Find Research Outputs

Search in all content

Filters for Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Vijay Varadharajan

Achieving secure role-based access control on encrypted data in cloud storage

Zhou, L., Varadharajan, V. & Hitchens, M., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 1947-1960 14 p., 6642048.

Research output: Contribution to journalArticle

121 Citations (Scopus)

A framework for evaluating trust of service providers in cloud marketplaces

Habib, S. M., Varadharajan, V. & Mühlhäuser, M., 2013, 28th Annual ACM Symposium on Applied Computing, (SAC 2013). New York: Association for Computing Machinery (ACM), p. 1963-1965 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

12 Citations (Scopus)

A hybrid trust model for authorisation using trusted platforms

Krishna, A. & Varadharajan, V., 2011, TrustCom 2011: 2011 international joint conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11: 16-18 November 2011, Changsha, Hunan, P. R. China. Wang, G., Tate, S. R., Chen, J-J. & Sakurai, K. (eds.). Los Alamitos, Calif: Institute of Electrical and Electronics Engineers (IEEE), p. 288-295 8 p. 6120831

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

5 Citations (Scopus)

Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks

Haghighi, M. S., Mohamed-Pour, K. & Varadharajan, V., 2011, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, LCN 2011. Pfeifer, T., Jayasumana, A. & Aschenbruck, N. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 117-122 6 p. 6115166

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

An Eclat algorithm based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1096-1102 7 p. 8029561

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

An efficient and provably secure RFID grouping proof protocol

Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York, NY: Association for Computing Machinery, p. 1-7 7 p. a71

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

8 Citations (Scopus)

An enhanced model for network flow based botnet detection

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 101-110 10 p. (Conferences in Research and Practice in Information Technology; vol. 159).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

A new extension of kernel principal component analysis for finger vein authentication

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 59-63 5 p. (Conferences in Research and Practice in Information Technology - CRPIT).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

A new extension to kernel entropy component analysis for image-based authentication systems

Damavandinejadmonfared, S. & Varadharajan, V., 1 Aug 2015, In : Journal of WSCG. 23, 1, p. 1-8 8 p.

Research output: Contribution to journalArticle

A New improved scheme for face recognition analysis: two dimensional kernel entropy component

Damavandinejadmonfared, S. & Varadharajan, V., 2013, p. 87. 1 p.

Research output: Contribution to conferencePoster

A new technique for counteracting web browser exploits

Min, B. & Varadharajan, V., 2014, ASWEC 2014: 23rd Australian Software Engineering Conference : proceedings : 7-10 April 2014, Sydney, New South Wales, Australia. Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), p. 132-141 10 p. 6824118

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Anonymous yoking-group proofs

Li, N., Mu, Y., Susilo, W. & Varadharajan, V., Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York: Association for Computing Machinery, p. 615-620 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

A novel malware for subversion of self-protection in anti-virus

Min, B. & Varadharajan, V., 1 Mar 2016, In : Software - Practice and Experience. 46, 3, p. 361-379 19 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Antivirus security: Naked during updates

Min, B., Varadharajan, V., Tupakula, U. & Hitchens, M., 2014, In : Software - Practice and Experience. 44, 10, p. 1201-1222 22 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticle

16 Citations (Scopus)

A pre-computable signature scheme with efficient verification for RFID

Guo, F., Mu, Y., Susilo, W. & Varadharajan, V., 2012, Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Proceedings. Ryan, M. D., Smyth, B. & Wang, G. (eds.). Heidelberg: Springer, Springer Nature, Vol. 7232. p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7232 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

A secure elliptic curve based RFID ownership transfer scheme with controlled delegation

Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W., 2013, Radio Frequency Identification System Security: RFIDsec'13 Asia Workshop Proceedings. Ma, C. & Weng, J. (eds.). Amsterdam: IOS Press, Vol. 11. p. 31-43 13 p. (Cryptology and Information Security Series; vol. 11).

