A detailed investigation and analysis of using machine learning techniques for intrusion detection P Mishra, V Varadharajan, U Tupakula, ES Pilli IEEE communications surveys & tutorials 21 (1), 686-728, 2018 | 719 | 2018 |
Achieving secure role-based access control on encrypted data in cloud storage L Zhou, V Varadharajan, M Hitchens IEEE transactions on information forensics and security 8 (12), 1947-1960, 2013 | 503 | 2013 |
TrustLite: A security architecture for tiny embedded devices P Koeberl, S Schulz, AR Sadeghi, V Varadharajan Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 456 | 2014 |
Autoencoder-based feature learning for cyber security applications M Yousefi-Azar, V Varadharajan, L Hamey, U Tupakula 2017 International joint conference on neural networks (IJCNN), 3854-3861, 2017 | 419 | 2017 |
A survey on machine learning techniques for cyber security in the last decade K Shaukat, S Luo, V Varadharajan, IA Hameed, M Xu IEEE access 8, 222310-222354, 2020 | 405 | 2020 |
Wireless sensor network key management survey and taxonomy J Zhang, V Varadharajan Journal of network and computer applications 33 (2), 63-75, 2010 | 392 | 2010 |
The elements of statistical learning: data mining, inference, and prediction ZQ John Lu Journal of the Royal Statistical Society Series A: Statistics in Society 173 …, 2010 | 312 | 2010 |
Intrusion detection techniques in cloud environment: A survey P Mishra, ES Pilli, V Varadharajan, U Tupakula Journal of Network and Computer Applications 77, 18-47, 2017 | 278 | 2017 |
Performance comparison and current challenges of using machine learning techniques in cybersecurity K Shaukat, S Luo, V Varadharajan, IA Hameed, S Chen, D Liu, J Li Energies 13 (10), 2509, 2020 | 265 | 2020 |
Enabling cloud storage auditing with key-exposure resistance J Yu, K Ren, C Wang, V Varadharajan IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015 | 246 | 2015 |
Guide to wireless ad hoc networks S Misra, I Woungang, SC Misra Springer Science & Business Media, 2009 | 226 | 2009 |
Introduction to data mining in bioinformatics JTL Wang, MJ Zaki, HTT Toivonen, D Shasha Data mining in bioinformatics, 3-8, 2005 | 225 | 2005 |
CP-ABE with constant-size keys for lightweight devices F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan IEEE transactions on information forensics and security 9 (5), 763-771, 2014 | 213 | 2014 |
Security as a service model for cloud environment V Varadharajan, U Tupakula IEEE Transactions on network and Service management 11 (1), 60-75, 2014 | 202 | 2014 |
Web mining and social networking: techniques and applications G Xu, Y Zhang, L Li Springer Science & Business Media, 2010 | 200 | 2010 |
An analysis of the proxy problem in distributed systems V Varadharajan, P Allen, S Black Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991 | 191 | 1991 |
Research on the output characteristics of microfluidic inductive sensor X Zhang, H Zhang, Y Sun, H Chen, Y Zhang Journal of Nanomaterials 2014 (1), 725246, 2014 | 188* | 2014 |
A trust based access control framework for P2P file-sharing systems H Tran, M Hitchens, V Varadharajan, P Watters Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 183 | 2005 |
The web resource space model H Zhuge Springer Science & Business Media, 2007 | 161 | 2007 |
Enhancing grid security with trust management C Lin, V Varadharajan, Y Wang, V Pruthi IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004 | 153 | 2004 |