Muttukrishnan Rajarajan
Muttukrishnan Rajarajan
Professor of Security Engineering, City, University of London
Verified email at city.ac.uk - Homepage
Title
Cited by
Cited by
Year
A survey of intrusion detection techniques in cloud
C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan
Journal of network and computer applications 36 (1), 42-57, 2013
8182013
Android security: a survey of issues, malware penetration, and defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ...
IEEE Communications Surveys and Tutorials 17 (2), 998-1022, 2015
4082015
A survey on security issues and solutions at different layers of Cloud computing
C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan
The journal of supercomputing 63 (2), 561-592, 2013
3892013
Towards secure cloud bursting, brokerage and aggregation
SK Nair, S Porwal, T Dimitrakos, AJ Ferrer, J Tordsson, T Sharif, ...
2010 eighth IEEE European conference on web services, 189-196, 2010
1562010
Host-based intrusion detection for vanets: a statistical approach to rogue node detection
K Zaidi, MB Milojevic, V Rakocevic, A Nallanathan, M Rajarajan
IEEE transactions on vehicular technology 65 (8), 6703-6714, 2015
982015
Capability-based cryptographic data access control in cloud computing
C Hota, S Sanka, M Rajarajan, SK Nair
International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011
972011
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
Y Rahulamathavan, R Phan, S Veluru, K Cumanan, M Rajarajan
IEEE Transactions on Dependable and Secure Computing 11 (5), 467-479, 2014
962014
Design and characterization of compact single-section passive polarization rotator
BMA Rahman, SSA Obayya, N Somasiri, M Rajarajan, KTV Grattan, ...
Journal of lightwave technology 19 (4), 512, 2001
942001
Secure data access in cloud computing
S Sanka, C Hota, M Rajarajan
2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010
902010
Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing
CN Modi, DR Patel, A Patel, M Rajarajan
Procedia Technology 6, 905-912, 2012
812012
Accurate analysis of MMI devices with two-dimensional confinement
M Rajarajan, BMA Rahman, T Wongcharoen, KTV Grattan
Journal of lightwave technology 14 (9), 2078-2084, 1996
791996
PIndroid: A novel Android malware detection system using ensemble learning methods
F Idrees, M Rajarajan, M Conti, TM Chen, Y Rahulamathavan
Computers & Security 68, 36-46, 2017
772017
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks
S Rizvi, HK Qureshi, SA Khayam, V Rakocevic, M Rajarajan
Journal of Network and Computer Applications 35 (2), 597-605, 2012
742012
Bayesian Classifier and Snort based network intrusion detection system in cloud computing
CN Modi, DR Patel, A Patel, R Muttukrishnan
2012 Third International Conference on Computing, Communication and …, 2012
732012
Trust model for optimized cloud services
PS Pawar, M Rajarajan, SK Nair, A Zisman
IFIP international conference on trust management, 97-112, 2012
692012
Characterization of silver/polystyrene (PS)-coated hollow glass waveguides at THz frequency
C Themistos, BMA Rahman, M Rajarajan, KTV Grattan, B Bowden, ...
Journal of lightwave technology 25 (9), 2456-2462, 2007
682007
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
Y Rahulamathavan, RCW Phan, M Rajarajan, S Misra, A Kondoz
2017 IEEE International Conference on Advanced Networks and …, 2017
642017
Novel concept of multi-channel fiber optic surface plasmon resonance sensor
B Špačková, M Piliarik, P Kvasnička, C Themistos, M Rajarajan, J Homola
Sensors and Actuators B: Chemical 139 (1), 199-203, 2009
622009
A rigorous comparison of the performance of directional couplers with multimode interference devices
M Rajarajan, BMA Rahman, KTV Grattan
Journal of lightwave technology 17 (2), 243, 1999
611999
Employing program semantics for malware detection
S Naval, V Laxmi, M Rajarajan, MS Gaur, M Conti
IEEE Transactions on Information Forensics and Security 10 (12), 2591-2604, 2015
582015
The system can't perform the operation now. Try again later.
Articles 1–20