default search action
Vallipuram Muthukkumarasamy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Zorka Jovanovic, Zhe Hou, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
Robust integration of blockchain and explainable federated learning for automated credit scoring. Comput. Networks 243: 110303 (2024) - [j30]Jeyakumar Samantha Tharani, Zhé Hóu, Eugene Yugarajah Andrew Charles, Punit Rathore, Marimuthu Palaniswami, Vallipuram Muthukkumarasamy:
Unified Feature Engineering for Detection of Malicious Entities in Blockchain Networks. IEEE Trans. Inf. Forensics Secur. 19: 8924-8938 (2024) - [c62]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Mohammad Jabed Morshed Chowdhury, Xin-Wen Wu, Kalvinder Singh:
Lifetime Modelling of Wireless Sensor Networks with Multipath Routing. PerCom Workshops 2024: 178-183 - 2023
- [j29]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Mohammad Jabed Morshed Chowdhury, Xin-Wen Wu, Kalvinder Singh:
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks. Comput. Networks 232: 109842 (2023) - [c61]Jeyakumar Samantha Tharani, Ryan K. L. Ko, Vallipuram Muthukkumarasamy:
A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure. BSCI 2023: 44-52 - [c60]Dorottya Zelenyanszki, Zhé Hóu, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
A privacy awareness framework for NFT avatars in the metaverse. ICNC 2023: 431-435 - [c59]Babu Pillai, Zhé Hóu, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol. ICFEM 2023: 249-254 - [c58]Dorottya Zelenyanszki, Zhé Hóu, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
An Analysis of Zero-knowledge Proof-based Privacy-preserving Techniques for Non-fungible Tokens in the Metaverse. MetaCom 2023: 670-673 - [e1]Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, Rudrapatna K. Shyamasundar:
Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings. Lecture Notes in Computer Science 14424, Springer 2023, ISBN 978-3-031-49098-9 [contents] - 2022
- [j28]Babu Pillai, Kamanashis Biswas, Zhé Hóu, Vallipuram Muthukkumarasamy:
Cross-Blockchain Technology: Integration Framework and Security Assumptions. IEEE Access 10: 41239-41259 (2022) - [c57]Jeyakumar Samantha Tharani, Dorottya Zelenyanszki, Vallipuram Muthukkumarasamy:
A UI/UX Evaluation Framework for Blockchain-Based Applications. ICBC 2022: 48-60 - [c56]Babu Pillai, Zhé Hóu, Kamanashis Biswas, Vinh Bui, Vallipuram Muthukkumarasamy:
Blockchain Interoperability: Performance and Security Trade-Offs. SenSys 2022: 1196-1201 - 2021
- [j27]Babu Pillai, Kamanashis Biswas, Zhé Hóu, Vallipuram Muthukkumarasamy:
Burn-to-Claim: An asset transfer protocol for blockchain interoperability. Comput. Networks 200: 108495 (2021) - [c55]Jeyakumar Samantha Tharani, Eugene Yougarajah Andrew Charles, Zhé Hóu, Marimuthu Palaniswami, Vallipuram Muthukkumarasamy:
Graph Based Visualisation Techniques for Analysis of Blockchain Transactions. LCN 2021: 427-430 - 2020
- [j26]Mohammad Jabed Morshed Chowdhury, Md. Sadek Ferdous, Kamanashis Biswas, Niaz Chowdhury, Vallipuram Muthukkumarasamy:
COVID-19 Contact Tracing: Challenges and Future Directions. IEEE Access 8: 225703-225729 (2020) - [j25]Mohammad Jabed Morshed Chowdhury, Md. Sadek Ferdous, Kamanashis Biswas, Niaz Chowdhury, Vallipuram Muthukkumarasamy:
A survey on blockchain-based platforms for IoT use-cases. Knowl. Eng. Rev. 35: e19 (2020) - [j24]Jeyakumar Samantha Tharani, Mukunthan Tharmakulasingam, Vallipuram Muthukkumarasamy:
A blockchain-based database management system. Knowl. Eng. Rev. 35: e20 (2020) - [j23]Babu Pillai, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
Cross-chain interoperability among blockchain-based systems using transactions. Knowl. Eng. Rev. 35: e23 (2020) - [j22]Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Kamanashis Biswas, Niaz Chowdhury, Vallipuram Muthukkumarasamy:
Immutable autobiography of smart cars leveraging blockchain technology. Knowl. Eng. Rev. 35: e3 (2020) - [c54]Babu Pillai, Kamanashis Biswas, Zhé Hóu, Vallipuram Muthukkumarasamy:
The Burn-to-Claim cross-blockchain asset transfer protocol. ICECCS 2020: 119-124
2010 – 2019
- 2019
- [j21]Md. Sadek Ferdous, Kamanashis Biswas, Mohammad Jabed Morshed Chowdhury, Niaz Chowdhury, Vallipuram Muthukkumarasamy:
Chapter Two - Integrated platforms for blockchain enablement. Adv. Comput. 115: 41-72 (2019) - [c53]Babu Pillai, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
Blockchain Interoperable Digital Objects. ICBC 2019: 80-94 - 2018
- [c52]Anisur Rahman, Vallipuram Muthukkumarasamy:
Localization of Submerged Sensors with a Single Beacon for Non-Parallel Planes State. ICUFN 2018: 525-530 - 2016
- [j20]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
A probabilistic sampling method for efficient flow-based analysis. J. Commun. Networks 18(5): 818-825 (2016) - [j19]Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
A survey on data leakage prevention systems. J. Netw. Comput. Appl. 62: 137-152 (2016) - [j18]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Intelligent Sampling Using an Optimized Neural Network. J. Networks 11(01): 16-27 (2016) - [j17]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
On the Security of Permutation-Only Image Encryption Schemes. IEEE Trans. Inf. Forensics Secur. 11(2): 235-246 (2016) - [c51]Kamanashis Biswas, Vallipuram Muthukkumarasamy:
Securing Smart Cities Using Blockchain Technology. HPCC/SmartCity/DSS 2016: 1392-1393 - [c50]Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Discovery of potential data leaks in email communications. ICSPCS 2016: 1-10 - 2015
- [j16]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Kalvinder Singh:
An Analytical Model for Lifetime Estimation of Wireless Sensor Networks. IEEE Commun. Lett. 19(9): 1584-1587 (2015) - [j15]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks. J. Networks 10(6): 353-368 (2015) - [j14]Anisur Rahman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB). J. Networks 10(8): 462-469 (2015) - [j13]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Performance of Flow-based Anomaly Detection in Sampled Traffic. J. Networks 10(9): 512-520 (2015) - [j12]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Kalvinder Singh:
An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks. J. Networks 10(11): 616-624 (2015) - [j11]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic. IEEE Trans. Consumer Electron. 61(2): 197-205 (2015) - [j10]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability. IEEE Trans. Inf. Forensics Secur. 10(2): 409-422 (2015) - [c49]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
Flow-based anomaly detection using semisupervised learning. ICSPCS 2015: 1-5 - [c48]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
A Secure Lightweight Texture Encryption Scheme. PSIVT Workshops 2015: 344-356 - [c47]Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Detecting Data Semantic: A Data Leakage Prevention Approach. TrustCom/BigDataSE/ISPA (1) 2015: 910-917 - 2014
- [j9]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
Comments on the security of "Diffusion-substitution based gray image encryption" scheme. Digit. Signal Process. 32: 34-36 (2014) - [j8]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks. J. Networks 9(12): 3427-3444 (2014) - [c46]Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
A Semantics-Aware Classification Approach for Data Leakage Prevention. ACISP 2014: 413-421 - [c45]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Kalvinder Singh:
A Simple Lightweight Encryption Scheme for Wireless Sensor Networks. ICDCN 2014: 499-504 - 2013
