Vijay Varadharajan

Professor

  • 3402 Citations
  • 28 h-Index
1983 …2019
If you made any changes in Pure these will be visible here soon.

Research Outputs 1983 2019

2019

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticleResearchpeer-review

Switches
Controllers
Network security
Communication
Specifications

Modeling identity for the Internet of Things: survey, classification and trends

Pal, S., Hitchens, M. & Varadharajan, V., 4 Jan 2019, 2018 12th International Conference on Sensing Technology, ICST 2018. Institute of Electrical and Electronics Engineers (IEEE), Vol. 2018-December. p. 45-51 7 p. 8603595

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Internet of things
Systems analysis
Communication

Policy-based access control for constrained healthcare resources in the context of the Internet of Things

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 1 Aug 2019, In : Journal of Network and Computer Applications. 139, p. 57-74 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Smart sensors
Internet of things
2018

Learning latent byte-level feature representation for malware detection

Yousefi-Azar, M., Hamey, L., Varadharajan, V. & Chen, S., 16 Dec 2018, Neural Information Processing: 25th International Conference, ICONIP 2018, Proceedings, Part IV. Cheng, L., Leung, A. C. S. & Ozawa, S. (eds.). Switzerland: Springer-VDI-Verlag GmbH & Co. KG, p. 568-578 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11304 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Malware
Binary
Application programs
N-gram
Classifiers

Malytics: a malware detection scheme

Yousefi-Azar, M., Hamey, L. G. C., Varadharajan, V. & Chen, S., 28 Sep 2018, In : IEEE Access. 6, p. 49418-49431 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Feature extraction
Neural networks
Mobile devices
Malware

Policy-based access control for constrained healthcare resources

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p. 8449813

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Internet of things

Securing services in networked cloud infrastructures

Varadharajan, V. & Tupakula, U., 1 Oct 2018, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1149-1163 15 p., 7473937.

Research output: Contribution to journalArticleResearchpeer-review

Restoration
Virtual machine
Servers
Communication
2017

An Eclat algorithm based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1096-1102 7 p. 8029561

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Fusion reactions
Decision making
Energy
Attack

An efficient and provably secure RFID grouping proof protocol

Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York, NY: Association for Computing Machinery, p. 1-7 7 p. a71

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Radio frequency identification (RFID)
Costs

A trust model based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York: Association for Computing Machinery, p. 1-8 8 p. 68

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio

Autoencoder-based feature learning for cyber security applications

Yousefiazar, M., Varadharajan, V., Hamey, L. & Tupakula, U., 30 Jun 2017, International Joint Conference on Neural Networks. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 3854-3861 8 p. 7966342

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Semantics
Classifiers
Data storage equipment
Malware

Cryptography and data security in cloud computing

Yan, Z., Deng, R. H. & Varadharajan, V., 1 May 2017, In : Information Sciences. 387, p. 53-55 3 p.

Research output: Contribution to journalEditorialResearchpeer-review

Efficient approaches for intrusion detection in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 10 Jan 2017, Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Astya, P. N., Swaroop, A., Sharma, V. & Singh, M. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 1211-1216 6 p. 7813926

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Intrusion Detection
Computer worms
Computer viruses
Learning systems

Fast, automatic and scalable learning to detect android malware

Yousefi-Azar, M., Hamey, L., Varadharajan, V. & McDonnell, M. D., 2017, Neural Information Processing: 24th International Conference, ICONIP 2017, Guangzhou, China, November 14–18, 2017. Proceedings, Part V. Liu, D., Xie, S., Li, Y., Zhao, D. & El-Alfy, E-S. M. (eds.). Springer, Springer Nature, p. 848-857 10 p. (Lecture Notes in Computer Science; vol. 10638).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Malware
Extreme Learning Machine
Learning systems
Shape Representation
Image Representation

Intrusion detection techniques in cloud environment: a survey

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 1 Jan 2017, In : Journal of Network and Computer Applications. 77, p. 18-47 30 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Taxonomies
Cloud computing
Computer hardware
Virtual machine

Mitigating attacks in Software Defined Network (SDN)

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 5 Jun 2017, SDS 2017: Fourth International Conference on Software Defined Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 112-117 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Attack
Software
Open source software

On design of a fine-grained access control architecture for securing iot-enabled smart healthcare systems

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 7 Nov 2017, MobiQuitous 2017 Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. New York: Association for Computing Machinery (ACM), p. 432-441 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Authentication
Health
Internet of things
Sensors

On the design and implementation of an integrated security architecture for cloud with improved resilience

