Vijay Varadharajan

Professor

  • 3417 Citations
  • 28 h-Index
1983 …2019
If you made any changes in Pure these will be visible here soon.

Research Outputs 1983 2019

Filter
Conference proceeding contribution
2019

Modeling identity for the Internet of Things: survey, classification and trends

Pal, S., Hitchens, M. & Varadharajan, V., 4 Jan 2019, 2018 12th International Conference on Sensing Technology, ICST 2018. Institute of Electrical and Electronics Engineers (IEEE), Vol. 2018-December. p. 45-51 7 p. 8603595

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Internet of things
Systems analysis
Communication
2018

Learning latent byte-level feature representation for malware detection

Yousefi-Azar, M., Hamey, L., Varadharajan, V. & Chen, S., 16 Dec 2018, Neural Information Processing: 25th International Conference, ICONIP 2018, Proceedings, Part IV. Cheng, L., Leung, A. C. S. & Ozawa, S. (eds.). Switzerland: Springer-VDI-Verlag GmbH & Co. KG, p. 568-578 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11304 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Malware
Binary
Application programs
N-gram
Classifiers

Policy-based access control for constrained healthcare resources

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p. 8449813

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Internet of things
2017

An Eclat algorithm based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1096-1102 7 p. 8029561

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Fusion reactions
Decision making
Energy
Attack

An efficient and provably secure RFID grouping proof protocol

Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York, NY: Association for Computing Machinery, p. 1-7 7 p. a71

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Radio frequency identification (RFID)
Costs

A trust model based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York: Association for Computing Machinery, p. 1-8 8 p. 68

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio

Autoencoder-based feature learning for cyber security applications

Yousefiazar, M., Varadharajan, V., Hamey, L. & Tupakula, U., 30 Jun 2017, International Joint Conference on Neural Networks. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 3854-3861 8 p. 7966342

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Semantics
Classifiers
Data storage equipment
Malware

Efficient approaches for intrusion detection in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 10 Jan 2017, Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Astya, P. N., Swaroop, A., Sharma, V. & Singh, M. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 1211-1216 6 p. 7813926

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Intrusion Detection
Computer worms
Computer viruses
Learning systems

Fast, automatic and scalable learning to detect android malware

Yousefi-Azar, M., Hamey, L., Varadharajan, V. & McDonnell, M. D., 2017, Neural Information Processing: 24th International Conference, ICONIP 2017, Guangzhou, China, November 14–18, 2017. Proceedings, Part V. Liu, D., Xie, S., Li, Y., Zhao, D. & El-Alfy, E-S. M. (eds.). Springer, Springer Nature, p. 848-857 10 p. (Lecture Notes in Computer Science; vol. 10638).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Malware
Extreme Learning Machine
Learning systems
Shape Representation
Image Representation

Mitigating attacks in Software Defined Network (SDN)

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 5 Jun 2017, SDS 2017: Fourth International Conference on Software Defined Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 112-117 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Attack
Software
Open source software

On design of a fine-grained access control architecture for securing iot-enabled smart healthcare systems

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 7 Nov 2017, MobiQuitous 2017 Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. New York: Association for Computing Machinery (ACM), p. 432-441 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Authentication
Health
Internet of things
Sensors

On the design of security mechanisms for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 2017, 2017 Eleventh International Conference on Sensing Technology (ICST): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 286-291 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Security systems
Internet of things
Communication

Out-VM monitoring for Malicious Network Packet Detection in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 12 Jul 2017, ISEASP 2017: Proceedings of the 2017 ISEA Asia Security and Privacy Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Packet networks
Monitoring
Servers
Feature extraction
Virtual machine

Secure monitoring of the patients with wandering behaviour

Tupakula, U., Varadharajan, V. & Karmakar, K., 24 Apr 2017, 11th International Conference on Body Area Networks: BODYNETS 2016. Red Hook, NY: ACM, p. 111-117 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Controllers
Wireless local area networks (WLAN)
Health care
Local area networks

Securing communication in multiple Autonomous System domains with Software Defined Networking

Varadharajan, V., Karmakar, K. K. & Tupakula, U., 20 Jul 2017, Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 195-203 9 p. 7987280

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Communication
Telecommunication networks
Specifications
Controllers
Software defined networking

Towards a secure access control Architecture for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 14 Nov 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN 2017): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 219-222 4 p. 8109357

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Internet of things
2016

A Secure keyword ordered multiuser searchable encryption framework

Kaushik, K. & Varadharajan, V., 2016, Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R. & Alcaraz Calero, J. M. (eds.). Singapore: Springer, Springer Nature, p. 99-111 13 p. (Communications in Computer and Information Science; vol. 625).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Storage as a service (STaaS)
Outsourcing
Cloud computing
Information management

