: 10.1016/j.comcom.2020.12.006

Misra, S., Mukherjee, A., Roy, A. , Saurabh, N., Rahulamathavan, Y. & Rajarajan, M. (2021). Blockchain at the Edge: Performance of Resource-Constrained IoT Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 32(1), pp. 174-183. doi: 10.1109/TPDS.2020.3013892

Alharbi, A. S., Halikias, G. ORCID: 0000-0003-1260-1383, Rajarajan, M. & Yamin, M. (2021). A review of effectiveness of Saudi E-government data security management. International Journal of Information Technology, 13, pp. 573-579. doi: 10.1007/s41870-021-00611-3

Acarali, D., Rajarajan, M., Chema, D. & Ginzburg, M. (2020). Modelling DoS Attacks & Interoperability in the Smart Grid. 2020 29th International Conference on Computer Communications and Networks (ICCCN), doi: 10.1109/icccn49398.2020.9209671

Smith-Creasey, M. & Rajarajan, M. (2019). A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Computers and Security, 83, pp. 140-150. doi: 10.1016/j.cose.2019.02.001

Abro, F. I., Rauf, F., Mobeen-ur-Rehman, , Chowdhry, B. S. & Rajarajan, M. (2019). Towards Security of GSM Voice Communication. Wireless Personal Communications, doi: 10.1007/s11277-019-06502-y

García-Magariño, I., Lacuesta, R., Rajarajan, M. & Lloret, J. (2019). Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Networks, 86, pp. 72-82. doi: 10.1016/j.adhoc.2018.11.010

Rahulamathavan, Y., Sutharsini, K. R., Ray, I. G. , Lu, R. & Rajarajan, M. (2019). Privacy-Preserving iVector-Based Speaker Verification. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 27(3), pp. 496-506. doi: 10.1109/TASLP.2018.2882731

Tahir, S., Ruj, S., Sajjad, A. & Rajarajan, M. (2019). Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Computer Communications, 133, pp. 102-114. doi: 10.1016/j.comcom.2018.08.004

Acarali, D., Rajarajan, M., Komninos, N. ORCID: 0000-0003-2776-1283 & Zarpelao, B. (2019). Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Security and Communication Networks, 2019, 3745619. doi: 10.1155/2019/3745619

Rao, K. R., Ray, I. G., Asif, W. , Nayak, A. & Rajarajan, M. (2019). R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE ACCESS, 7, pp. 133274-133289. doi: 10.1109/ACCESS.2019.2941560

Smith-Creasey, M. & Rajarajan, M. (2019). A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices. 2019 International Conference on Biometrics (ICB), doi: 10.1109/ICB45273.2019.8987390

Smith-Creasey, M., Albalooshi, F. A. & Rajarajan, M. (2018). Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocessors and Microsystems, 63, doi: 10.1016/j.micpro.2018.07.008

Markovic, M., Corsar, D., Asif, W. , Edwards, P. & Rajarajan, M. (2018). Towards Transparency of IoT Message Brokers. Lecture Notes in Computer Science, 11017, pp. 200-203. doi: 10.1007/978-3-319-98379-0_19

Tahir, S., Steponkus, L., Ruj, S. , Rajarajan, M. & Sajjad, A. (2018). A parallelized disjunctive query based searchable encryption scheme for big data. Future Generation Computer Systems, doi: 10.1016/j.future.2018.05.048

Ghosh Ray, I., Rahulamathavan, Y. & Rajarajan, M. (2018). A New Lightweight Symmetric Searchable Encryption Scheme for String Identification. IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2018.2820014

Asif, W., Rajarajan, M. & Lestas, M. (2018). Increasing user controllability on device specific privacy in the Internet of Things. Computer Communications, 116, pp. 200-211. doi: 10.1016/j.comcom.2017.11.009

Somani, G., Gaur, M. S., Sanghi, D. , Conti, M. & Rajarajan, M. (2017). Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), doi: 10.1109/TDSC.2017.2763160

