Udaya Tupakula

Dr

  • 555 Citations
  • 12 h-Index
20022019
If you made any changes in Pure these will be visible here soon.

Research Outputs 2002 2019

  • 555 Citations
  • 12 h-Index
  • 59 Conference proceeding contribution
  • 16 Article
  • 4 Chapter
  • 1 Conference paper
Filter
Conference proceeding contribution
2017

An Eclat algorithm based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1096-1102 7 p. 8029561

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Fusion reactions
Decision making
Energy
Attack

A trust model based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York: Association for Computing Machinery, p. 1-8 8 p. 68

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio

Autoencoder-based feature learning for cyber security applications

Yousefiazar, M., Varadharajan, V., Hamey, L. & Tupakula, U., 30 Jun 2017, International Joint Conference on Neural Networks. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 3854-3861 8 p. 7966342

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Semantics
Classifiers
Data storage equipment
Malware

Efficient approaches for intrusion detection in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 10 Jan 2017, Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Astya, P. N., Swaroop, A., Sharma, V. & Singh, M. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 1211-1216 6 p. 7813926

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Intrusion Detection
Computer worms
Computer viruses
Learning systems

Mitigating attacks in Software Defined Network (SDN)

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 5 Jun 2017, SDS 2017: Fourth International Conference on Software Defined Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 112-117 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Attack
Software
Open source software

Out-VM monitoring for Malicious Network Packet Detection in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 12 Jul 2017, ISEASP 2017: Proceedings of the 2017 ISEA Asia Security and Privacy Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Packet networks
Monitoring
Servers
Feature extraction
Virtual machine

Secure monitoring of the patients with wandering behaviour

Tupakula, U., Varadharajan, V. & Karmakar, K., 24 Apr 2017, 11th International Conference on Body Area Networks: BODYNETS 2016. Red Hook, NY: ACM, p. 111-117 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Controllers
Wireless local area networks (WLAN)
Health care
Local area networks

Securing communication in multiple Autonomous System domains with Software Defined Networking

Varadharajan, V., Karmakar, K. K. & Tupakula, U., 20 Jul 2017, Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 195-203 9 p. 7987280

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Communication
Telecommunication networks
Specifications
Controllers
Software defined networking
2016

Integrated security for services hosted in virtual environments

Jayarathna, D., Varadharajan, V. & Tupakula, U., 2016, IEEE TrustCom/BigDataSE/ISPA 2016: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 82-89 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Access control
Virtual reality

NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment

Mishra, P., Pilli, E. S., Varadharajant, V. & Tupakula, U., 2 Nov 2016, 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016. Wu, J., Martinez Perez, G., Thampi, S. M., Atiquzzaman, M., Berretti, S., Rodrigues, J. J. C. P., Tomar, R., Gorthi, R. P., Siarry, P., Khan Pathan, A-S., Li, J., Bedi, P., Mehta, S., Kammoun, M. H. & Jain, V. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 56-62 7 p. 7732025

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cloud computing
Servers
Learning systems
Data storage equipment
Virtual machine

On the design and implementation of a security architecture for end to end services in software defined networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 22 Dec 2016, LCN 2016 : IEEE 41st Conference On Local Computer Networks: proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 519-522 4 p. 7796830

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Software defined networking

On the design and implementation of a security architecture for Software Defined Networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 671-678 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Policy based security architecture for software defined networks

Karmakar, K. K., Varadharajan, V., Tupakula, U. & Hitchens, M., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 658-663 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Securing Big Data Environments from Attacks

Tupakula, U. & Varadharajan, V., 30 Jun 2016, Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016. Qiu, M. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 109-112 4 p. 7502273

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Big data
Virtual machine
Botnet
Data sources

Securing virtual machines from anomalies using program-behavior analysis in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the Eighteenth IEEE International Conference on High Performance Computing and Communications, the Fourteenth IEEE International Conference on Smart City, the Second IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 991-998 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer worms
Computer viruses
Cloud computing
Decision trees
Learning systems
2015

An enhanced model for network flow based botnet detection

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 101-110 10 p. (Conferences in Research and Practice in Information Technology; vol. 159).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

HTTP
Botnet
Specifications
Network protocols

Botnet detection using software defined networking

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 16 Jun 2015, 2015 22nd International Conference on Telecommunications, ICT 2015. New York, NY: Institute of Electrical and Electronics Engineers (IEEE), p. 219-224 6 p. 7124686

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

networking
HTTP
Controllers
Network management
Computer networks

Hypervisor-based security architecture to protect web applications

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 13th Australasian Information Security Conference, AISC 2015. Ian, W. & Yi, X. (eds.). Sydney: Australian Computer Society, Vol. 161. p. 15-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Web browsers
Visibility
World Wide Web
Websites
Virtual machine

Improved detection of primary user emulation attacks in cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., Nov 2015, 25th International Telecommunication Networks and Applications Conference, ITNAC 2015. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 274-279 6 p. 7366825

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Mobile devices
Electron energy levels
Communication
2014

Hypervisor-based security architecture for validating DNS services (Poster)

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 83-86 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer monitors
Monitoring
Visibility
Internet
Network protocols

Secure monitoring for dementia patients

Tupakula, U. & Varadharajan, V., 2014, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. New York: Association for Computing Machinery, p. 14-19 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Nursing
Monitoring
Costs

Techniques for detecting attacks on critical infrastructure

Tupakula, U. & Varadharajan, V., 2014, 2014 International Conference on Computing, Networking and Communications, ICNC 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 48-52 5 p. 6785303

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Critical infrastructures
Hardware
Communication

Trust enhanced cloud security for healthcare services

Tupakula, U. & Varadharajan, V., 2014, Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 344-351 8 p. 7011269

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

2013

Integrated Security Architecture for Virtual Machines

Varadharajan, V. & Tupakula, U., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013 Sydney, NSW Australia, September 2013 Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Cham: Springer, Springer Nature, p. 140-153 14 p. (Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering; vol. 127).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

On malware characterization and attack classification

Lee, A., Varadharajan, V. & Tupakula, U., 2013, Proceedings of the First Australasian Web Conference (AWC 2013). Ashman, H., Sheng, Q. Z. & Trotman, A. (eds.). Sydney: Australian Computer Society, p. 43-48 6 p. (Conferences in Research and Practice in Information Technology (CRPIT); vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Taxonomies
Polymorphism
Internet
Malware

On the security of tenant transactions in the cloud

Varadharajan, V. & Tupakula, U., 2013, Proceedings: IEEE Fifth International Conference on Cloud Computing Technology and Science. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 525-530 6 p. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cloud computing
Transactions
Cloud Computing
Infrastructure
Attack

Securing mobile devices from DoS attacks

Tupakula, U. & Varadharajan, V., 2013, Proceedings - 16th IEEE International Conference on Computational Science and Engineering, CSE 2013. Chen, J., Cuzzocrea, A. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical Engineers, p. 34-41 8 p. 6755194

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Mobile devices
Speech communication
Denial-of-service attack

Trust enhanced security architecture for detecting insider threats

Tupakula, U. & Varadharajan, V., 2013, Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13, 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, 16-18 July 2013, Melbourne, Victoria, Australia. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 552-559 8 p. 6680886

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Trusted computing
2012

Distributed service control technique for detecting security attacks

Tupakula, U. & Varadharajan, V., 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012. De Turck, F., Gaspary, L. P. & Medhi, D. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 574-577 4 p. 6211959

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Attack
Service control
Security policy

Intrusion detection techniques for virtual domains

Tupakula, U., Varadharajan, V. & Dutta, D., 2012, 2012 19th International Conference on High Performance Computing, HiPC 2012. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-9 9 p. 6507491

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Computer operating systems
Virtual machine

TREASURE: trust enhanced security for cloud environments

Varadharajan, V. & Tupakula, U., 2012, Proceedings: the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2012): 25-27 June 2012, Liverpool, UK. Min, G., Wu, Y., Liu, L. C., Jin, X., Jarvis, S. & Al-Dubai, A. Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 145-152 8 p. 6295969

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Virtual machine
Cloud computing
Hardware
2011

Counteracting DDoS attacks in WLAN

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings of the 4th International Conference on Security of Information and Networks. New York: Association for Computing Machinery, p. 119-126 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Wireless local area networks (WLAN)
Network protocols
Network architecture
Wireless networks
Denial-of-service attack

Intrusion detection techniques for infrastructure as a service cloud

Tupakula, U., Varadharajan, V. & Akku, N., 2011, Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011. Chen, J., Dou, W., Liu, J., Yang, L. T. & Ma, J. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 744-751 8 p. 6118908

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Cloud computing
Virtual machine

On the design of virtual machine intrusion detection system

Tupakula, U. & Varadharajan, V., 2011, Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 682-685 4 p. 5990655

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Computer operating systems
Engines
Virtual machine
Monitoring

Security architecture for virtual machines

Tupakula, U., Varadharajan, V. & Bichhawat, A., 2011, Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP 2011, Proceedings, Part 1. Xiang, Y., Cuzzocrea, A., Hobbs, M. & Zhou, W. (eds.). Heidelberg, Germany: Springer, Springer Nature, Vol. 7016 LNCS. p. 218-229 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7016 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Virtual Machine
Attack
Monitor
Traffic
Computer monitors

Security techniques for beyond 3G wireless mobile networks

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings - 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 136-143 8 p. 6104518

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Wireless networks
Network architecture
Mobile devices
Internet
Monitoring

