Vijay Varadharajan

Professor

  • 2978 Citations
  • 27 h-Index
1983 …2019
If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 4 Similar Profiles
Access control Engineering & Materials Science
Authorization Mathematics
Authentication Engineering & Materials Science
Mobile agents Engineering & Materials Science
Cryptography Engineering & Materials Science
Internet Engineering & Materials Science
Network protocols Engineering & Materials Science
Mobile ad hoc networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2005 2019

Cloud Security: Techniques for Securing Cloud Data and Services

Varadharajan, V., MQRES, M. & PhD Contribution (ARC), P. C. (.

1/01/14 → …

Project: Research

money

CSIRO Postgraduate scholarship (Kallol Karmakar)

Varadharajan, V. & Karmakar, K.

1/01/167/06/17

Project: Research

Test-bed for Wide-Area Software Defined Networking Research and Experimentation

Varadharajan, V., Sivaraman, V., Roughan, M., Abolhasan, M., But, J., Russell, C., Moors, T., Safaei, F., Portmann, M., Liang, W., Gregory, M., Jha, S., Nguyen, H., Taubman, D., Falkner, N., Mao, G., Braun, R., Armitage, G., Tupakula, U., Indulska, J., Strazdins, P. & Raad, R.

27/03/1530/03/18

Project: Research

Research Output 1983 2019

A policy based security architecture for Software Defined Networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., 30 Aug 2018, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Switches
Controllers
Network security
Communication
Specifications

Learning latent byte-level feature representation for malware detection

Yousefi-Azar, M., Hamey, L., Varadharajan, V. & Chen, S., 16 Dec 2018, Neural Information Processing: 25th International Conference, ICONIP 2018, Proceedings, Part IV. Cheng, L., Leung, A. C. S. & Ozawa, S. (eds.). Switzerland: Springer-VDI-Verlag GmbH & Co. KG, p. 568-578 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11304 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Malware
Binary
Application programs
N-gram
Classifiers

Malytics: a malware detection scheme

Yousefi-Azar, M., Hamey, L. G. C., Varadharajan, V. & Chen, S., 28 Sep 2018, In : IEEE Access. 6, p. 49418-49431 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Feature extraction
Neural networks
Mobile devices
Malware

Policy-based access control for constrained healthcare resources

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p. 8449813

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Internet of things

An Eclat algorithm based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1096-1102 7 p. 8029561

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Fusion reactions
Decision making
Energy
Attack