Maloku, H., Hamiti, E., Limani, Z. , Papadopoulou Lesta, V., Pitsillides, A. & Rajarajan, M. (2017). A decentralized approach for self-coexistence among heterogeneous networks in TVWS. IEEE Transactions on Vehicular Technology, doi: 10.1109/TVT.2017.2755605

Ray, I. G. & Rajarajan, M. (2017). A public key encryption scheme for string identification. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 104-111. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.226

Smith-Creasey, M. & Rajarajan, M. (2017). Adaptive threshold scheme for touchscreen gesture continuous authentication using sensor trust. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 554-561. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.284

Tahir, S. F., Ruj, S. & Rajarajan, M. (2017). An efficient disjunctive query enabled ranked searchable encryption scheme. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 425-433. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.267

Saadat Beheshti, S. M. R., Liatsis, P. & Rajarajan, M. (2017). A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Computers and Security, 70, pp. 596-617. doi: 10.1016/j.cose.2017.08.006

Choo, K-K. R., Rana, O. F. & Rajarajan, M. (2017). Cloud Security Engineering: Theory, Practice and Future Research. IEEE Transactions on Cloud Computing, 5(3), pp. 372-374. doi: 10.1109/TCC.2016.2582278

Tahir, S. F., Ruj, S., Rahulamathavan, Y. , Rajarajan, M. & Glackin, C. (2017). A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Transactions on Emerging Topics in Computing, doi: 10.1109/TETC.2017.2737789

Abro, F. I., Rajarajan, M., Chen, T. & Rahulamathavan, Y. (2017). Android application collusion demystified. Communications in Computer and Information Science, 759, pp. 176-187. doi: 10.1007/978-3-319-65548-2_14

Idrees, F., Rajarajan, M., Conti, M. , Chen, T. & Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011

Glackin, C., Chollet, G., Dugan, N. , Cannings, N., Wall, J., Tahir, S. F., Ray, I. G. & Rajarajan, M. (2017). Privacy preserving encrypted phonetic search of speech data. 2017 IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp. 6414-6418. doi: 10.1109/ICASSP.2017.7953391

Arunkumar, S., Soyluoglu, B., Sensoy, M. , Srivatsa, M. & Rajarajan, M. (2017). Location attestation and access control for mobile devices using GeoXACML. Journal of Network and Computer Applications, 80, pp. 181-188. doi: 10.1016/j.jnca.2016.11.028

Arsalan, M., Qureshi, A., Khan, A. U. & Rajarajan, M. (2017). Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Applied Soft Computing Journal, 51, pp. 1668-179. doi: 10.1016/j.asoc.2016.11.044

Somani, G., Gaur, M. S., Sanghi, D. , Conti, M., Rajarajan, M. & Buyya, R. (2017). Combating DDoS attacks in the cloud: Requirements, trends, and future directions. IEEE Cloud Computing, 4(1), pp. 22-32. doi: 10.1109/MCC.2017.14

Rajarajan, M. & Yogachandran, R. (2017). Efficient Privacy-Preserving Facial Expression Classification. IEEE Transactions on Dependable and Secure Computing, 14(3), pp. 326-338. doi: 10.1109/TDSC.2015.2453963

Gajrani, J., Tripathi, M., Laxmi, V. , Gaur, M. S., Conti, M. & Rajarajan, M. (2017). sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 854-860. doi: 10.1109/CCNC.2017.7983245

Somani, G., Gaur, M. S., Sanghi, D. , Conti, M. & Rajarajan, M. (2016). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers and Electrical Engineering, doi: 10.1016/j.compeleceng.2016.12.004

Asif, W., Lestas, M., Khaliq Qureshi, H. & Rajarajan, M. (2016). Optimization based spectral partitioning for node criticality assessment. Journal of Network and Computer Applications, 75, pp. 279-292. doi: 10.1016/j.jnca.2016.09.003

Acarali, D., Rajarajan, M., Komninos, N. & Herwono, I. (2016). Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. Journal of Network and Computer Applications, doi: 10.1016/j.jnca.2016.10.007

Rahulamathavan, Y., Rajarajan, M. & Phan, R. C. W. (2016). Smart, secure and seamless access control scheme for mobile devices. 2016 IEEE International Conference on Communications, ICC 2016, pp. 1088-1093. doi: 10.1109/ICC.2016.7510837