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

A Secure keyword ordered multiuser searchable encryption framework

Kaushik, K. & Varadharajan, V., 2016, Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R. & Alcaraz Calero, J. M. (eds.). Singapore: Springer, Springer Nature, p. 99-111 13 p. (Communications in Computer and Information Science; vol. 625).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

A secure role-based cloud storage system for encrypted patient-centric health records

Zhou, L., Varadharajan, V. & Gopinath, K., 3 Nov 2016, In : Computer Journal. 59, 11, p. 1593-1611 19 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

A simple and novel technique for counteracting exploit kits

Min, B. & Varadharajan, V., 2015, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Tian, J., Jing, J. & Srivatsa, M. (eds.). Cham: Springer, Springer Nature, Vol. 152. p. 259-277 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 152).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

A stochastic time-domain model for burst data aggregation in IEEE 802.15.4 wireless sensor networks

Haghighi, M. S., Xiang, Y., Varadharajan, V. & Quinn, B. G., 1 Mar 2015, In : IEEE Transactions on Computers. 64, 3, p. 627-639 13 p., 6698362.

Research output: Contribution to journalArticle

7 Citations (Scopus)

A trust-aware framework for evaluating security controls of service providers in cloud marketplaces

Habib, S. M., Varadharajan, V. & Mühlhäuser, M., 2013, TrustCom 2013: TrustCom 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications : proceedings : 16-18 July 2013, Melbourne, Victoria, Australia. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 459-468 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

19 Citations (Scopus)

A trust management framework for secure cloud data storage using cryptographic role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, E-Business and Telecommunications: International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013 Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 226-251 26 p. (Communications in Computer and Information Science; vol. 456).

Research output: Chapter in Book/Report/Conference proceedingChapter

A trust model based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York: Association for Computing Machinery, p. 1-8 8 p. 68

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Autoencoder-based feature learning for cyber security applications

Yousefiazar, M., Varadharajan, V., Hamey, L. & Tupakula, U., 30 Jun 2017, International Joint Conference on Neural Networks. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 3854-3861 8 p. 7966342

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

62 Citations (Scopus)

Biometric analysis for finger vein data: two-dimensional kernel principal component analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging Trends in Image Processing, Computer Vision and Pattern Recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 393-405 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Botnet detection using software defined networking

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, 2015 22nd International Conference on Telecommunications, ICT 2015. New York, NY: Institute of Electrical and Electronics Engineers (IEEE), p. 219-224 6 p. 7124686

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)

Cascading attacks against smart grid using control command disaggregation and services

Min, B. & Varadharajan, V., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 2142-2147 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

CertainLogic: A logic for modeling trust and uncertainty

Ries, S., Habib, S. M., Mühlhäuser, M. & Varadharajan, V., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. McCune, J. M., Balacheff, B., Perrig, A., Sadeghi, A-R., Sasse, A. & Beres, Y. (eds.). Heidelberg, Germany: Springer, Springer Nature, Vol. 6740 LNCS. p. 254-261 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

29 Citations (Scopus)

Coordination based distributed authorization for business processes in service oriented architectures

Indrakanti, S. & Varadharajan, V., 2011, International Conference on Internet and Web Applications and Services: ICIW 2011 ; St. Maarten, The Netherlands, 20 - 25 March 2011. Matskin, M., Perry, M. & Mahmood, Z. (eds.). ThinkMind, p. 188-194 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Counteracting DDoS attacks in WLAN

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings of the 4th International Conference on Security of Information and Networks. New York: Association for Computing Machinery, p. 119-126 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

18 Citations (Scopus)

CP-ABE with constant-size keys for lightweight devices

Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V., May 2014, In : IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771 9 p., 6757025.

