关注
Raja kumar Murugesan
Raja kumar Murugesan
在 taylors.edu.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan, NZ Jhanjhi
IEEE Internet of Things Journal 8 (6), 4186-4210, 2020
1302020
A review of machine learning and deep learning techniques for anomaly detection in IoT data
R Al-amri, RK Murugesan, M Man, AF Abdulateef, MA Al-Sharafi, ...
Applied Sciences 11 (12), 5320, 2021
1062021
Smart home technologies: A preliminary review
S Balakrishnan, H Vasudavan, RK Murugesan
Proceedings of the 6th International Conference on Information Technology …, 2018
552018
Classification of instagram fake users using supervised machine learning algorithms
KR Purba, D Asirvatham, RK Murugesan
International Journal of Electrical and Computer Engineering 10 (3), 2763, 2020
462020
A theoretical framework to build trust and prevent fake news in social media using blockchain
TW Jing, RK Murugesan
Recent trends in data science and soft computing: Proceedings of the 3rd …, 2019
432019
SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications
SM Muzammal, RK Murugesan, NZ Jhanjhi, LT Jung
2020 International Conference on Computational Intelligence (ICCI), 305-310, 2020
402020
Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods
Supriyanto, IH Hasbullah, RK Murugesan, S Ramadass
IETE Technical Review 30 (1), 64-71, 2013
382013
Instagram post popularity trend analysis and prediction using hashtag, image assessment, and user history features.
KR Purba, D Asirvatham, RK Murugesan
Int. Arab J. Inf. Technol. 18 (1), 85-94, 2021
292021
Security mechanism for IPv6 stateless address autoconfiguration
S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ...
2015 International Conference on Automation, Cognitive Science, Optics …, 2015
272015
A trust-based model for secure routing against RPL attacks in internet of things
SM Muzammal, RK Murugesan, NZ Jhanjhi, M Humayun, AO Ibrahim, ...
Sensors 22 (18), 7052, 2022
222022
Securing duplicate address detection on IPv6 using distributed trust mechanism
S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ...
Int J Simulation—Systems, Sci Technol 17 (26), 2016
222016
Trust and mobility-based protocol for secure routing in Internet of Things
SM Muzammal, RK Murugesan, NZ Jhanjhi, MS Hossain, A Yassine
Sensors 22 (16), 6215, 2022
192022
A study on leveraging blockchain technology for IoT security enhancement
SM Muzammal, RK Murugesan
2018 Fourth International Conference on Advances in Computing, Communication …, 2018
192018
Trust network, blockchain and evolution in social media to build trust and prevent fake news
WJ Tee, RK Murugesan
2018 Fourth International Conference on Advances in Computing, Communication …, 2018
192018
Introducing mobility metrics in trust-based security of routing protocol for internet of things
SM Muzammal, RK Murugesan, NZ Jhanjhi
2021 National Computing Colleges Conference (NCCC), 1-5, 2021
162021
Toward a full exploitation of IoT in smart cities: a review of IoT anomaly detection techniques
R Al-Amri, RK Murugesan, EM Alshari, HS Alhadawi
Proceedings of International Conference on Emerging Technologies and …, 2022
152022
Improvement of address resolution security in IPv6 local network using trust-ND
S Praptodiyono, IH Hasbullah, M Anbar, RK Murugesan, A Osman
TELKOMNIKA Indonesian Journal of Electrical Engineering 13 (1), 195-202, 2015
142015
Cognitive IoT integration for smart healthcare: Case study for heart disease detection and monitoring
KGRR Devi, RM Chozhan, R Murugesan
2019 international conference on recent advances in energy-efficient …, 2019
132019
Improving security of duplicate address detection on IPv6 local network in public area
S Praptodiyono, IH Hasbullah, MM Kadhum, RK Murugesan, CY Wey, ...
2015 9th Asia Modelling Symposium (AMS), 123-128, 2015
132015
Review on ipv6 security vulnerability issues and mitigation methods
RK Murugesan, S Ramadass
International Journal of Network Security & Its Applications 4 (6), 173, 2012
132012
系统目前无法执行此操作,请稍后再试。
文章 1–20