Muttukrishnan Rajarajan
Orcid: 0000-0001-5814-9922
According to our database1,
Muttukrishnan Rajarajan
authored at least 178 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace.
Comput. Secur., 2024
A Blockchain-enabled and Transparent Evaluation of ML Models in the Decentralised Marketplace.
Proceedings of the IEEE International Conference on Blockchain, 2024
Defining Unified Signature API Library for Mobile Apps to Integrate with Secure Signature Creation Devices (SSCDs).
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment.
J. Cloud Comput., December, 2023
Identity resilience in the digital health ecosystem: A key recovery-enabled framework.
Comput. Biol. Medicine, December, 2023
IEEE Trans. Netw. Serv. Manag., September, 2023
Sensors, August, 2023
SUACC-IoT: secure unified authentication and access control system based on capability for IoT.
Clust. Comput., August, 2023
A Novel Image-Based Homomorphic Approach for Preserving the Privacy of Autonomous Vehicles Connected to the Cloud.
IEEE Trans. Intell. Transp. Syst., February, 2023
FAST DATA: A Fair, Secure, and Trusted Decentralized IIoT Data Marketplace Enabled by Blockchain.
IEEE Internet Things J., February, 2023
Privacy vs Utility analysis when applying Differential Privacy on Machine Learning Classifiers.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023
Identification of Important Features at Different IoT layers for Dynamic Attack Detection.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
Comput. Secur., 2022
Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier.
Appl. Intell., 2022
A Decentralized IIoT Identity Framework based on Self-Sovereign Identity using Blockchain.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022
A novel Blockchain-Based Data-Aggregation scheme for Edge-Enabled Microgrid of Prosumers.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
J. Commun. Networks, 2021
IEEE Internet Things J., 2021
Cryptogr., 2021
Comput. Commun., 2021
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
EHA-BeeSensor: Hybrid Protocol for Energy Proficient Routing in IoT Network using Swarm Intelligence.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021
2020
IEEE Trans. Cloud Comput., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store.
Proceedings of the International Conference on Computer, 2020
2019
IEEE Trans. Emerg. Top. Comput., 2019
IEEE ACM Trans. Audio Speech Lang. Process., 2019
Secur. Commun. Networks, 2019
A novel word-independent gesture-typing continuous authentication scheme for mobile devices.
Comput. Secur., 2019
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment.
Comput. Commun., 2019
Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain.
Ad Hoc Networks, 2019
Human-Centric AI for Trustworthy IoT Systems With Explainable Multilayer Perceptrons.
IEEE Access, 2019
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Systems, 2019
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019
A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices.
Proceedings of the 2019 International Conference on Biometrics, 2019
2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Continuous face authentication scheme for mobile devices with tracking and liveness detection.
Microprocess. Microsystems, 2018
Increasing user controllability on device specific privacy in the Internet of Things.
Comput. Commun., 2018
Proceedings of the Information Security Theory and Practice, 2018
Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018
Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018
Proceedings of the Provenance and Annotation of Data and Processes, 2018
Proceedings of the 8th International Conference on the Internet of Things, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition.
Proceedings of the International Conference On Cyber Situational Awareness, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Cloud Comput., 2017
J. Netw. Comput. Appl., 2017
Comput. Secur., 2017
A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots.
Comput. Secur., 2017
IEEE Cloud Comput., 2017
DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017
Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique.
Appl. Soft Comput., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Proceedings of the Future Network Systems and Security - Third International Conference, 2017
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
2016
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection.
IEEE Trans. Veh. Technol., 2016
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016
J. Netw. Comput. Appl., 2016
J. Netw. Comput. Appl., 2016
Survey of approaches and features for the identification of HTTP-based botnet traffic.
J. Netw. Comput. Appl., 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
J. Netw. Comput. Appl., 2015
J. Comput. Networks Commun., 2015
Neurocomputing, 2015
Future Internet, 2015
A scalable and dynamic application-level secure communication framework for inter-cloud services.
Future Gener. Comput. Syst., 2015
Expert Syst. Appl., 2015
IEEE Commun. Surv. Tutorials, 2015
Comput. Secur., 2015
Comput. Commun., 2015
Integration of discriminative and generative models for activity recognition in smart homes.
Appl. Soft Comput., 2015
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
2014
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks.
Wirel. Pers. Commun., 2014
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification.
IEEE J. Biomed. Health Informatics, 2014
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud.
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
Proceedings of the Intelligent Cloud Computing - First International Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Evaluation and improvement of CDS-based topology control for wireless sensor networks.
Wirel. Networks, 2013
J. Supercomput., 2013
Mob. Networks Appl., 2013
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Framework for distributed and self-healing hybrid intrusion detection and prevention system.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
Proceedings of the 19th IEEE International Conference on Networks, 2013
Proceedings of the Distributed Computing and Internet Technology, 2013
Proceedings of the 21st European Symposium on Artificial Neural Networks, 2013
Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013
2012
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks.
J. Netw. Comput. Appl., 2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Proceedings of the 18th IEEE International Conference on Networks, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the Cloud Computing - Third International Conference, 2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Wirel. Pers. Commun., 2011
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks.
Comput. Commun., 2011
Proceedings of the Mobile Computing, Applications, and Services, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.
Proceedings of the Recent Trends in Network Security and Applications, 2010
An energy efficient Clique-based CDS discovery protocol for wireless sensor networks.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
2009
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture.
Int. J. Inf. Sec., 2009
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Proceedings of the Information Security and Digital Forensics, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the Electronic Healthcare - Second International ICST Conference, 2009
2008
Int. J. Mob. Commun., 2008
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
Proceedings of the Electronic Healthcare, First International Conference, 2008
2007
Int. J. Electron. Heal., 2007
2006
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006
2004
Proceedings of the Quality of Service in the Emerging Networking Panorama: Fifth International Workshop on Quality of Future Internet Services, 2004
1999
PhD thesis, 1999