Search Results - "Thayananthan, Vijey"

Refine Results
  1. 1

    A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT by Kurdi, Hassan, Thayananthan, Vijey

    Published in Applied sciences (01-07-2022)
    “…With the rapid growth of internet-connected devices and their resource-constrained capabilities, the current authentication mechanisms are unable to meet the…”
    Get full text
    Journal Article
  2. 2

    Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication by Algarni, Abdullah, Thayananthan, Vijey

    Published in Symmetry (Basel) (01-11-2022)
    “…The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a…”
    Get full text
    Journal Article
  3. 3

    Bandwidth Control Mechanism and Extreme Gradient Boosting Algorithm for Protecting Software-Defined Networks Against DDoS Attacks by Alamri, Hassan A., Thayananthan, Vijey

    Published in IEEE access (2020)
    “…Software-Defined Networking (SDN) is an emerging network architecture that addresses the limitation of the traditional network by providing centralized…”
    Get full text
    Journal Article
  4. 4

    BL0K: A New Stage of Privacy-Preserving Scope for Location-Based Services by Albelaihy, Abdullah, Thayananthan, Vijey

    Published in Sensors (Basel, Switzerland) (08-02-2019)
    “…Location-based services present an inherent challenge of finding the delicate balance between efficiency when answering queries and maintaining user privacy…”
    Get full text
    Journal Article
  5. 5

    Autonomous Vehicles with a 6G-based Intelligent Cybersecurity Model by Algarni, Abdullah, Thayananthan, Vijey

    Published in IEEE access (01-01-2023)
    “…Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in…”
    Get full text
    Journal Article
  6. 6

    Object Detection Performance Evaluation for Autonomous Vehicles in Sandy Weather Environments by Aloufi, Nasser, Alnori, Abdulaziz, Thayananthan, Vijey, Basuhail, Abdullah

    Published in Applied sciences (01-09-2023)
    “…In order to reach the highest level of automation, autonomous vehicles (AVs) are required to be aware of surrounding objects and detect them even in adverse…”
    Get full text
    Journal Article
  7. 7

    Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems by Algarni, Abdullah M., Thayananthan, Vijey, Malaiya, Yashwant K.

    Published in Applied sciences (01-04-2021)
    “…The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in…”
    Get full text
    Journal Article
  8. 8

    Dummy-Based Approach for Protecting Mobile Agents Against Malicious Destination Machines by Alluhaybi, Bandar, Alrahhal, Mohamad Shady, Alzahrani, Ahmed, Thayananthan, Vijey

    Published in IEEE access (01-01-2020)
    “…Recently, agent-based software technology (ABST) has received widespread attention from the research community and users. However, security issues facing ABST…”
    Get full text
    Journal Article
  9. 9

    A new vector map watermarking technique in frequency domain based on LCA-transform by AL-ardhi, Saleh, Thayananthan, Vijey, Basuhail, Abdullah

    Published in Multimedia tools and applications (01-11-2020)
    “…Two-dimensional vector maps are vulnerable to issues related to copyright owner’s protection, which have an impact on the vector-data usage in different…”
    Get full text
    Journal Article
  10. 10

    RFID of next generation network for enhancing customer relationship management in healthcare industries by Alzahrani, Ahmed, Qureshi, Muhammad Shuaib, Thayananthan, Vijey

    Published in Technology and health care (23-10-2017)
    “…This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in…”
    Get more information
    Journal Article
  11. 11

    Efficient techniques of key management and quantum cryptography in RFID networks by Thayananthan, Vijey, Alzahrani, Ahmed, Qureshi, Muhammad Shuaib

    Published in Security and communication networks (10-03-2015)
    “…An efficient way of handling security keys using quantum cryptography (QC) for increasing security in radio frequency identification (RFID) networks is being…”
    Get full text
    Journal Article
  12. 12

    Estimating data traffic through software-defined multiple access for IoT applications over 5G networks by Alshaflut, Ahmed, Thayananthan, Vijey

    “…Wireless Connections and volume of the traffic are increasing with different applications over 5G environments. Thus, many researchers have estimated the…”
    Get full text
    Conference Proceeding
  13. 13

    A novel and secure smart parking management system (SPMS) based on integration of WSN, RFID, and IoT by Abdulkader, Omar, Bamhdi, Alwi M., Thayananthan, Vijey, Jambi, Kamal, Alrasheedi, Muasaad

    “…Nowadays, finding a secure parking lot in modern cities deemed as very hard and time-consuming task. Leaving negative implications on traffic congestion, air…”
    Get full text
    Conference Proceeding
  14. 14
  15. 15

    Robustness modularity in complex networks by Silva, Filipi N, Albeshri, Aiiad, Thayananthan, Vijey, Alhalabi, Wadee, Fortunato, Santo

    Published 05-10-2021
    “…A basic question in network community detection is how modular a given network is. This is usually addressed by evaluating the quality of partitions detected…”
    Get full text
    Journal Article
  16. 16

    Analysis of round-robin load-balancing algorithm with adaptive and predictive approaches by Alam, Furqan, Thayananthan, Vijey, Katib, Iyad

    “…An enormous increase in the number of internet users which will tend to rise further, cluster-based web servers (CBWS) are experiencing a dramatic increase in…”
    Get full text
    Conference Proceeding
  17. 17

    Community detection in networks using graph embeddings by Tandon, Aditya, Albeshri, Aiiad, Thayananthan, Vijey, Alhalabi, Wadee, Radicchi, Filippo, Fortunato, Santo

    Published 05-03-2021
    “…Phys. Rev. E 103, 022316 (2021) Graph embedding methods are becoming increasingly popular in the machine learning community, where they are widely used for…”
    Get full text
    Journal Article
  18. 18

    IBMSDC: Intelligent Blockchain based Management System for protecting Digital Currencies Transactions by Abdulkader, Omar, Bamhdi, Alwi M., Thayananthan, Vijey, Elbouraey, Fathy

    “…Recently, Digital Currencies (DC) have taken a lot of momentum in the academic and financial community intelligently. Massive contributions have been…”
    Get full text
    Conference Proceeding
  19. 19

    Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments by Thayananthan, Vijey, Abdulkader, Omar, Jambi, Kamal, Bamahdi, Alwi M.

    “…Industrial networking has many issues based on the type of industries, data storage, data centers, and cloud computing, etc. Green data storage improves the…”
    Get full text
    Conference Proceeding
  20. 20

    Fast consensus clustering in complex networks by Tandon, Aditya, Albeshri, Aiiad, Thayananthan, Vijey, Alhalabi, Wadee, Fortunato, Santo

    Published 20-04-2019
    “…Phys. Rev. E 99, 042301 (2019) Algorithms for community detection are usually stochastic, leading to different partitions for different choices of random…”
    Get full text
    Journal Article