Asif, W., Qureshi, H. K., Rajarajan, M. & Lestas, M. (2016). Combined Banzhaf & Diversity Index (CBDI) for critical node detection. Journal of Network and Computer Applications, 64, pp. 76-88. doi: 10.1016/j.jnca.2015.11.025

Rahulamathavan, Y., Veluru, S., Han, J. , Li, F., Rajarajan, M. & Lu, R. (2016). User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Transactions on Computers, 65(9), pp. 2939-2946. doi: 10.1109/TC.2015.2510646

Rajarajan, M., Zaidi, K., Nallanathan, A, , Rakocevic, V. & Milojevic, M, (2016). Host Based Intrusion Detection for VANETs: A statistical approach to Rogue Node Detection. IEEE Transactions on Vehicular Technology, 65(8), pp. 6703-6714. doi: 10.1109/TVT.2015.2480244

Fahad, L. G. & Rajarajan, M. (2015). Integration of discriminative and generative models for activity recognition in smart homes. Applied Soft Computing Journal, 37, pp. 992-1001. doi: 10.1016/j.asoc.2015.03.045

Li, F., Rahulamathavan, Y., Conti, M. & Rajarajan, M. (2015). Robust access control framework for mobile cloud computing network. Computer Communications, 68(Sept), pp. 61-72. doi: 10.1016/j.comcom.2015.07.005

Naval, S., Laxmi, V., Rajarajan, M. , Gaur, M. S. & Conti, M. (2015). Employing Program Semantics for Malware Detection. IEEE Transactions on Information Forensics and Security, 10(12), pp. 2591-2604. doi: 10.1109/TIFS.2015.2469253

Zaidi, K. & Rajarajan, M. (2015). Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet, 7, pp. 257-275. doi: 10.3390/fi7030257

Sajjad, A., Rajarajan, M., Zisman, A. & Dimitrakos, T. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services. Future generation computer systems: the international journal of grid computing and escience, 48(July), pp. 19-27. doi: 10.1016/j.future.2015.01.018

Rajarajan, M. (2015). A review paper on preserving privacy in mobile environments. Journal of Computer Networks and Applications, 53, pp. 74-90. doi: 10.1016/j.jnca.2015.01.008

Shittu, R., Healing, A., Ghanea-Hercock, R. , Bloomfield, R. E. & Rajarajan, M. (2015). Intrusion alert prioritisation and attack detection using post-correlation analysis. Computers & Security, 50, pp. 1-15. doi: 10.1016/j.cose.2014.12.003

Fahad, L. G., Khan, A. U. & Rajarajan, M. (2015). Activity recognition in smart homes with self verification of assignments. Neurocomputing, 149(C), pp. 1286-1298. doi: 10.1016/j.neucom.2014.08.069

Köhnen, C., Überall, C., Rajarajan, M. , Jager, R. & Rakocevic, V. (2015). Autonomous QoS Management and Policing in Unmanaged Local Area Networks. Journal of Computer Networks and Communications, 2015, e790375. doi: 10.1155/2015/790375

Asif, W., Lestas, M., Qureshi, H. K. & Rajarajan, M. (2015). Spectral Partitioning for Node Criticality. 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 877-882. doi: 10.1109/ISCC.2015.7405624

Faruki, P., Bharmal, A., Laxmi, V. , Ganmoor, V., Gaur, M. S., Conti, M. & Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials, 17(2), pp. 998-1022. doi: 10.1109/COMST.2014.2386139

Arunkumar, S., Sensoy, M., Srivatsa, M. & Rajarajan, M. (2015). Reasoning with Streamed Uncertain Information from Unreliable Sources. Expert Systems with Applications, 42(22), pp. 8381-8392. doi: 10.1016/j.eswa.2015.04.031

Adamsky, F., Khayam, S. A., Jaeger, R. & Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009

Asif, W., Qureshi, A., Iqbal, M. & Rajarajan, M. (2014). On the Complexity of Average Path length for Biological Networks and Patterns. International Journal of Biomathematics, 7(4), doi: 10.1142/S1793524514500387