Research output: Contribution to journalArticle

75 Citations (Scopus)

Cryptographic role-based access control for secure cloud data storage systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, Security, Privacy and Trust in Cloud Systems. Nepal, S. & Pathan, M. (eds.). Heidelberg: Springer, Springer Nature, p. 313-344 32 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Cryptography and data security in cloud computing

Yan, Z., Deng, R. H. & Varadharajan, V., 1 May 2017, In : Information Sciences. 387, p. 53-55 3 p.

Research output: Contribution to journalEditorial

11 Citations (Scopus)

DASC 2011: message from the chairs

Seberry, J., Varadharajan, V., Chen, J., Wang, H., Yang, L. T. & Ma, J., 2011, In : Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011. p. xx 1 p., 6118841.

Research output: Contribution to journalEditorial

Design, implementation and evaluation of a novel anti-virus parasitic malware

Min, B. & Varadharajan, V., Apr 2015, Proceedings of the 30th Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery (ACM), p. 2127-2133 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

Design and analysis of a new feature-distributed malware

Min, B. & Varadharajan, V., 2014, Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 457-464 8 p. 7011282

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Design and analysis of a sophisticated malware attack against smart grid

Min, B. & Varadharajan, V., 2015, Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Desmedt, Y. (ed.). Cham, Switzerland: Springer, Springer Nature, p. 130-139 10 p. (Lecture Notes in Computer Science; vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Design and analysis of security attacks against critical smart grid infrastructures

Min, B. & Varadharajan, V., 13 Oct 2014, ICECCS 2014: Proceedings of the 19th International Conference on Engineering of Complex Computer Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 59-68 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

11 Citations (Scopus)

Design and evaluation of feature distributed malware attacks against the Internet of Things (IoT)

Min, B. & Varadharajan, V., 2015, Proceedings - 2015 20th International Conference on Engineering of Complex Computer Systems, ICECCS 2015. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 80-89 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

11 Citations (Scopus)

Distributed service control technique for detecting security attacks

Tupakula, U. & Varadharajan, V., 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012. De Turck, F., Gaspary, L. P. & Medhi, D. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 574-577 4 p. 6211959

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Dynamic delegation framework for role based access control in distributed data management systems

Ruan, C. & Varadharajan, V., Jun 2014, In : Distributed and Parallel Databases. 32, 2, p. 245-269 25 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Dynamic state-based security architecture for detecting security attacks in virtual machines

Tupakula, U. K. & Varadharajan, V., Apr 2012, In : Computer Journal. 55, 4, p. 397-409 13 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Dynamic trust enhanced security model for trusted platform based services

Nagarajan, A. & Varadharajan, V., May 2011, In : Future Generation Computer Systems. 27, 5, p. 564-573 10 p.

Research output: Contribution to journalArticle

37 Citations (Scopus)

Dynamic workload balancing for hadoop MapReduce

Hou, X., Kumar, A. T. K., Thomas, J. P. & Varadharajan, V., 2014, Proceedings - 4th IEEE International Conference on Big Data and Cloud Computing, BDCloud 2014 with the 7th IEEE International Conference on Social Computing and Networking, SocialCom 2014 and the 4th International Conference on Sustainable Computing and Communications, SustainCom 2014. Chen, J. & Yang, L. T. (eds.). Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 56-62 7 p. 7034766

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

9 Citations (Scopus)

Editorial Computers and Security Special Issue IFIP/SEC 2010 Security & Privacy - Silver Linings in the Cloud

Rannenberg, K., Varadharajan, V. & Weber, C., Oct 2012, In : Computers and Security. 31, 7, p. 805 1 p.

Research output: Contribution to journalEditorial

Effective finger vein-based authentication: kernel principal component analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging trends in image processing, computer vision and pattern recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 447-455 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Effective kernel mapping for one-dimensional Principal Component Analysis in finger vein recognition

Damavandinejadmonfared, S. & Varadharajan, V., 2014, IPCV'14: the 2014 International Conference on Image Processing, Computer Vision, and Pattern Recognition. United States: World Academy of Science, 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution