Follow
Vijay Varadharajan
Vijay Varadharajan
The University if Newcastle
Verified email at newcastle.edu.au - Homepage
Title
Cited by
Cited by
Year
A detailed investigation and analysis of using machine learning techniques for intrusion detection
P Mishra, V Varadharajan, U Tupakula, ES Pilli
IEEE communications surveys & tutorials 21 (1), 686-728, 2018
4792018
Achieving secure role-based access control on encrypted data in cloud storage
L Zhou, V Varadharajan, M Hitchens
IEEE transactions on information forensics and security 8 (12), 1947-1960, 2013
4782013
TrustLite: A security architecture for tiny embedded devices
P Koeberl, S Schulz, AR Sadeghi, V Varadharajan
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
3842014
Wireless sensor network key management survey and taxonomy
J Zhang, V Varadharajan
Journal of network and computer applications 33 (2), 63-75, 2010
3782010
Autoencoder-based feature learning for cyber security applications
M Yousefi-Azar, V Varadharajan, L Hamey, U Tupakula
2017 International joint conference on neural networks (IJCNN), 3854-3861, 2017
3352017
The elements of statistical learning: data mining, inference, and prediction
ZQ John Lu
Journal of the Royal Statistical Society Series A: Statistics in Society 173 …, 2010
2832010
Intrusion detection techniques in cloud environment: A survey
P Mishra, ES Pilli, V Varadharajan, U Tupakula
Journal of Network and Computer Applications 77, 18-47, 2017
2282017
Enabling cloud storage auditing with key-exposure resistance
J Yu, K Ren, C Wang, V Varadharajan
IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015
2262015
Introduction to data mining in bioinformatics
JTL Wang, MJ Zaki, HTT Toivonen, D Shasha
Data mining in bioinformatics, 3-8, 2005
2172005
Guide to wireless ad hoc networks
S Misra, I Woungang, SC Misra
Springer Science & Business Media, 2009
2142009
Web mining and social networking: techniques and applications
G Xu, Y Zhang, L Li
Springer Science & Business Media, 2010
1972010
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1882014
Security as a service model for cloud environment
V Varadharajan, U Tupakula
IEEE Transactions on network and Service management 11 (1), 60-75, 2014
1862014
An analysis of the proxy problem in distributed systems
V Varadharajan, P Allen, S Black
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
1831991
A trust based access control framework for P2P file-sharing systems
H Tran, M Hitchens, V Varadharajan, P Watters
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
1812005
A survey on machine learning techniques for cyber security in the last decade
K Shaukat, S Luo, V Varadharajan, IA Hameed, M Xu
IEEE Access 8, 222310-222354, 2020
1732020
Research Online
Y Zhang, L Burgess, GM Kerr
Sciences 1, 1-2008, 2006
164*2006
The web resource space model
H Zhuge
Springer Science & Business Media, 2007
1592007
Enhancing grid security with trust management
C Lin, V Varadharajan, Y Wang, V Pruthi
IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004
1422004
Practical approximate k nearest neighbor queries with location and query privacy
X Yi, R Paulet, E Bertino, V Varadharajan
IEEE Transactions on Knowledge and Data Engineering 28 (6), 1546-1559, 2016
1372016
The system can't perform the operation now. Try again later.
Articles 1–20