A survey of intrusion detection techniques in cloud C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan Journal of network and computer applications 36 (1), 42-57, 2013 | 698 | 2013 |
A survey on security issues and solutions at different layers of Cloud computing C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan The journal of supercomputing 63 (2), 561-592, 2013 | 325 | 2013 |
Android security: a survey of issues, malware penetration, and defenses P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ... IEEE communications surveys & tutorials 17 (2), 998-1022, 2014 | 318 | 2014 |
Towards secure cloud bursting, brokerage and aggregation SK Nair, S Porwal, T Dimitrakos, AJ Ferrer, J Tordsson, T Sharif, ... 2010 eighth IEEE European conference on web services, 189-196, 2010 | 141 | 2010 |
Design and characterization of compact single-section passive polarization rotator BMA Rahman, SSA Obayya, N Somasiri, M Rajarajan, KTV Grattan, ... Journal of lightwave technology 19 (4), 512, 2001 | 92 | 2001 |
Capability-based cryptographic data access control in cloud computing C Hota, S Sanka, M Rajarajan, SK Nair International Journal of Advanced Networking and Applications 3 (3), 1152-1161, 2011 | 91 | 2011 |
Secure data access in cloud computing S Sanka, C Hota, M Rajarajan 2010 IEEE 4th International Conference on Internet Multimedia Services …, 2010 | 90 | 2010 |
Accurate analysis of MMI devices with two-dimensional confinement M Rajarajan, BMA Rahman, T Wongcharoen, KTV Grattan Journal of lightwave technology 14 (9), 2078-2084, 1996 | 77 | 1996 |
Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing CN Modi, DR Patel, A Patel, M Rajarajan Procedia Technology 6, 905-912, 2012 | 68 | 2012 |
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks S Rizvi, HK Qureshi, SA Khayam, V Rakocevic, M Rajarajan Journal of Network and Computer Applications 35 (2), 597-605, 2012 | 67 | 2012 |
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud Y Rahulamathavan, R Phan, S Veluru, K Cumanan, M Rajarajan IEEE Transactions on Dependable and Secure Computing 11 (5), 467-479, 2014 | 65 | 2014 |
Trust model for optimized cloud services PS Pawar, M Rajarajan, SK Nair, A Zisman IFIP international conference on trust management, 97-112, 2012 | 64 | 2012 |
Characterization of silver/polystyrene (PS)-coated hollow glass waveguides at THz frequency C Themistos, BMA Rahman, M Rajarajan, KTV Grattan, B Bowden, ... Journal of Lightwave Technology 25 (9), 2456-2462, 2007 | 63 | 2007 |
Host-based intrusion detection for vanets: a statistical approach to rogue node detection K Zaidi, MB Milojevic, V Rakocevic, A Nallanathan, M Rajarajan IEEE transactions on vehicular technology 65 (8), 6703-6714, 2015 | 62 | 2015 |
A rigorous comparison of the performance of directional couplers with multimode interference devices M Rajarajan, BMA Rahman, KTV Grattan Journal of lightwave technology 17 (2), 243, 1999 | 62 | 1999 |
Bayesian Classifier and Snort based network intrusion detection system in cloud computing CN Modi, DR Patel, A Patel, R Muttukrishnan 2012 Third International Conference on Computing, Communication and …, 2012 | 58 | 2012 |
Novel concept of multi-channel fiber optic surface plasmon resonance sensor B Špačková, M Piliarik, P Kvasnička, C Themistos, M Rajarajan, J Homola Sensors and Actuators B: Chemical 139 (1), 199-203, 2009 | 58 | 2009 |
Numerical study of spot-size expanders for an efficient OEIC to SMF coupling M Rajarajan, BMA Rahman, KTV Grattan IEEE Photonics Technology Letters 10 (8), 1082-1084, 1998 | 50 | 1998 |
Intrusion alert prioritisation and attack detection using post-correlation analysis R Shittu, A Healing, R Ghanea-Hercock, R Bloomfield, M Rajarajan Computers & Security 50, 1-15, 2015 | 48 | 2015 |
Low complexity multi-authority attribute based encryption scheme for mobile cloud computing F Li, Y Rahulamathavan, M Rajarajan, RCW Phan 2013 IEEE Seventh International Symposium on Service-Oriented System …, 2013 | 48 | 2013 |