Follow
Raja kumar Murugesan
Raja kumar Murugesan
Verified email at taylors.edu.my
Title
Cited by
Cited by
Year
A review of machine learning and deep learning techniques for anomaly detection in IoT data
R Al-amri, RK Murugesan, M Man, AF Abdulateef, MA Al-Sharafi, ...
Applied Sciences 11 (12), 5320, 2021
1692021
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan, NZ Jhanjhi
IEEE Internet of Things Journal 8 (6), 4186-4210, 2020
1602020
Smart home technologies: A preliminary review
S Balakrishnan, H Vasudavan, RK Murugesan
Proceedings of the 6th International Conference on Information Technology …, 2018
702018
Classification of instagram fake users using supervised machine learning algorithms
KR Purba, D Asirvatham, RK Murugesan
International Journal of Electrical and Computer Engineering 10 (3), 2763, 2020
632020
A theoretical framework to build trust and prevent fake news in social media using blockchain
TW Jing, RK Murugesan
Recent trends in data science and soft computing: Proceedings of the 3rd …, 2019
492019
SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications
SM Muzammal, RK Murugesan, NZ Jhanjhi, LT Jung
2020 International Conference on Computational Intelligence (ICCI), 305-310, 2020
482020
Instagram post popularity trend analysis and prediction using hashtag, image assessment, and user history features.
KR Purba, D Asirvatham, RK Murugesan
Int. Arab J. Inf. Technol. 18 (1), 85-94, 2021
422021
Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods
Supriyanto, IH Hasbullah, RK Murugesan, S Ramadass
IETE Technical Review 30 (1), 64-71, 2013
382013
A trust-based model for secure routing against RPL attacks in internet of things
SM Muzammal, RK Murugesan, NZ Jhanjhi, M Humayun, AO Ibrahim, ...
Sensors 22 (18), 7052, 2022
342022
Trust and mobility-based protocol for secure routing in Internet of Things
SM Muzammal, RK Murugesan, NZ Jhanjhi, MS Hossain, A Yassine
Sensors 22 (16), 6215, 2022
322022
Security mechanism for IPv6 stateless address autoconfiguration
S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ...
2015 International Conference on Automation, Cognitive Science, Optics …, 2015
272015
A study on leveraging blockchain technology for IoT security enhancement
SM Muzammal, RK Murugesan
2018 Fourth International Conference on Advances in Computing, Communication …, 2018
242018
Trust network, blockchain and evolution in social media to build trust and prevent fake news
WJ Tee, RK Murugesan
2018 Fourth International Conference on Advances in Computing, Communication …, 2018
232018
Securing duplicate address detection on IPv6 using distributed trust mechanism
S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ...
Int J Simulation—Systems, Sci Technol 17 (26), 2016
222016
Introducing mobility metrics in trust-based security of routing protocol for internet of things
SM Muzammal, RK Murugesan, NZ Jhanjhi
2021 National Computing Colleges Conference (NCCC), 1-5, 2021
202021
Toward a full exploitation of IoT in smart cities: A review of IoT anomaly detection techniques
R Al-Amri, RK Murugesan, EM Alshari, HS Alhadawi
Proceedings of International Conference on Emerging Technologies and …, 2022
192022
Influence maximization diffusion models based on engagement and activeness on instagram
KR Purba, D Asirvatham, RK Murugesan
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
162022
Improvement of address resolution security in IPv6 local network using trust-ND
S Praptodiyono, IH Hasbullah, M Anbar, RK Murugesan, A Osman
TELKOMNIKA Indonesian Journal of Electrical Engineering 13 (1), 195-202, 2015
162015
Data Security and Privacy Concerns in Drone Operations
SR Sindiramutty, NZ Jhanjhi, CE Tan, KJ Yun, AR Manchuri, H Ashraf, ...
Cybersecurity Issues and Challenges in the Drone Industry, 236-290, 2024
152024
Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology
TW Jing, RK Murugesan
Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021
152021
The system can't perform the operation now. Try again later.
Articles 1–20