Muttukrishnan Rajarajan

Orcid: 0000-0001-5814-9922

According to our database1, Muttukrishnan Rajarajan authored at least 173 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment.
J. Cloud Comput., December, 2023

Identity resilience in the digital health ecosystem: A key recovery-enabled framework.
Comput. Biol. Medicine, December, 2023

A New Scalable and Secure Access Control Scheme Using Blockchain Technology for IoT.
IEEE Trans. Netw. Serv. Manag., September, 2023

A Systematic Review of Data-Driven Attack Detection Trends in IoT.
Sensors, August, 2023

SUACC-IoT: secure unified authentication and access control system based on capability for IoT.
Clust. Comput., August, 2023

A Novel Image-Based Homomorphic Approach for Preserving the Privacy of Autonomous Vehicles Connected to the Cloud.
IEEE Trans. Intell. Transp. Syst., February, 2023

FAST DATA: A Fair, Secure, and Trusted Decentralized IIoT Data Marketplace Enabled by Blockchain.
IEEE Internet Things J., February, 2023

Privacy vs Utility analysis when applying Differential Privacy on Machine Learning Classifiers.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Open Banking API Security: Anomalous Access Behaviour.
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023

Identification of Important Features at Different IoT layers for Dynamic Attack Detection.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
Modelling smart grid IT-OT dependencies for DDoS impact propagation.
Comput. Secur., 2022

Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier.
Appl. Intell., 2022

A Decentralized IIoT Identity Framework based on Self-Sovereign Identity using Blockchain.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

A novel Blockchain-Based Data-Aggregation scheme for Edge-Enabled Microgrid of Prosumers.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Blockchain at the Edge: Performance of Resource-Constrained IoT Networks.
IEEE Trans. Parallel Distributed Syst., 2021

Privacy-preserving COVID-19 contact tracing using blockchain.
J. Commun. Networks, 2021

Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems.
IEEE Internet Things J., 2021

Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions.
Cryptogr., 2021

A Characterisation of Smart Grid DoS Attacks.
CoRR, 2021

Role recommender-RBAC: Optimizing user-role assignments in RBAC.
Comput. Commun., 2021

SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

EHA-BeeSensor: Hybrid Protocol for Energy Proficient Routing in IoT Network using Swarm Intelligence.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

2020
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification.
IEEE Trans. Cloud Comput., 2020

A parallelized disjunctive query based searchable encryption scheme for big data.
Future Gener. Comput. Syst., 2020

Scalar Product Lattice Computation for Efficient Privacy-preserving Systems.
CoRR, 2020

Securing the LoRaWAN join procedure using blockchains.
Clust. Comput., 2020

Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Blockchain Analysis Tool For Monitoring Coin Flow.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Modelling DoS Attacks & Interoperability in the Smart Grid.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store.
Proceedings of the International Conference on Computer, 2020

2019
Towards Security of GSM Voice Communication.
Wirel. Pers. Commun., 2019

A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data.
IEEE Trans. Emerg. Top. Comput., 2019

Privacy-Preserving iVector-Based Speaker Verification.
IEEE ACM Trans. Audio Speech Lang. Process., 2019

Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks.
Secur. Commun. Networks, 2019

A novel word-independent gesture-typing continuous authentication scheme for mobile devices.
Comput. Secur., 2019

Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment.
Comput. Commun., 2019

Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain.
Ad Hoc Networks, 2019

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data.
IEEE Access, 2019

Human-Centric AI for Trustworthy IoT Systems With Explainable Multilayer Perceptrons.
IEEE Access, 2019

Node Criticality Assessment in a Blockchain Network.
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Systems, 2019

Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Agent-based IoT Coordination for Smart Cities Considering Security and Privacy.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

User Privacy Risk Analysis For The Internet of Things.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices.
Proceedings of the 2019 International Conference on Biometrics, 2019

2018
A Decentralized Approach for Self-Coexistence Among Heterogeneous Networks in TVWS.
IEEE Trans. Veh. Technol., 2018

Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

Continuous face authentication scheme for mobile devices with tracking and liveness detection.
Microprocess. Microsystems, 2018

