Muttukrishnan Rajarajan

According to our database1, Muttukrishnan Rajarajan
  • authored at least 109 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A Decentralized Approach for Self-Coexistence Among Heterogeneous Networks in TVWS.
IEEE Trans. Vehicular Technology, 2018

Increasing user controllability on device specific privacy in the Internet of Things.
Computer Communications, 2018

2017
Efficient Privacy-Preserving Facial Expression Classification.
IEEE Trans. Dependable Sec. Comput., 2017

Cloud Security Engineering: Theory, Practice and Future Research.
IEEE Trans. Cloud Computing, 2017

Location attestation and access control for mobile devices using GeoXACML.
J. Network and Computer Applications, 2017

PIndroid: A novel Android malware detection system using ensemble learning methods.
Computers & Security, 2017

A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots.
Computers & Security, 2017

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.
IEEE Cloud Computing, 2017

DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Computers & Electrical Engineering, 2017

Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique.
Appl. Soft Comput., 2017

An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Public Key Encryption Scheme for String Identification.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud.
Proceedings of the 2017 International Conference on Information Networking, 2017

Privacy preserving encrypted phonetic search of speech data.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Android Application Collusion Demystified.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection.
IEEE Trans. Vehicular Technology, 2016

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016

Combined Banzhaf & Diversity Index (CBDI) for critical node detection.
J. Network and Computer Applications, 2016

Optimization based spectral partitioning for node criticality assessment.
J. Network and Computer Applications, 2016

Survey of approaches and features for the identification of HTTP-based botnet traffic.
J. Network and Computer Applications, 2016

A continuous user authentication scheme for mobile devices.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Smart, secure and seamless access control scheme for mobile devices.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Employing Program Semantics for Malware Detection.
IEEE Trans. Information Forensics and Security, 2015

A review paper on preserving privacy in mobile environments.
J. Network and Computer Applications, 2015

Autonomous QoS Management and Policing in Unmanaged Local Area Networks.
Journal Comp. Netw. and Communic., 2015

Activity recognition in smart homes with self verification of assignments.
Neurocomputing, 2015

Vehicular Internet: Security & Privacy Challenges and Opportunities.
Future Internet, 2015

A scalable and dynamic application-level secure communication framework for inter-cloud services.
Future Generation Comp. Syst., 2015

Reasoning with streamed uncertain information from unreliable sources.
Expert Syst. Appl., 2015

Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Communications Surveys and Tutorials, 2015

Intrusion alert prioritisation and attack detection using post-correlation analysis.
Computers & Security, 2015

Robust access control framework for mobile cloud computing network.
Computer Communications, 2015

Integration of discriminative and generative models for activity recognition in smart homes.
Appl. Soft Comput., 2015

P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Global attestation of location in mobile devices.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Spectral partitioning for node criticality.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Entropy clustering approach for improving forecasting in DDoS attacks.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

Anomalies Detection in Smart-Home Activities.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Hide-and-seek: Face recognition in private.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Feature selection and data balancing for activity recognition in smart homes.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Assessing Data Breach Risk in Cloud Systems.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks.
Wireless Personal Communications, 2014

Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification.
IEEE J. Biomedical and Health Informatics, 2014

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud.
IEEE Trans. Dependable Sec. Comput., 2014

Stealing bandwidth from BitTorrent seeders.
Computers & Security, 2014

Investigating the android intents and permissions for malware detection.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Data-centric Rogue Node Detection in VANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Analysing Security requirements in Cloud-based Service Level Agreements.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Exploring Worm Behaviors using DTW.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

P-SPADE: GPU accelerated malware packer detection.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Trust Assessment Using Cloud Broker.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Activity Recognition in Smart Homes Using Clustering Based Classification.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

A Low-Overhead Secure Communication Framework for an Inter-cloud Environment.
Proceedings of the Intelligent Cloud Computing - First International Conference, 2014

CBDI: Combined Banzhaf & diversity index for finding critical nodes.
Proceedings of the IEEE Global Communications Conference, 2014

Who Is Going to Be the Next BitTorrent Peer Idol?
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

Environment-Reactive Malware Behavior: Detection and Categorization.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

War against mobile malware with cloud computing and machine learning forces.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Evaluation and improvement of CDS-based topology control for wireless sensor networks.
Wireless Networks, 2013

A survey on security issues and solutions at different layers of Cloud computing.
The Journal of Supercomputing, 2013

Recommendations in a heterogeneous service environment.
Multimedia Tools Appl., 2013

Editorial for Security and Privacy in Wireless Networks Special Issue.
MONET, 2013

A survey of intrusion detection techniques in Cloud.
J. Network and Computer Applications, 2013

Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Trust Model for Cloud Based on Cloud Characteristics.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

DIVA - Digital Identity in VANETs: A multi-authority framework for VANETs.
Proceedings of the 19th IEEE International Conference on Networks, 2013

Adaptive Task Scheduling in Service Oriented Crowd Using SLURM.
Proceedings of the Distributed Computing and Internet Technology, 2013

Long term analysis of daily activities in smart home.
Proceedings of the 21st European Symposium on Artificial Neural Networks, 2013

Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

E-mail address categorization based on semantics of surnames.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013

2012
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks.
J. Network and Computer Applications, 2012

A novel framework for intrusion detection in cloud.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Trust Model for Optimized Cloud Services.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Visual Analytic Agent-Based Framework for Intrusion Alert Analysis.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture.
Proceedings of the Cloud Computing - Third International Conference, 2012

Novel framework for secure mobile financial services.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Graph-Theoretic Complexity Reduction for Markovian Wireless Channel Models.
Wireless Personal Communications, 2011

Poly: A reliable and energy efficient topology control protocol for wireless sensor networks.
Computer Communications, 2011

An User-Centric Attribute Based Access Control Model for Ubuquitous Environments.
Proceedings of the Mobile Computing, Applications, and Services, 2011

Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Security framework for mobile banking.
Proceedings of the MoMM'2010, 2010

Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Towards Secure Cloud Bursting, Brokerage and Aggregation.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.
Proceedings of the Recent Trends in Network Security and Applications, 2010

An energy efficient Clique-based CDS discovery protocol for wireless sensor networks.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture.
Int. J. Inf. Sec., 2009

Trust delegation for medical records access using public mobile networks.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Parameter Based Access Control Model for Mobile Handsets.
Proceedings of the Information Security and Digital Forensics, 2009

Recommendation index for DVB content using Service information.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Security Protection on Trust Delegated Data in Public Mobile Networks.
Proceedings of the Electronic Healthcare - Second International ICST Conference, 2009

2008
Anonymous authentication for mobile Single Sign-On to protect user privacy.
IJMC, 2008

Patient's privacy protection with anonymous access to medical services.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Timestamp authentication protocol for remote monitoring in eHealth.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Device Data Protection in Mobile Healthcare Applications.
Proceedings of the Electronic Healthcare, First International Conference, 2008

2007
Securing electronic health records with novel mobile encryption schemes.
IJEH, 2007

2006
XML Security based Access Control for Healthcare Information in Mobile Environment.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

Privacy in Mobile Web Services eHealth.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

A Web Services Shopping Mall for Mobile Users.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

2004
QoS Constraints in Bluetooth-Based Wireless Sensor Networks.
Proceedings of the Quality of Service in the Emerging Networking Panorama: Fifth International Workshop on Quality of Future Internet Services, 2004


  Loading...