Raoufi, N., Surre, F., Rajarajan, M. , Sun, T. & Grattan, K. T. V. (2014). Optical sensor for pH monitoring using a layer-by-layer deposition technique emphasizing enhanced stability and re-usability. Sensors and Actuators B Chemical, 195, pp. 692-701. doi: 10.1016/j.snb.2014.01.080

Li, F., Rahulamathavan, Y. & Rajarajan, M. (2014). LSD-ABAC: Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. 2014 IEEE 39th Conference on Local Computer Networks (LCN), doi: 10.1109/LCN.2014.6925791

Rahulamathavan, Y., Veluru, S., Phan, R. C. , Chambers, J. A. & Rajarajan, M. (2014). Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE Journal of Biomedical and Health Informatics, 18(1), pp. 56-66. doi: 10.1109/JBHI.2013.2274899

Fiaz, M., Yousaf, R., Hanfi, M. , Asif, W., Qureshi, H. K. & Rajarajan, M. (2014). Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74(2), pp. 989-1004. doi: 10.1007/s11277-013-1334-2

Rahulamathavan, Y., C.-W. Phan, R., Veluru, S. , Cumanan, K & Rajarajan, M. (2013). Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. IEEE Transactions on Dependable and Secure Computing, 11(5), pp. 467-479. doi: 10.1109/TDSC.2013.51

Raoufi, N., Surre, F., Rajarajan, M. , Sun, T. & Grattan, K. T. V. (2013). Fibre Optic pH Sensor Using Optimized Layer-by-Layer Coating Approach. IEEE Sensors Journal, 14(1), pp. 47-54. doi: 10.1109/JSEN.2013.2280283

Ueberall, C., Koehnen, C., Rakocevic, V. , Jaeger, R., Hoy, E. & Rajarajan, M. (2013). Recommendations in a heterogeneous service environment. Multimedia Tools and Applications, 62(3), pp. 785-820. doi: 10.1007/s11042-011-0874-2

Modi, C., Patel, D., Borisaniya, B. , Patel, A. & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), pp. 561-592. doi: 10.1007/s11227-012-0831-5

Qureshi, H. K., Rizvi, S., Saleem, M. , Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks, 19(1), pp. 31-46. doi: 10.1007/s11276-012-0449-9

Veluru, S., Rahulamathavan, Y., Viswanath, P. , Longley, P. & Rajarajan, M. (2013). E-mail address categorization based on semantics of surnames. Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, pp. 222-229. doi: 10.1109/CIDM.2013.6597240

Modi, C., Patel, D., Patel, H. , Borisaniya, B., Patel, A. & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), pp. 42-57. doi: 10.1016/j.jnca.2012.05.003

Raoufi, N., Surre, F., Sun, T. , Rajarajan, M. & Grattan, K. T. V. (2012). Wavelength dependent pH optical sensor using the layer-by-layer technique. Sensors and Actuators B Chemical, 169, pp. 374-381. doi: 10.1016/j.snb.2012.05.024

Rizvi, S., Qureshi, H. K., Khayam, S. A. , Rakocevic, V. & Rajarajan, M. (2012). A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. Journal of Network and Computer Applications, 35, pp. 597-605. doi: 10.1016/j.jnca.2011.11.003

Pawar, P. S., Rajarajan, M., Nair, S. K. & Zisman, A. (2012). Trust Model for Optimized Cloud Services. IFIP Advances in Information and Communication Technology, 374, pp. 97-112. doi: 10.1007/978-3-642-29852-3_7

Qureshi, H. K., Rizvi, S., Saleem, M. , Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2011). Poly: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. Computer Communications, 34(10), pp. 1235-1242. doi: 10.1016/j.comcom.2010.12.016

Mohanty, V., Moliya, D., Hota, C. & Rajarajan, M. (2010). Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. Intelligence and Security Informatics, 6122, pp. 65-72. doi: 10.1007/978-3-642-13601-6_8

Themistos, C., Rajarajan, M., Rahman, B. M. & Grattan, K. T. V. (2009). Characterization of Silica Nanowires for Optical Sensing. Journal of Lightwave Technology, 27(24), pp. 5537-5542.

Rajarajan, M., Spackova, B., Piliarik, M. , Kvasnicka, P., Themistos, C. & Homola, J. (2009). Novel concept of multi-channel fiber optic surface plasmon resonance sensor. Sensors and Actuators B: Chemical, 139(5), pp. 199-203. doi: 10.1016/j.snb.2008.12.020

Elmufti, K., Weerasinghe, D., Rajarajan, M. , Rakocevic, V., Khan, S. & MacDonald, J. (2008). Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. International Journal of Information Security, 8(2), pp. 77-87. doi: 10.1007/s10207-008-0065-y

Weerasinghe, D., Rajarajan, M., Elmufti, K. & Rakocevic, V. (2008). Patient privacy protection using anonymous access control techniques. Methods of Information in Medicine, 47(3), pp. 235-240. doi: 10.3414/ME9116

Book Section

Rahulamathavan, Y., Moonsamy, V., Batten, L. , Shunliang, S. & Rajarajan, M. (2014). An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones. In: Information Security and Privacy. Lecture Notes in Computer Science, 14 (8544). (pp. 430-437). Springer.

Pawar, P. S., Rajarajan, M., Dimitrakos, T. & Zisman, A. (2014). Trust Assessment Using Cloud Broker. In: Zhou, J., Gal-Oz, N., Zhang, J. & Gudes, E, (Eds.), Trust Management VIII. IFIP Advances in Information and Communication Technology, 430. (pp. 237-244). Springer.

Conference or Workshop Item

Nasir, A., Qureshi, H. K., Ullah, I. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2021). EHA-BeeSensor: Hybrid Protocol for Energy Proficient Routing in IoT Network using Swarm Intelligence. 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), ISSN 2378-4865 doi: 10.1109/CAMAD52502.2021.9617777

Boiarkin, V., Rajarajan, M. ORCID: 0000-0001-5814-9922 & Asif, W. (2021). Fair Pricing Model for Smart Grids. 2021 9th International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), pp. 9-14. ISSN 2688-0849 doi: 10.1109/ICSGCE52779.2021.9621701

Hariri, A., Bandopadhyay, S., Rizos, A. , Dimitrakos, T., Crispo, B. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2021). SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. Paper presented at the 36th IFIP TC 11 International Conference, SEC 2021, 22-24 Jun 2021, Oslo, Norway. doi: 10.1007/978-3-030-78120-0_3

Acarali, D., Rajarajan, M., Chema, D. & Ginzburg, M. (2021). A Characterisation of Smart Grid DoS Attacks. In: Wang, D., Meng, W. & Han, J. (Eds.), Security and Privacy in New Computing Environments. SPNCE 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (344). (pp. 3-21). Cham: Springer International Publishing. ISBN 978-3-030-66922-5 doi: 10.1007/978-3-030-66922-5_1

Dixit, A., Asif, W. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2020). Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0. IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society, pp. 2221-2227. ISSN 1553-572X

Altamimi, F., Asift, W. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2020). DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain. Paper presented at the 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), 5-7 Oct 2020, Hangzhou, China. doi: 10.1109/CITS49457.2020.9232506

Boiarkin, V., Asif, W. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2020). Decentralized Demand Response Power Management System for Smart Grids. 2020 IEEE 8th International Conference on Smart Energy Grid Engineering (SEGE), ISSN 2575-2677 doi: 10.1109/SEGE49949.2020.9182024

Maloku, H., Fazliu, Z. L., Ibrani, M. , Mekuli, A., Sela, E. & Rajarajan, M. (2019). Measurement of frequency occupancy levels in TV bands in urban environment in Kosovo. 2018 18th Mediterranean Microwave Symposium (MMS), ISSN 2157-9822 doi: 10.1109/MMS.2018.8612014