Varadharajan, V. & Tupakula, U., 1 Jul 2017, In : IEEE Transactions on Cloud Computing. 5, 3, p. 375-389 15 p., 7420656.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Access control
Servers
Life cycle
Feedback

On the design of security mechanisms for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 2017, 2017 Eleventh International Conference on Sensing Technology (ICST): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 286-291 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Security systems
Internet of things
Communication

Optimized identity-based encryption from bilinear pairing for lightweight devices

Guo, F., Mu, Y., Susilo, W., Hsing, H., Wong, D. S. & Varadharajan, V., 1 Mar 2017, In : IEEE Transactions on Dependable and Secure Computing. 14, 2, p. 211-220 10 p., 7123602.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Hardware
Smart cards
Random access storage
Radio frequency identification (RFID)

Out-VM monitoring for Malicious Network Packet Detection in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 12 Jul 2017, ISEASP 2017: Proceedings of the 2017 ISEA Asia Security and Privacy Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Packet networks
Monitoring
Servers
Feature extraction
Virtual machine

Privacy-preserving mutual authentication in RFID with designated readers

Guo, F., Mu, Y., Susilo, W. & Varadharajan, V., Oct 2017, In : Wireless Personal Communications. 96, 3, p. 4819-4845 27 p.

Research output: Contribution to journalArticleResearchpeer-review

Radio frequency identification (RFID)
Authentication
Network protocols
Servers

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2017, In : Journal of Intelligent and Fuzzy Systems. 32, 4, p. 2909-2921 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Virtual Machine
Intrusion detection
Intrusion Detection
Semantics
Attack

Secure monitoring of the patients with wandering behaviour

Tupakula, U., Varadharajan, V. & Karmakar, K., 24 Apr 2017, 11th International Conference on Body Area Networks: BODYNETS 2016. Red Hook, NY: ACM, p. 111-117 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Controllers
Wireless local area networks (WLAN)
Health care
Local area networks

Securing communication in multiple Autonomous System domains with Software Defined Networking

Varadharajan, V., Karmakar, K. K. & Tupakula, U., 20 Jul 2017, Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 195-203 9 p. 7987280

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Communication
Telecommunication networks
Specifications
Controllers
Software defined networking

Towards a secure access control Architecture for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 14 Nov 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN 2017): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 219-222 4 p. 8109357

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Internet of things

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 25 Jun 2017, In : Concurrency Computation. 29, 12, p. 1-21 21 p., e4133.

Research output: Contribution to journalArticleResearchpeer-review

Malware
Infrastructure
Virtualization
Computer monitors
Dependency Graph
2016

A novel malware for subversion of self-protection in anti-virus

Min, B. & Varadharajan, V., 1 Mar 2016, In : Software - Practice and Experience. 46, 3, p. 361-379 19 p.

Research output: Contribution to journalArticleResearchpeer-review

Computer viruses
Viruses
Malware

A Secure keyword ordered multiuser searchable encryption framework

Kaushik, K. & Varadharajan, V., 2016, Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R. & Alcaraz Calero, J. M. (eds.). Singapore: Springer, Springer Nature, p. 99-111 13 p. (Communications in Computer and Information Science; vol. 625).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Storage as a service (STaaS)
Outsourcing
Cloud computing
Information management

A secure role-based cloud storage system for encrypted patient-centric health records

Zhou, L., Varadharajan, V. & Gopinath, K., 3 Nov 2016, In : Computer Journal. 59, 11, p. 1593-1611 19 p.

Research output: Contribution to journalArticleResearchpeer-review

Health
Access control
Electronic scales
Data storage equipment
Security of data

Cascading attacks against smart grid using control command disaggregation and services

Min, B. & Varadharajan, V., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 2142-2147 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Feedback

Integrated security for services hosted in virtual environments

Jayarathna, D., Varadharajan, V. & Tupakula, U., 2016, IEEE TrustCom/BigDataSE/ISPA 2016: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 82-89 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Access control
Virtual reality

NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment

Mishra, P., Pilli, E. S., Varadharajant, V. & Tupakula, U., 2 Nov 2016, 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016. Wu, J., Martinez Perez, G., Thampi, S. M., Atiquzzaman, M., Berretti, S., Rodrigues, J. J. C. P., Tomar, R., Gorthi, R. P., Siarry, P., Khan Pathan, A-S., Li, J., Bedi, P., Mehta, S., Kammoun, M. H. & Jain, V. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 56-62 7 p. 7732025

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cloud computing
Servers
Learning systems
Data storage equipment
Virtual machine