Security techniques for zero day attacks

Tupakula, U. & Varadharajan, V., 2011, IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 442-447 6 p. 5982574

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer operating systems
Intrusion detection
traffic
Engines
Monitoring

Techniques for analysing PDF malware

Ulucenk, C., Varadharajan, V., Balakrishnan, V. & Tupakula, U., 2011, Proceedings of the 18th Asia-Pacific Software Engineering Conference, APSEC 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 41-48 8 p. 6130668

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

HTTP
Static analysis
Dynamic analysis
Websites
Communication

TVDSEC: Trusted Virtual Domain SECurity

Tupakula, U. & Varadharajan, V., 2011, Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011. Buyya, R., Pallickara, S. & Fox, G. (eds.). Los Alamitos, California: Institute of Electrical and Electronics Engineers (IEEE), p. 57-64 8 p. 6123481

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer monitors
Computer operating systems
Cloud computing
Virtual machine
Virtualization

TVLAN: trusted and virtualised local area networks

Tupakula, U. & Varadharajan, V., 2011, TrustCom 2011: 2011 international joint conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11: 16-18 November 2011, Changsha, Hunan, P. R. China. Wang, G., Tate, S. R., Chen, J-J. & Sakurai, K. (eds.). Los Alamitos, Calif: Institute of Electrical and Electronics Engineers (IEEE), p. 606-612 7 p. 6120871

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Local area networks
Servers
Virtualization
Communication
2010

Detecting security attacks in trusted virtual domains

Tupakula, U. K. & Varadharajan, V., 2010, Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 529-535 7 p. 5703572

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Computer operating systems
Intrusion detection
Virtual machine
2009

DoSTRACK: A system for defending against DoS attacks

Tupakula, U. K., Varadharajan, V. & Pandalaneni, S. R., 2009, 24th Annual ACM Symposium on Applied Computing, SAC 2009. Shin, S. Y. & Ossowski, S. (eds.). New York: ACM, p. 47-53 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer systems
Managers
Internet
Denial-of-service attack

SBAC: Service Based Access Control

Tupakula, U. K., Varadharajan, V. & Vuppala, S. K., 2009, Proceedings - 2009 14th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2009. Los Alamitos, CA, USA: Institute of Electrical and Electronics Engineers (IEEE), p. 202-209 8 p. 5090528

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Access control
Routers
Servers
2008

Subjective logic based trust model for mobile ad hoc networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 2008, Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08. Sevi, A. (ed.). New York: Association for Computing Machinery (ACM), p. 1-11 11 p. 30

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Mobile ad hoc networks
Communication
2007

Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications

Balakrishnan, V., Varadharajan, V., Tupakula, U. & Moe, M. E. G., 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007. O'Conner, L. (ed.). Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 4299678

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Mobile ad hoc networks
communications
anonymity
Communication
communication

TEAM: Trust enhanced security architecture for mobile ad-hoc networks

Balakrishnan, V., Varadharajan, V., Tupakula, U. & Lucs, P., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. Jayasuriya, A. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 182-187 6 p. 4444083

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Mobile ad hoc networks
management
Network routing
trustworthiness
Routing protocols

Trust and recommendations in mobile ad hoc networks

Balakrishnan, V., Varadharajan, V., Tupakula, U. K. & Lucs, P., 2007, 3rd International Conference on Networking and Services, ICNS 2007. Van de Velde, G., Dini, P., Freire, M., Liakopoulos, A., Popoviciu, C., Simeonidou, D. & Zerfos, P. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 4438313

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Mobile ad hoc networks
trend
reputation
simulation
communication

Trust enhanced secure mobile ad-hoc network routing

Balakrishnan, V., Varadharajan, V., Lucs, P. & Tupakula, U. K., 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. O'Conner, L. (ed.). Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), Vol. 1. p. 27-33 7 p. 4224078

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Network routing
Mobile ad hoc networks
Mobile Ad Hoc Networks
Routing
Recommendations

Trust integrated cooperation architecture for mobile ad-hoc networks

Balakrishnan, V., Varadharajan, V., Tupakula, U. & Lucs, P., 2007, Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS. Patzold, M., Jiang, Y. & Zhang, Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 592-596 5 p. 4392409

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Mobile ad hoc networks
trustworthiness
Routing protocols
obligation
communications
2006

Analysis of Traceback Techniques

Tupakula, U. K. & Varadharajan, V., 2006, ACSW Frontiers 2006 - Proc. of the Fourth Australasian Symposium on Grid Computing and e-Research, AusGrid 2006 and the Fourth Australasian Information Security Workshop (Network Security), AISW 2006. Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C. & Susilo, W. (eds.). Sydney, Australia: Australian Computer Society, Vol. 54. p. 115-124 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Internet
Denial-of-service attack
Industry