Search Results - "Thayananthan, Vijey"
-
1
A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT
Published in Applied sciences (01-07-2022)“…With the rapid growth of internet-connected devices and their resource-constrained capabilities, the current authentication mechanisms are unable to meet the…”
Get full text
Journal Article -
2
Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication
Published in Symmetry (Basel) (01-11-2022)“…The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a…”
Get full text
Journal Article -
3
Bandwidth Control Mechanism and Extreme Gradient Boosting Algorithm for Protecting Software-Defined Networks Against DDoS Attacks
Published in IEEE access (2020)“…Software-Defined Networking (SDN) is an emerging network architecture that addresses the limitation of the traditional network by providing centralized…”
Get full text
Journal Article -
4
BL0K: A New Stage of Privacy-Preserving Scope for Location-Based Services
Published in Sensors (Basel, Switzerland) (08-02-2019)“…Location-based services present an inherent challenge of finding the delicate balance between efficiency when answering queries and maintaining user privacy…”
Get full text
Journal Article -
5
Autonomous Vehicles with a 6G-based Intelligent Cybersecurity Model
Published in IEEE access (01-01-2023)“…Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in…”
Get full text
Journal Article -
6
Object Detection Performance Evaluation for Autonomous Vehicles in Sandy Weather Environments
Published in Applied sciences (01-09-2023)“…In order to reach the highest level of automation, autonomous vehicles (AVs) are required to be aware of surrounding objects and detect them even in adverse…”
Get full text
Journal Article -
7
Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems
Published in Applied sciences (01-04-2021)“…The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in…”
Get full text
Journal Article -
8
Dummy-Based Approach for Protecting Mobile Agents Against Malicious Destination Machines
Published in IEEE access (01-01-2020)“…Recently, agent-based software technology (ABST) has received widespread attention from the research community and users. However, security issues facing ABST…”
Get full text
Journal Article -
9
A new vector map watermarking technique in frequency domain based on LCA-transform
Published in Multimedia tools and applications (01-11-2020)“…Two-dimensional vector maps are vulnerable to issues related to copyright owner’s protection, which have an impact on the vector-data usage in different…”
Get full text
Journal Article -
10
RFID of next generation network for enhancing customer relationship management in healthcare industries
Published in Technology and health care (23-10-2017)“…This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in…”
Get more information
Journal Article -
11
Efficient techniques of key management and quantum cryptography in RFID networks
Published in Security and communication networks (10-03-2015)“…An efficient way of handling security keys using quantum cryptography (QC) for increasing security in radio frequency identification (RFID) networks is being…”
Get full text
Journal Article -
12
Estimating data traffic through software-defined multiple access for IoT applications over 5G networks
Published in 2018 15th Learning and Technology Conference (L&T) (01-02-2018)“…Wireless Connections and volume of the traffic are increasing with different applications over 5G environments. Thus, many researchers have estimated the…”
Get full text
Conference Proceeding -
13
A novel and secure smart parking management system (SPMS) based on integration of WSN, RFID, and IoT
Published in 2018 15th Learning and Technology Conference (L&T) (01-02-2018)“…Nowadays, finding a secure parking lot in modern cities deemed as very hard and time-consuming task. Leaving negative implications on traffic congestion, air…”
Get full text
Conference Proceeding -
14
A Lightweight Blockchain Based Cybersecurity for IoT environments
Published in 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01-06-2019)“…Recently, Blockchain (BC) attracts a lot of research's to study their salient features in order to adopt it into various domains. BC promise to address…”
Get full text
Conference Proceeding -
15
Robustness modularity in complex networks
Published 05-10-2021“…A basic question in network community detection is how modular a given network is. This is usually addressed by evaluating the quality of partitions detected…”
Get full text
Journal Article -
16
Analysis of round-robin load-balancing algorithm with adaptive and predictive approaches
Published in 2016 UKACC 11th International Conference on Control (CONTROL) (01-08-2016)“…An enormous increase in the number of internet users which will tend to rise further, cluster-based web servers (CBWS) are experiencing a dramatic increase in…”
Get full text
Conference Proceeding -
17
Community detection in networks using graph embeddings
Published 05-03-2021“…Phys. Rev. E 103, 022316 (2021) Graph embedding methods are becoming increasingly popular in the machine learning community, where they are widely used for…”
Get full text
Journal Article -
18
IBMSDC: Intelligent Blockchain based Management System for protecting Digital Currencies Transactions
Published in 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4) (01-07-2019)“…Recently, Digital Currencies (DC) have taken a lot of momentum in the academic and financial community intelligently. Massive contributions have been…”
Get full text
Conference Proceeding -
19
Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments
Published in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (01-06-2017)“…Industrial networking has many issues based on the type of industries, data storage, data centers, and cloud computing, etc. Green data storage improves the…”
Get full text
Conference Proceeding -
20
Fast consensus clustering in complex networks
Published 20-04-2019“…Phys. Rev. E 99, 042301 (2019) Algorithms for community detection are usually stochastic, leading to different partitions for different choices of random…”
Get full text
Journal Article