- [c44]Anisur Rahman, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Localization of Submerged Sensors Using Radio and Acoustic Signals with Single Beacon. ADHOC-NOW 2013: 293-304 - [c43]Bafrin Zarei, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks. AINA 2013: 197-204 - [c42]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Metaheuristic algorithms based Flow Anomaly Detector. APCC 2013: 717-722 - [c41]Anisur Rahman, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
The Analysis of Temperature, Depth, Salinity Effect on Acoustic Speed for a Vertical Water Column. DCOSS 2013: 310-312 - [c40]Anisur Rahman, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Coordinates Determination of Submerged Sensors Using Cayley-Menger Determinant. DCOSS 2013: 466-471 - [c39]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
On the Feasibility and Performance of Pass-Thought Authentication Systems. EST 2013: 33-38 - [c38]Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Mansour Sheikhan:
Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm. ICDCS Workshops 2013: 76-81 - [c37]Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Adaptable N-gram classification model for data leakage prevention. ICSPCS 2013: 1-8 - [c36]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Maximal clique based clustering scheme for wireless sensor networks. ISSNIP 2013: 237-241 - [c35]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Muhammad Usman:
An energy efficient clique based clustering and routing mechanism in wireless sensor networks. IWCMC 2013: 171-176 - [c34]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks. LCN Workshops 2013: 1001-1009 - [c33]Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs. TrustCom/ISPA/IUCC 2013: 110-117 - [c32]Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Word N-Gram Based Classification for Data Leakage Prevention. TrustCom/ISPA/IUCC 2013: 578-585 - [c31]Khosrow Ramezani, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks. TrustCom/ISPA/IUCC 2013: 1735-1740 - 2012
- [c30]Kalvinder Singh, Patrick Crilly, Vallipuram Muthukkumarasamy:
Sensing and analyzing physiological data with a smart phone to secure an e-health system. ISCIT 2012: 302-307 - [c29]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum:
Securing mobile agent based Wireless Sensor Network applications on middleware. ISCIT 2012: 707-712 - [c28]Elankayer Sithirasenan, Khosrow Ramezani, Vallipuram Muthukkumarasamy:
Enhanced CRA protocol for seamless connectivity in wireless networks. ISCIT 2012: 1075-1079 - [c27]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum:
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection. UIC/ATC 2012: 322-329 - 2011
- [j7]Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Substantiating Anomalies In Wireless Networks Using Group Outlier Scores. J. Softw. 6(4): 678-689 (2011) - [c26]Patrick Crilly, Vallipuram Muthukkumarasamy:
A Mobile Personal Health System Enabling Pervasive Healthcare - SmartPhone. HEALTHINF 2011: 463-466 - [c25]Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert:
Insecurity in Public-Safety Communications: APCO Project 25. SecureComm 2011: 116-133 - [c24]Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy:
An EAP Framework for Unified Authentication in Wireless Networks. TrustCom 2011: 389-397 - [c23]Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks. TrustCom 2011: 589-596 - 2010
- [j6]Kalvinder Singh, Vallipuram Muthukkumarasamy:
Key establishment protocols using environmental and physiological data in wireless sensor networks. Int. J. Sens. Networks 8(1): 8-26 (2010) - [c22]Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar:
Trust Management Scheme for Mobile Ad-Hoc Networks. CIT 2010: 896-901 - [c21]Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar:
Trust Formalization in Mobile Ad-Hoc Networks. AINA Workshops 2010: 351-356 - [c20]Steve Glass, Vallipuram Muthukkumarasamy, Marius Portmann:
The Insecurity of Time-of-Arrival Distance-Ranging in IEEE 802.11 Wireless Networks. ICDCS Workshops 2010: 227-233 - [c19]Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar:
