Vallipuram Muthukkumarasamy

Orcid: 0000-0002-6787-6379

According to our database1, Vallipuram Muthukkumarasamy authored at least 90 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks.
Comput. Networks, August, 2023

An Analysis of Zero-knowledge Proof-based Privacy-preserving Techniques for Non-fungible Tokens in the Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol.
Proceedings of the Formal Methods and Software Engineering, 2023

A privacy awareness framework for NFT avatars in the metaverse.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Cross-Blockchain Technology: Integration Framework and Security Assumptions.
IEEE Access, 2022

Blockchain Interoperability: Performance and Security Trade-Offs.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

A UI/UX Evaluation Framework for Blockchain-Based Applications.
Proceedings of the Blockchain - ICBC 2022, 2022

2021
Burn-to-Claim: An asset transfer protocol for blockchain interoperability.
Comput. Networks, 2021

Graph Based Visualisation Techniques for Analysis of Blockchain Transactions.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

2020
A blockchain-based database management system.
Knowl. Eng. Rev., 2020

Cross-chain interoperability among blockchain-based systems using transactions.
Knowl. Eng. Rev., 2020

Immutable autobiography of smart cars leveraging blockchain technology.
Knowl. Eng. Rev., 2020

A survey on blockchain-based platforms for IoT use-cases.
Knowl. Eng. Rev., 2020

COVID-19 Contact Tracing: Challenges and Future Directions.
IEEE Access, 2020

The Burn-to-Claim cross-blockchain asset transfer protocol.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

2019
Chapter Two - Integrated platforms for blockchain enablement.
Adv. Comput., 2019

Blockchain Interoperable Digital Objects.
Proceedings of the Blockchain - ICBC 2019, 2019

2018
Localization of Submerged Sensors with a Single Beacon for Non-Parallel Planes State.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

2016
On the Security of Permutation-Only Image Encryption Schemes.
IEEE Trans. Inf. Forensics Secur., 2016

Intelligent Sampling Using an Optimized Neural Network.
J. Networks, 2016

A survey on data leakage prevention systems.
J. Netw. Comput. Appl., 2016

A probabilistic sampling method for efficient flow-based analysis.
J. Commun. Networks, 2016

Discovery of potential data leaks in email communications.
Proceedings of the 10th International Conference on Signal Processing and Communication Systems, 2016

Securing Smart Cities Using Blockchain Technology.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability.
IEEE Trans. Inf. Forensics Secur., 2015

Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic.
IEEE Trans. Consumer Electron., 2015

Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks.
J. Networks, 2015

Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB).
J. Networks, 2015

Performance of Flow-based Anomaly Detection in Sampled Traffic.
J. Networks, 2015

An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks.
J. Networks, 2015

An Analytical Model for Lifetime Estimation of Wireless Sensor Networks.
IEEE Commun. Lett., 2015

Detecting Data Semantic: A Data Leakage Prevention Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Secure Lightweight Texture Encryption Scheme.
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015

Flow-based anomaly detection using semisupervised learning.
Proceedings of the 9th International Conference on Signal Processing and Communication Systems, 2015

2014
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks.
J. Networks, 2014

Comments on the security of "Diffusion-substitution based gray image encryption" scheme.
Digit. Signal Process., 2014

A Simple Lightweight Encryption Scheme for Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking - 15th International Conference, 2014

A Semantics-Aware Classification Approach for Data Leakage Prevention.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Word N-Gram Based Classification for Data Leakage Prevention.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

An energy efficient clique based clustering and routing mechanism in wireless sensor networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Maximal clique based clustering scheme for wireless sensor networks.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

Adaptable N-gram classification model for data leakage prevention.
Proceedings of the 7th International Conference on Signal Processing and Communication Systems, 2013

Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

On the Feasibility and Performance of Pass-Thought Authentication Systems.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

Coordinates Determination of Submerged Sensors Using Cayley-Menger Determinant.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

The Analysis of Temperature, Depth, Salinity Effect on Acoustic Speed for a Vertical Water Column.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Metaheuristic algorithms based Flow Anomaly Detector.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Localization of Submerged Sensors Using Radio and Acoustic Signals with Single Beacon.
Proceedings of the Ad-hoc, Mobile, and Wireless Network - 12th International Conference, 2013

2012
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Enhanced CRA protocol for seamless connectivity in wireless networks.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Sensing and analyzing physiological data with a smart phone to secure an e-health system.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Securing mobile agent based Wireless Sensor Network applications on middleware.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

2011
Substantiating Anomalies In Wireless Networks Using Group Outlier Scores.
J. Softw., 2011

An EAP Framework for Unified Authentication in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Insecurity in Public-Safety Communications: APCO Project 25.
Proceedings of the Security and Privacy in Communication Networks, 2011

A Mobile Personal Health System Enabling Pervasive Healthcare - SmartPhone.
Proceedings of the HEALTHINF 2011, 2011

2010
Key establishment protocols using environmental and physiological data in wireless sensor networks.
Int. J. Sens. Networks, 2010

A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

The Insecurity of Time-of-Arrival Distance-Ranging in IEEE 802.11 Wireless Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Trust Formalization in Mobile Ad-Hoc Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Trust Management Scheme for Mobile Ad-Hoc Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Enhancing Trust on e-Government: A Decision Fusion Module.
Proceedings of the Third International Conference on Network and System Security, 2009

Implementation and Analysis of Sensor Security Protocols in a Home Health Care System.
Proceedings of the Third International Conference on Network and System Security, 2009

A software-defined radio receiver for APCO project 25 signals.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL.
J. Networks, 2008

Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks.
J. Networks, 2008

Securing Wireless Mesh Networks.
IEEE Internet Comput., 2008

Performance analysis of GAME: A generic automated marking environment.
Comput. Educ., 2008

Substantiating Security Threats Using Group Outlier Detection Techniques.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Off-line Signature Verification Using an Enhanced Modified Direction Feature with Single and Multi-classifier Approaches.
IEEE Comput. Intell. Mag., 2007

Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies.
Proceedings of the 15th IEEE International Conference on Networks, 2007

A Study of the TKIP Cryptographic DoS Attack.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

Substantiating Unexpected Behavior of 802.11 Network Hosts.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification.
Proceedings of the International Joint Conference on Neural Networks, 2006

Off-line Signature Verification based on the Modified Direction Feature.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Efficiently Maintaining Consistency Using Tree-Based P2P Network System in Distributed Network Games.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

Formal Verification of the IEEE 802.11i WLAN Security Protocol.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

2005
802.11 DCF Denial of Service Vulnerabilities.
Proceedings of 3rd Australian Computer, 2005

Investigation of a Classification-based Technique to Detect Illicit Objects for Aviation Security.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2005

2004
An experimental analysis of GAME: a generic automated marking environment.
Proceedings of the 9th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2004

GAME: A Generic Automated Marking Environment for Programming Assessment.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A model for object-based distributed processing using behaviour trees.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004


  Loading...