Increasing user controllability on device specific privacy in the Internet of Things.
Comput. Commun., 2018

Detection of Bitcoin-Based Botnets Using a One-Class Classifier.
Proceedings of the Information Security Theory and Practice, 2018

Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

Towards automated privacy risk assessments in IoT systems.
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018

Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Modelling Botnet Propagation in Networks with Layered Defences.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Towards Transparency of IoT Message Brokers.
Proceedings of the Provenance and Annotation of Data and Processes, 2018

An attack tree based risk evaluation approach for the internet of things.
Proceedings of the 8th International Conference on the Internet of Things, 2018

Evaluating the Provision of Botnet Defences using Translational Research Concepts.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

CARE: Criticality-Aware Data Transmission in CPS-Based Healthcare Systems.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Context Awareness for Improved Continuous Face Authentication on Mobile Devices.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Efficient Privacy-Preserving Facial Expression Classification.
IEEE Trans. Dependable Secur. Comput., 2017

Cloud Security Engineering: Theory, Practice and Future Research.
IEEE Trans. Cloud Comput., 2017

Location attestation and access control for mobile devices using GeoXACML.
J. Netw. Comput. Appl., 2017

PIndroid: A novel Android malware detection system using ensemble learning methods.
Comput. Secur., 2017

A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots.
Comput. Secur., 2017

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.
IEEE Cloud Comput., 2017

DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017

Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique.
Appl. Soft Comput., 2017

An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Public Key Encryption Scheme for String Identification.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud.
Proceedings of the 2017 International Conference on Information Networking, 2017

Privacy preserving encrypted phonetic search of speech data.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Android Application Collusion Demystified.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection.
IEEE Trans. Veh. Technol., 2016

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016

Combined Banzhaf & Diversity Index (CBDI) for critical node detection.
J. Netw. Comput. Appl., 2016

Optimization based spectral partitioning for node criticality assessment.
J. Netw. Comput. Appl., 2016

Survey of approaches and features for the identification of HTTP-based botnet traffic.
J. Netw. Comput. Appl., 2016

A continuous user authentication scheme for mobile devices.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Smart, secure and seamless access control scheme for mobile devices.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Employing Program Semantics for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2015

A review paper on preserving privacy in mobile environments.
J. Netw. Comput. Appl., 2015

Autonomous QoS Management and Policing in Unmanaged Local Area Networks.
J. Comput. Networks Commun., 2015

Activity recognition in smart homes with self verification of assignments.
Neurocomputing, 2015

Vehicular Internet: Security & Privacy Challenges and Opportunities.
Future Internet, 2015

A scalable and dynamic application-level secure communication framework for inter-cloud services.
Future Gener. Comput. Syst., 2015

Reasoning with streamed uncertain information from unreliable sources.
Expert Syst. Appl., 2015

Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Commun. Surv. Tutorials, 2015

Intrusion alert prioritisation and attack detection using post-correlation analysis.
Comput. Secur., 2015

Robust access control framework for mobile cloud computing network.
Comput. Commun., 2015

Integration of discriminative and generative models for activity recognition in smart homes.
Appl. Soft Comput., 2015

P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Global attestation of location in mobile devices.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Spectral partitioning for node criticality.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Entropy clustering approach for improving forecasting in DDoS attacks.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

Anomalies Detection in Smart-Home Activities.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Hide-and-seek: Face recognition in private.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Feature selection and data balancing for activity recognition in smart homes.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Assessing Data Breach Risk in Cloud Systems.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks.
Wirel. Pers. Commun., 2014

Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification.
IEEE J. Biomed. Health Informatics, 2014

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud.
IEEE Trans. Dependable Secur. Comput., 2014

Stealing bandwidth from BitTorrent seeders.
Comput. Secur., 2014

Investigating the android intents and permissions for malware detection.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Data-centric Rogue Node Detection in VANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Analysing Security requirements in Cloud-based Service Level Agreements.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Exploring Worm Behaviors using DTW.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

P-SPADE: GPU accelerated malware packer detection.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Location Security - Where to Enforce?
Proceedings of the 2014 IEEE Military Communications Conference, 2014

OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Trust Assessment Using Cloud Broker.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Activity Recognition in Smart Homes Using Clustering Based Classification.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

A Low-Overhead Secure Communication Framework for an Inter-cloud Environment.
Proceedings of the Intelligent Cloud Computing - First International Conference, 2014

CBDI: Combined Banzhaf & diversity index for finding critical nodes.
Proceedings of the IEEE Global Communications Conference, 2014

Who Is Going to Be the Next BitTorrent Peer Idol?
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

Environment-Reactive Malware Behavior: Detection and Categorization.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

War against mobile malware with cloud computing and machine learning forces.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Evaluation and improvement of CDS-based topology control for wireless sensor networks.
Wirel. Networks, 2013

A survey on security issues and solutions at different layers of Cloud computing.
J. Supercomput., 2013

Recommendations in a heterogeneous service environment.
Multim. Tools Appl., 2013

Editorial for Security and Privacy in Wireless Networks Special Issue.
Mob. Networks Appl., 2013

A survey of intrusion detection techniques in Cloud.
J. Netw. Comput. Appl., 2013

Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Trust Model for Cloud Based on Cloud Characteristics.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Framework for distributed and self-healing hybrid intrusion detection and prevention system.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

DIVA - Digital Identity in VANETs: A multi-authority framework for VANETs.
Proceedings of the 19th IEEE International Conference on Networks, 2013

Adaptive Task Scheduling in Service Oriented Crowd Using SLURM.
Proceedings of the Distributed Computing and Internet Technology, 2013

Long term analysis of daily activities in smart home.
Proceedings of the 21st European Symposium on Artificial Neural Networks, 2013

Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

E-mail address categorization based on semantics of surnames.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013

2012
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks.
J. Netw. Comput. Appl., 2012

A novel framework for intrusion detection in cloud.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Trust Model for Optimized Cloud Services.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Visual Analytic Agent-Based Framework for Intrusion Alert Analysis.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture.
Proceedings of the Cloud Computing - Third International Conference, 2012

Novel framework for secure mobile financial services.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Graph-Theoretic Complexity Reduction for Markovian Wireless Channel Models.
Wirel. Pers. Commun., 2011

Poly: A reliable and energy efficient topology control protocol for wireless sensor networks.
Comput. Commun., 2011

An User-Centric Attribute Based Access Control Model for Ubuquitous Environments.
Proceedings of the Mobile Computing, Applications, and Services, 2011

Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Security framework for mobile banking.
Proceedings of the MoMM'2010, 2010

Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Towards Secure Cloud Bursting, Brokerage and Aggregation.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.
Proceedings of the Recent Trends in Network Security and Applications, 2010

An energy efficient Clique-based CDS discovery protocol for wireless sensor networks.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture.
Int. J. Inf. Sec., 2009

Trust delegation for medical records access using public mobile networks.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Parameter Based Access Control Model for Mobile Handsets.
Proceedings of the Information Security and Digital Forensics, 2009

Recommendation index for DVB content using Service information.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Security Protection on Trust Delegated Data in Public Mobile Networks.
Proceedings of the Electronic Healthcare - Second International ICST Conference, 2009

2008
Anonymous authentication for mobile Single Sign-On to protect user privacy.
Int. J. Mob. Commun., 2008

Patient's privacy protection with anonymous access to medical services.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Timestamp authentication protocol for remote monitoring in eHealth.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Device Data Protection in Mobile Healthcare Applications.
Proceedings of the Electronic Healthcare, First International Conference, 2008

2007
Securing electronic health records with novel mobile encryption schemes.
Int. J. Electron. Heal., 2007

2006
XML Security based Access Control for Healthcare Information in Mobile Environment.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

Privacy in Mobile Web Services eHealth.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

A Web Services Shopping Mall for Mobile Users.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

2004
QoS Constraints in Bluetooth-Based Wireless Sensor Networks.
Proceedings of the Quality of Service in the Emerging Networking Panorama: Fifth International Workshop on Quality of Future Internet Services, 2004

1999
Computer modelling of compact photonics devices for optical communications.
PhD thesis, 1999


  Loading...