Acarali, D., Rajarajan, M. & Komninos, N. ORCID: 0000-0003-2776-1283 (2018). Evaluating the Provision of Botnet Defences using Translational Research Concepts. In: Samarati, P. & Obaidat, M. S. (Eds.), Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018) - Volume 2: SECRYPT. (pp. 514-519). SciTePress. ISBN 978-989-758-319-3 doi: 10.5220/0006884405140519

Sajjad, A., Rajarajan, M. & Dimitrakos, T. (2015). A low-overhead secure communication framework for an inter-cloud environment. In: Al-Saidi, A., Fleischer, R., Maamar, Z. & Rana, O. (Eds.), Intelligent Cloud Computing. ICC 2014. Lecture Notes in Computer Science. (pp. 121-136). Cham: Springer. ISBN 978-3-319-19847-7

Asif, W., Qureshi, M., Lestas, M. & Rajarajan, M. (2014). CBDI: Combined Banzhaf & Diversity Index for Finding Critical Nodes. Paper presented at the IEEE Globecom, 08-12-2014 - 12-12-2014, Texas, USA.

Zaidi, K., Milojevic, M., Rakocevic, V. & Rajarajan, M. (2014). Data Centric Rogue Node Detection in VANETs. Paper presented at the IEEE Trustcom, 24-09-2014 - 26-09-2014, Beijing, China.

Fahad, L. G., Tahir, S. F. & Rajarajan, M. (2014). Activity Recognition in Smart Homes using Clustering based Classification. Paper presented at the 22nd International Conference on Pattern Recognition (ICPR), 24-08-2014 - 28-08-2014, Stockholm, Sweden.

Veluru, S., Rahulamathavan, Y., Manandhar, S. & Rajarajan, M. (2014). Correlated Community Estimation Models Over a Set of Names. Paper presented at the IEEE Technically Co-Sponsored Science and Information Conference, 27-08-2014 - 29-08-2014, London, UK.

Li, F., Rahulamathavan, Y. & Rajarajan, M. (2014). Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Arunkumar, S., Srivatsa, M. & Rajarajan, M. (2014). Location Security - Where to Enforce?. Paper presented at the IEEE MILCOM, 06-10-2014 - 08-10-2014, Baltimore, USA.

Shittu, R., Healing, A., Ghanea-Hercock, R. , Bloomfield, R. E. & Rajarajan, M. (2014). A New Metric for Prioritising Intrusion Alerts Using Correlation and Outlier Analysis. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Adnan, M., Rosi, L., Veluru, S. , Mouseli, M., Longley, P. A. & Rajarajan, M. (2014). Using Digital Traces for User Profiling: the Uncertainty of Identity Toolset. Paper presented at the ACM Security in Information and Networks, (SIN 2014), 09-09-2014 - 11-09-2014, Glasgow, UK.

Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.

Pawar, P. S., Nair, S. K., El-Mousaa, F. , Dimitrakos, T., Rajarajan, M. & Zisman, A. (2012). Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. Paper presented at the CloudComp 2012 - 3rd International Conference on Cloud Computing, 24 - 26 Sep 2012, Vienna, Austria.

Rajarajan, M., Sajjad, A., Zisman, A. , Nair, S. K. & Dimitrakos, T. (2012). Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. Paper presented at the ICON 2012: 18th IEEE International Conference on Networks, 12 - 14 Dec 2012, Singapore.

Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China. doi: 10.1109/CyberC.2012.31

Rajarajan, M., Adamsky, F., Khan, H. , Khayam, S. A. & Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.

Rajarajan, M., Sajjad, A., Zisman, A. , Nair, S. K. & Dimitrakos, T. (2011). Dynamic virtual private network provisioning from multiple cloud infrastructure service providers. Paper presented at the 4th European Conference, ServiceWave 2011, 26 - 28 Oct 2011, Poznan, Poland.

Nair, S. K., Porwal, S., Dimitrakos, T. , Ferrer, A. J., Tordsson, J., Sharif, T., Sheridan, C., Rajarajan, M. & Khan, A. U. (2010). Towards secure cloud bursting, brokerage and aggregation. Paper presented at the IEEE European conference on Web Services, 1 Dec 2010 - 3 Dec 2010, Cyprus.

This list was generated on Fri Dec 2 04:44:57 2022 UTC.