On the design and implementation of a security architecture for end to end services in software defined networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 22 Dec 2016, LCN 2016 : IEEE 41st Conference On Local Computer Networks: proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 519-522 4 p. 7796830

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Software defined networking

On the design and implementation of a security architecture for Software Defined Networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 671-678 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Policy based security architecture for software defined networks

Karmakar, K. K., Varadharajan, V., Tupakula, U. & Hitchens, M., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 658-663 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Practical approximate k nearest neighbor queries with location and query privacy

Yi, X., Paulet, R., Bertino, E. & Varadharajan, V., 1 Jun 2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 6, p. 1546-1559 14 p., 7389401.

Research output: Contribution to journalArticleResearchpeer-review

Location based services
Cryptography
Railroad cars
Communication
Experiments

Rethinking software component security: software component level integrity and cross verification

Min, B. & Varadharajan, V., 3 Nov 2016, In : Computer Journal. 59, 11, p. 1735-1748 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Web browsers
Malware

Securing Big Data Environments from Attacks

Tupakula, U. & Varadharajan, V., 30 Jun 2016, Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016. Qiu, M. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 109-112 4 p. 7502273

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Big data
Virtual machine
Botnet
Data sources

Securing virtual machines from anomalies using program-behavior analysis in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the Eighteenth IEEE International Conference on High Performance Computing and Communications, the Fourteenth IEEE International Conference on Smart City, the Second IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 991-998 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer worms
Computer viruses
Cloud computing
Decision trees
Learning systems

Trust enhanced secure role-based access control on encrypted data in cloud (abstract of keynote talk)

Varadharajan, V., 2016, Trust management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Proceedings. Habib, S. M., Mauw, S., Vassileva, J. & Mühlhäuser, M. (eds.). Switzerland: Springer, Springer Nature, Vol. 473. p. ix-ix 1 p. (IFIP Advances in Information and Communication Technology; vol. 473).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearch

Role-based access control
Owners
Encryption
Managers
Trust model
2015

An enhanced model for network flow based botnet detection

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 101-110 10 p. (Conferences in Research and Practice in Information Technology; vol. 159).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

HTTP
Botnet
Specifications
Network protocols

A new extension of kernel principal component analysis for finger vein authentication

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 59-63 5 p. (Conferences in Research and Practice in Information Technology - CRPIT).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Principal component analysis
Authentication
Experiments

A new extension to kernel entropy component analysis for image-based authentication systems

Damavandinejadmonfared, S. & Varadharajan, V., 1 Aug 2015, In : Journal of WSCG. 23, 1, p. 1-8 8 p.

Research output: Contribution to journalArticleResearchpeer-review

Authentication
Entropy
kernel
Principal component analysis
Principal Component Analysis

Anonymous yoking-group proofs

Li, N., Mu, Y., Susilo, W. & Varadharajan, V., Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York: Association for Computing Machinery, p. 615-620 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Radio frequency identification (RFID)

A simple and novel technique for counteracting exploit kits

Min, B. & Varadharajan, V., 2015, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Tian, J., Jing, J. & Srivatsa, M. (eds.). Cham: Springer, Springer Nature, Vol. 152. p. 259-277 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 152).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Web browsers
Websites
Internet

A stochastic time-domain model for burst data aggregation in IEEE 802.15.4 wireless sensor networks

Haghighi, M. S., Xiang, Y., Varadharajan, V. & Quinn, B. G., 1 Mar 2015, In : IEEE Transactions on Computers. 64, 3, p. 627-639 13 p., 6698362.

Research output: Contribution to journalArticleResearchpeer-review

IEEE 802.15.4
Data Aggregation
Domain Model
Burst
Wireless Sensor Networks

Biometric analysis for finger vein data: two-dimensional kernel principal component analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging Trends in Image Processing, Computer Vision and Pattern Recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 393-405 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Biometrics
Principal component analysis
Identification (control systems)
Experiments

Botnet detection using software defined networking

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 16 Jun 2015, 2015 22nd International Conference on Telecommunications, ICT 2015. New York, NY: Institute of Electrical and Electronics Engineers (IEEE), p. 219-224 6 p. 7124686

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

networking
HTTP
Controllers
Network management
Computer networks

Design, implementation and evaluation of a novel anti-virus parasitic malware

Min, B. & Varadharajan, V., Apr 2015, Proceedings of the 30th Annual ACM Symposium on Applied Computing. New York: ACM, p. 2127-2133 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer viruses
Viruses
Malware