Cascading attacks against smart grid using control command disaggregation and services

Min, B. & Varadharajan, V., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 2142-2147 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Feedback

Integrated security for services hosted in virtual environments

Jayarathna, D., Varadharajan, V. & Tupakula, U., 2016, IEEE TrustCom/BigDataSE/ISPA 2016: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 82-89 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Intrusion detection
Access control
Virtual reality

NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment

Mishra, P., Pilli, E. S., Varadharajant, V. & Tupakula, U., 2 Nov 2016, 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016. Wu, J., Martinez Perez, G., Thampi, S. M., Atiquzzaman, M., Berretti, S., Rodrigues, J. J. C. P., Tomar, R., Gorthi, R. P., Siarry, P., Khan Pathan, A-S., Li, J., Bedi, P., Mehta, S., Kammoun, M. H. & Jain, V. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 56-62 7 p. 7732025

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cloud computing
Servers
Learning systems
Data storage equipment
Virtual machine

On the design and implementation of a security architecture for end to end services in software defined networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 22 Dec 2016, LCN 2016 : IEEE 41st Conference On Local Computer Networks: proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 519-522 4 p. 7796830

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Communication
Software defined networking

On the design and implementation of a security architecture for Software Defined Networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 671-678 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Policy based security architecture for software defined networks

Karmakar, K. K., Varadharajan, V., Tupakula, U. & Hitchens, M., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 658-663 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Securing Big Data Environments from Attacks

Tupakula, U. & Varadharajan, V., 30 Jun 2016, Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016. Qiu, M. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 109-112 4 p. 7502273

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Monitoring
Big data
Virtual machine
Botnet
Data sources

Securing virtual machines from anomalies using program-behavior analysis in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the Eighteenth IEEE International Conference on High Performance Computing and Communications, the Fourteenth IEEE International Conference on Smart City, the Second IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 991-998 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer worms
Computer viruses
Cloud computing
Decision trees
Learning systems

Trust enhanced secure role-based access control on encrypted data in cloud (abstract of keynote talk)

Varadharajan, V., 2016, Trust management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Proceedings. Habib, S. M., Mauw, S., Vassileva, J. & Mühlhäuser, M. (eds.). Switzerland: Springer, Springer Nature, Vol. 473. p. ix-ix 1 p. (IFIP Advances in Information and Communication Technology; vol. 473).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearch

Role-based access control
Owners
Encryption
Managers
Trust model
2015

An enhanced model for network flow based botnet detection

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 101-110 10 p. (Conferences in Research and Practice in Information Technology; vol. 159).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

HTTP
Botnet
Specifications
Network protocols

A new extension of kernel principal component analysis for finger vein authentication

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 59-63 5 p. (Conferences in Research and Practice in Information Technology - CRPIT).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Principal component analysis
Authentication
Experiments

Anonymous yoking-group proofs

Li, N., Mu, Y., Susilo, W. & Varadharajan, V., Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York: Association for Computing Machinery, p. 615-620 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Radio frequency identification (RFID)

A simple and novel technique for counteracting exploit kits

Min, B. & Varadharajan, V., 2015, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Tian, J., Jing, J. & Srivatsa, M. (eds.). Cham: Springer, Springer Nature, Vol. 152. p. 259-277 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 152).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Web browsers
Websites
Internet

Botnet detection using software defined networking

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 16 Jun 2015, 2015 22nd International Conference on Telecommunications, ICT 2015. New York, NY: Institute of Electrical and Electronics Engineers (IEEE), p. 219-224 6 p. 7124686

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

networking
HTTP
Controllers
Network management
Computer networks

Design, implementation and evaluation of a novel anti-virus parasitic malware

Min, B. & Varadharajan, V., Apr 2015, Proceedings of the 30th Annual ACM Symposium on Applied Computing. New York: ACM, p. 2127-2133 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer viruses
Viruses
Malware

Design and analysis of a sophisticated malware attack against smart grid

Min, B. & Varadharajan, V., 2015, Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Desmedt, Y. (ed.). Cham: Springer, Springer Nature, p. 130-139 10 p. (Lecture Notes in Computer Science; vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Smart Grid
Malware
Attack
Computer hardware
Infrastructure

Design and evaluation of feature distributed malware attacks against the Internet of Things (IoT)

Min, B. & Varadharajan, V., 2015, Proceedings - 2015 20th International Conference on Engineering of Complex Computer Systems, ICECCS 2015. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), Vol. 2016-January. p. 80-89 10 p. 7384232

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Internet
Domestic appliances
Network protocols
Monitoring
Internet of things