A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks. NSS 2010: 275-280
2000 – 2009
- 2009
- [c18]Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann:
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. AINA 2009: 530-538 - [c17]Steve Glass, Vallipuram Muthukkumarasamy, Marius Portmann:
A software-defined radio receiver for APCO project 25 signals. IWCMC 2009: 67-72 - [c16]Kalvinder Singh, Vallipuram Muthukkumarasamy:
Implementation and Analysis of Sensor Security Protocols in a Home Health Care System. NSS 2009: 137-142 - [c15]Bruno Lage Srur, Vallipuram Muthukkumarasamy:
Enhancing Trust on e-Government: A Decision Fusion Module. NSS 2009: 164-169 - 2008
- [j5]Michael Blumenstein, Steve Green, Shoshana Fogelman, Ann Nguyen, Vallipuram Muthukkumarasamy:
Performance analysis of GAME: A generic automated marking environment. Comput. Educ. 50(4): 1203-1216 (2008) - [j4]Steve Glass, Marius Portmann, Vallipuram Muthukkumarasamy:
Securing Wireless Mesh Networks. IEEE Internet Comput. 12(4): 30-36 (2008) - [j3]Kalvinder Singh, Vallipuram Muthukkumarasamy:
Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks. J. Networks 3(6): 13-28 (2008) - [j2]Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL. J. Networks 3(8): 2-15 (2008) - [c14]Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Substantiating Security Threats Using Group Outlier Detection Techniques. GLOBECOM 2008: 2179-2184 - 2007
- [j1]Stephane Armand, Michael Blumenstein, Vallipuram Muthukkumarasamy:
Off-line Signature Verification Using an Enhanced Modified Direction Feature with Single and Multi-classifier Approaches. IEEE Comput. Intell. Mag. 2(2): 18-25 (2007) - [c13]Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Substantiating Unexpected Behavior of 802.11 Network Hosts. CCNC 2007: 292-296 - [c12]Vu Nguyen, Michael Blumenstein, Vallipuram Muthukkumarasamy, Graham Leedham:
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines. ICDAR 2007: 734-738 - [c11]Stephen Mark Glass, Vallipuram Muthukkumarasamy:
A Study of the TKIP Cryptographic DoS Attack. ICON 2007: 59-65 - [c10]Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. ICON 2007: 66-71 - 2006
- [c9]Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy:
Formal Verification of the IEEE 802.11i WLAN Security Protocol. ASWEC 2006: 181-190 - [c8]Kyung Seob Moon, Vallipuram Muthukkumarasamy, Anne Thuy-Anh Nguyen:
Efficiently Maintaining Consistency Using Tree-Based P2P Network System in Distributed Network Games. Edutainment 2006: 648-657 - [c7]Stephane Armand, Michael Blumenstein, Vallipuram Muthukkumarasamy:
Off-line Signature Verification based on the Modified Direction Feature. ICPR (4) 2006: 509-512 - [c6]Stephane Armand, Michael Blumenstein, Vallipuram Muthukkumarasamy:
Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification. IJCNN 2006: 684-691 - 2005
- [c5]Steve Green, Michael Blumenstein, Vallipuram Muthukkumarasamy, Jun Jo:
Investigation of a Classification-based Technique to Detect Illicit Objects for Aviation Security. Artificial Intelligence and Applications 2005: 825-830 - [c4]Steve Glass, Vallipuram Muthukkumarasamy:
802.11 DCF Denial of Service Vulnerabilities. Australian Computer, Network & Information Forensics Conference 2005: 8-14 - 2004
- [c3]Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
A model for object-based distributed processing using behaviour trees. IASTED Conf. on Software Engineering and Applications 2004: 477-482 - [c2]Michael Blumenstein, Steve Green, Ann Nguyen, Vallipuram Muthukkumarasamy:
GAME: A Generic Automated Marking Environment for Programming Assessment. ITCC (1) 2004: 212- - [c1]Michael Blumenstein, Steve Green, Ann Nguyen, Vallipuram Muthukkumarasamy:
An experimental analysis of GAME: a generic automated marking environment. ITiCSE 2004: 67-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint