Raja kumar Murugesan
Taylor's University
H-index: 14
Asia-Malaysia
Top articles of Raja kumar Murugesan
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Data Security and Privacy Concerns in Drone Operations | Siva Raja Sindiramutty Noor Zaman Jhanjhi Chong Eng Tan Khor Jia Yun Amaranadha Reddy Manchuri | 2024 | |
Deep convolutional neural network and IoT technology for healthcare | DIGITAL HEALTH | Sobia Wassan Hu Dongyan Beenish Suhail NZ Jhanjhi Guanghua Xiao | 2024/1/18 |
A fake news detection solution in social media via crowdsourcing, blockchain technology, and artificial intelligence | AIP Conference Proceedings | KKV Chow MJ Yong LJ Pun CP Goay WJ Tee | 2024/2/7 |
Advances in Health With the Help of Explainable AI | Imdad Ali Shah Raja Kumar Murugesan Humaira Ashraf | 2024 | |
Supply Chain Management Security Issues and Challenges in the Context of AI Applications | Imdad Ali Shah Raja Kumar Murugesan Samina Rajper | 2024 | |
Detecting Mild Depression from EEG Signal in a Non-Clinical Environment Using Machine Learning Technique | K Thulasi Sumathi Balakrishnan Yap Jia Suan Yan Xiao Qing MB Malarvili | 2023/9/5 | |
Advancement of efficiency of HTTP2 over HTTP1 a comparative study | AIP Conference Proceedings | Anuj Kumar Ramnarayan Ramnarayan Rashmi Kuksal Raja Kumar Murugesan Vijay Lakshmi Sajwan | 2023/9/1 |
Speed Analysis on Client Server Architecture Using HTTP/2 Over HTTP/1: A Generic Review | Anuj Kumar Raja Kumar Murugesan Harshita Chaudhary Neha Singh Kapil Joshi | 2023/2/17 | |
Implementation of a malicious traffic filter using snort and wireshark as a proof of concept to enhance mobile network security | Journal of Telecommunications and Information Technology | Rafia Afzal Raja Kumar Murugesan | 2022 |
A trust-based model for secure routing against RPL attacks in internet of things | Sensors | Syeda Mariam Muzammal Raja Kumar Murugesan Noor Zaman Jhanjhi Mamoona Humayun Ashraf Osman Ibrahim | 2022/9/17 |
Toward a full exploitation of IoT in smart cities: a review of IoT anomaly detection techniques | Redhwan Al-Amri Raja Kumar Murugesan Eissa M Alshari Hussam S Alhadawi | 2022 | |
Trust and mobility-based protocol for secure routing in Internet of Things | Sensors | Syeda Mariam Muzammal Raja Kumar Murugesan NZ Jhanjhi M Shamim Hossain Abdulsalam Yassine | 2022/8/18 |
A clustering algorithm for evolving data streams using temporal spatial hyper cube | Applied Sciences | Redhwan Al-amri Raja Kumar Murugesan Mubarak Almutairi Kashif Munir Gamal Alkawsi | 2022/6/27 |
Influence maximization diffusion models based on engagement and activeness on instagram | Journal of King Saud University-Computer and Information Sciences | Kristo Radion Purba David Asirvatham Raja Kumar Murugesan | 2022/6/1 |
Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security. | Intelligent Automation & Soft Computing | Rafia Afzal Raja Kumar Murugesan | 2022/3/1 |
A study on activity recognition technology for elderly care | Int. J. Curr. Res. Rev | Hemalata Vasudavan Sumathi Balakrishnan Raja Kumar Murugesan | 2021/6 |
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing | Poornima Mahadevappa Raja Kumar Murugesan | 2021 | |
Improving the security of mobile IPV6 signalling using KECCAK/SHA-3 | Journal of Engineering Science and Technology | SUPRIYANTO Praptodiyono TEGUH Firmansyah RAJA KUMAR Murugesan MUDRIK Alaydrus RANDY Aprilia | 2021/6 |
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation | Rafia Afzal Raja Kumar Murugesan | 2021 | |
Influence maximization algorithm: Review on current approaches and limitations. | Kristo Radion Purba David Asirvatham Raja Kumar Murugesan | 2021/4/1 |