A survey of intrusion detection techniques in cloud C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan Journal of network and computer applications 36 (1), 42-57, 2013 | 1229 | 2013 |
Android security: a survey of issues, malware penetration, and defenses P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ... IEEE communications surveys & tutorials 17 (2), 998-1022, 2014 | 723 | 2014 |
A survey on security issues and solutions at different layers of Cloud computing C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan The journal of supercomputing 63, 561-592, 2013 | 596 | 2013 |
PIndroid: A novel Android malware detection system using ensemble learning methods F Idrees, M Rajarajan, M Conti, TM Chen, Y Rahulamathavan Computers & Security 68, 36-46, 2017 | 257 | 2017 |
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption Y Rahulamathavan, RCW Phan, M Rajarajan, S Misra, A Kondoz 2017 IEEE International Conference on Advanced Networks and …, 2017 | 237 | 2017 |
Host-based intrusion detection for VANETs: A statistical approach to rogue node detection K Zaidi, MB Milojevic, V Rakocevic, A Nallanathan, M Rajarajan IEEE transactions on vehicular technology 65 (8), 6703-6714, 2015 | 225 | 2015 |
Towards secure cloud bursting, brokerage and aggregation SK Nair, S Porwal, T Dimitrakos, AJ Ferrer, J Tordsson, T Sharif, ... 2010 eighth IEEE European conference on web services, 189-196, 2010 | 186 | 2010 |
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud Y Rahulamathavan, R Phan, S Veluru, K Cumanan, M Rajarajan IEEE Transactions on Dependable and Secure Computing 11 (5), 467-479, 2014 | 183 | 2014 |
Employing program semantics for malware detection S Naval, V Laxmi, M Rajarajan, MS Gaur, M Conti IEEE Transactions on Information Forensics and Security 10 (12), 2591-2604, 2015 | 129 | 2015 |
Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain I García-Magariño, R Lacuesta, M Rajarajan, J Lloret Ad Hoc Networks 86, 72-82, 2019 | 126 | 2019 |
Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing CN Modi, DR Patel, A Patel, M Rajarajan Procedia Technology 6, 905-912, 2012 | 121 | 2012 |
Capability-based cryptographic data access control in cloud computing C Hota, S Sanka, M Rajarajan, SK Nair International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011 | 121 | 2011 |
Bayesian classifier and snort based network intrusion detection system in cloud computing CN Modi, DR Patel, A Patel, R Muttukrishnan 2012 Third international conference on computing, communication and …, 2012 | 118 | 2012 |
Secure data access in cloud computing S Sanka, C Hota, M Rajarajan 2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010 | 114 | 2010 |
Design and characterization of compact single-section passive polarization rotator BMA Rahman, SSA Obayya, N Somasiri, M Rajarajan, KTV Grattan, ... Journal of lightwave technology 19 (4), 512, 2001 | 103 | 2001 |
Trust model for optimized cloud services PS Pawar, M Rajarajan, SK Nair, A Zisman Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012 | 91 | 2012 |
Blockchain at the edge: Performance of resource-constrained IoT networks S Misra, A Mukherjee, A Roy, N Saurabh, Y Rahulamathavan, ... IEEE Transactions on Parallel and Distributed Systems 32 (1), 174-183, 2020 | 89 | 2020 |
Human-centric AI for trustworthy IoT systems with explainable multilayer perceptrons I Garcia-Magarino, R Muttukrishnan, J Lloret Ieee Access 7, 125562-125574, 2019 | 87 | 2019 |
Label-free slot-waveguide biosensor for the detection of DNA hybridization T Dar, J Homola, BMA Rahman, M Rajarajan Applied optics 51 (34), 8195-8202, 2012 | 86 | 2012 |
Scale inside-out: Rapid mitigation of cloud DDoS attacks G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan IEEE Transactions on Dependable and Secure Computing 15 (6), 959-973, 2017 | 85 | 2017 |