Vijay Varadharajan

Professor

  • 3212 Citations
  • 28 h-Index
1983 …2019
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Vijay Varadharajan is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 3 Similar Profiles
Access control Engineering & Materials Science
Authorization Mathematics
Authentication Engineering & Materials Science
Mobile agents Engineering & Materials Science
Cryptography Engineering & Materials Science
Internet Engineering & Materials Science
Network protocols Engineering & Materials Science
Mobile ad hoc networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2005 2019

Cloud Security: Techniques for Securing Cloud Data and Services

Varadharajan, V., MQRES, M. & PhD Contribution (ARC), P. C. (.

1/01/14 → …

Project: Research

money

CSIRO Postgraduate scholarship (Kallol Karmakar)

Varadharajan, V. & Karmakar, K.

1/01/167/06/17

Project: Research

Test-bed for Wide-Area Software Defined Networking Research and Experimentation

Varadharajan, V., Sivaraman, V., Roughan, M., Abolhasan, M., But, J., Russell, C., Moors, T., Safaei, F., Portmann, M., Liang, W., Gregory, M., Jha, S., Nguyen, H., Taubman, D., Falkner, N., Mao, G., Braun, R., Armitage, G., Tupakula, U., Indulska, J., Strazdins, P. & Raad, R.

27/03/1530/03/18

Project: Research

Research Outputs 1983 2019

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticleResearchpeer-review

Switches
Controllers
Network security
Communication
Specifications

Modeling identity for the Internet of Things: survey, classification and trends

Pal, S., Hitchens, M. & Varadharajan, V., 4 Jan 2019, 2018 12th International Conference on Sensing Technology, ICST 2018. Institute of Electrical and Electronics Engineers (IEEE), Vol. 2018-December. p. 45-51 7 p. 8603595

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Internet of things
Systems analysis
Communication
Access control
Smart sensors
Internet of things

Learning latent byte-level feature representation for malware detection

Yousefi-Azar, M., Hamey, L., Varadharajan, V. & Chen, S., 16 Dec 2018, Neural Information Processing: 25th International Conference, ICONIP 2018, Proceedings, Part IV. Cheng, L., Leung, A. C. S. & Ozawa, S. (eds.). Switzerland: Springer-VDI-Verlag GmbH & Co. KG, p. 568-578 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11304 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Malware
Binary
Application programs
N-gram
Classifiers

Malytics: a malware detection scheme

Yousefi-Azar, M., Hamey, L. G. C., Varadharajan, V. & Chen, S., 28 Sep 2018, In : IEEE Access. 6, p. 49418-49431 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Feature extraction
Neural networks
Mobile devices
Malware