Dynamic workload balancing for hadoop MapReduce

Hou, X., Kumar, A. T. K., Thomas, J. P. & Varadharajan, V., 5 Feb 2015, Proceedings - 4th IEEE International Conference on Big Data and Cloud Computing, BDCloud 2014 with the 7th IEEE International Conference on Social Computing and Networking, SocialCom 2014 and the 4th International Conference on Sustainable Computing and Communications, SustainCom 2014. Chen, J. & Yang, L. T. (eds.). Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 56-62 7 p. 7034766

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Processing

Hypervisor-based security architecture to protect web applications

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 13th Australasian Information Security Conference, AISC 2015. Ian, W. & Yi, X. (eds.). Sydney: Australian Computer Society, Vol. 161. p. 15-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Web browsers
Visibility
World Wide Web
Websites
Virtual machine

Improved detection of primary user emulation attacks in cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., Nov 2015, 25th International Telecommunication Networks and Applications Conference, ITNAC 2015. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 274-279 6 p. 7366825

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cognitive radio
Mobile devices
Electron energy levels
Communication

Provenance based classification access policy system based on encrypted search for cloud data storage

Fan, X., Varadharajan, V. & Hitchens, M., 2015, Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings. Lopez, J. & Mitchell, C. J. (eds.). Cham: Springer, Springer Nature, p. 283-298 16 p. (Lecture Notes in Computer Science; vol. 9290).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Provenance
Data Storage
Access control
Semantics
Data storage equipment

Secure dynamic software loading and execution using cross component verification

Min, B. & Varadharajan, V., 14 Sep 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 113-124 12 p. 7266843

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Electronic document identification systems
Malware
Linux
2014

A new technique for counteracting web browser exploits

Min, B. & Varadharajan, V., 2014, ASWEC 2014: 23rd Australian Software Engineering Conference : proceedings : 7-10 April 2014, Sydney, New South Wales, Australia. Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), p. 132-141 10 p. 6824118

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Web browsers
Websites
Internet
Communication

Design and analysis of a new feature-distributed malware

Min, B. & Varadharajan, V., 2014, Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 457-464 8 p. 7011282

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer viruses
Viruses
Malware

Design and analysis of security attacks against critical smart grid infrastructures

Min, B. & Varadharajan, V., 13 Oct 2014, ICECCS 2014: Proceedings of the 19th International Conference on Engineering of Complex Computer Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 59-68 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Energy efficiency
Cyber Physical System
Malware

Effective kernel mapping for one-dimensional Principal Component Analysis in finger vein recognition

Damavandinejadmonfared, S. & Varadharajan, V., 2014, IPCV'14: the 2014 International Conference on Image Processing, Computer Vision, and Pattern Recognition. United States: World Academy of Science, 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Principal component analysis
Face recognition
Entropy
Polynomials
Experiments

Feature-distributed malware attack: risk and defence

Min, B. & Varadharajan, V., 2014, Computer security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings : Part II. Kutyłowski, M. & Vaidya, J. (eds.). Cham: Springer, Springer Nature, p. 457-474 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Malware
Attack
Software Components
Certificate
Viruses

Finger vein recognition in row and column directions using Two Dimensional Kernel Principal Component Analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2014, IPCV'14: the 2014 International Conference on Image Processing, Computer Vision, and Pattern Recognition. United States: World Academy of Science, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Principal component analysis
Identification (control systems)
Experiments

Hypervisor-based security architecture for validating DNS services (Poster)

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 83-86 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Computer monitors
Monitoring
Visibility
Internet
Network protocols

Practical k nearest neighbor queries with location privacy

Yi, X., Paulet, R., Bertino, E. & Varadharajan, V., 2014, 2014 IEEE 30th International Conference on Data Engineering, ICDE 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 640-651 12 p. (International Conference on Data Engineering Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Location based services
Data privacy
Communication
Cryptography
Railroad cars

Privacy-Preserving authorized RFID authentication protocols

Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V., 2014, Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers. Saxena, N. & Sadeghi, A-R. (eds.). Switzerland: Springer, Springer Nature, Vol. 8651. p. 108-122 15 p. (Lecture Notes in Computer Science; vol. 8651).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Authentication Protocol
Privacy Preserving
Radio Frequency Identification
Radio frequency identification (RFID)
Authentication

Secure monitoring for dementia patients

Tupakula, U. & Varadharajan, V., 2014, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. New York: Association for Computing Machinery, p. 14-19 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Nursing
Monitoring
Costs

Techniques for detecting attacks on critical infrastructure

Tupakula, U. & Varadharajan, V., 2014, 2014 International Conference on Computing, Networking and Communications, ICNC 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 48-52 5 p. 6785303

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Critical infrastructures
Hardware
Communication