D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 40 Citations 7,661 481 World Ranking 5759 National Ranking 154

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

His scientific interests lie mostly in Computer security, Computer network, Cloud computing security, Access control and Computer security model. His research integrates issues of Cloud computing and The Internet in his study of Computer security. His Cloud computing study combines topics from a wide range of disciplines, such as Virtual machine, Anomaly detection and Intrusion detection system.

His Computer network research incorporates themes from Network Access Control, Security association, Wireless ad hoc network and Scheme. His specific area of interest is Access control, where Vijay Varadharajan studies Role-based access control. His study in Computer security model is interdisciplinary in nature, drawing from both Trust management, Security service, Security information and event management and Property.

His most cited work include:

  • Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage (265 citations)
  • Review: Wireless sensor network key management survey and taxonomy (228 citations)
  • TrustLite: a security architecture for tiny embedded devices (204 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Computer network, Access control, Authorization and Cryptography. His Computer security research integrates issues from Cloud computing and Cloud computing security. The study incorporates disciplines such as Wireless ad hoc network, Intrusion detection system and Distributed computing in addition to Computer network.

His work in Intrusion detection system covers topics such as Virtual machine which are related to areas like Enterprise information security architecture. His research on Access control focuses in particular on Role-based access control. His Cryptography research includes elements of Encryption and Public-key cryptography.

He most often published in these fields:

  • Computer security (56.67%)
  • Computer network (24.51%)
  • Access control (16.67%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (56.67%)
  • Software-defined networking (4.12%)
  • Computer network (24.51%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Software-defined networking, Computer network, Enterprise information security architecture and Malware. Vijay Varadharajan has included themes like Cloud computing and Cloud computing security in his Computer security study. The various areas that Vijay Varadharajan examines in his Cloud computing study include Virtual machine, Data security, Encryption and Cryptography.

His work on PATH is typically connected to Control theory as part of general Computer network study, connecting several disciplines of science. In his work, Computer security model and Software security assurance is strongly intertwined with Distributed System Security Architecture, which is a subfield of Enterprise information security architecture. His Malware research is multidisciplinary, incorporating elements of Data mining, Classifier, Artificial intelligence, Android and Evasion.

Between 2015 and 2021, his most popular works were:

  • A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection (132 citations)
  • Autoencoder-based feature learning for cyber security applications (112 citations)
  • Intrusion detection techniques in cloud environment (91 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Operating system

Computer security, Cloud computing security, Intrusion detection system, Cloud computing and Computer network are his primary areas of study. Computer security and Software-defined networking are frequently intertwined in his study. His Intrusion detection system study incorporates themes from Machine learning, Anomaly detection, The Internet and Malware.

His Cloud computing research is multidisciplinary, relying on both Virtual machine, Cryptography and Internet privacy. His work investigates the relationship between Cryptography and topics such as Computer data storage that intersect with problems in Encryption. His Computer network study combines topics in areas such as Domain and Database.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage

Lan Zhou;Vijay Varadharajan;Michael Hitchens.
IEEE Transactions on Information Forensics and Security (2013)

459 Citations

Review: Wireless sensor network key management survey and taxonomy

Junqi Zhang;Vijay Varadharajan.
Journal of Network and Computer Applications (2010)

349 Citations

TrustLite: a security architecture for tiny embedded devices

Patrick Koeberl;Steffen Schulz;Ahmad-Reza Sadeghi;Vijay Varadharajan.
european conference on computer systems (2014)

320 Citations

A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection

Preeti Mishra;Vijay Varadharajan;Uday Tupakula;Emmanuel S. Pilli.
IEEE Communications Surveys and Tutorials (2019)

309 Citations

Autoencoder-based feature learning for cyber security applications

Mahmood Yousefi-Azar;Vijay Varadharajan;Len Hamey;Uday Tupakula.
international joint conference on neural network (2017)

230 Citations

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Jia Yu;Kui Ren;Cong Wang;Vijay Varadharajan.
IEEE Transactions on Information Forensics and Security (2015)

203 Citations

An analysis of the proxy problem in distributed systems

V. Varadharajan;P. Allen;S. Black.
ieee symposium on security and privacy (1991)

186 Citations

CP-ABE With Constant-Size Keys for Lightweight Devices

Fuchun Guo;Yi Mu;Willy Susilo;Duncan S. Wong.
IEEE Transactions on Information Forensics and Security (2014)

179 Citations

Intrusion detection techniques in cloud environment

Preeti Mishra;Emmanuel S. Pilli;Vijay Varadharajan;Udaya Tupakula.
Journal of Network and Computer Applications (2017)

177 Citations

A Trust based Access Control Framework for P2P File-Sharing Systems

Huu Tran;M. Hitchens;V. Varadharajan;P. Watters.
hawaii international conference on system sciences (2005)

173 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Vijay Varadharajan

Yan Wang

Yan Wang

Macquarie University

Publications: 45

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 39

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 34

Zheng Yan

Zheng Yan

Xidian University

Publications: 31

Hua Wang

Hua Wang

Victoria University

Publications: 30

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 21

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 21

Yi Mu

Yi Mu

Fujian Normal University

Publications: 21

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 20

Yanchun Zhang

Yanchun Zhang

Victoria University

Publications: 19

Frank Piessens

Frank Piessens

KU Leuven

Publications: 16

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 16

Max Mühlhäuser

Max Mühlhäuser

Technical University of Darmstadt

Publications: 15

Elizabeth Chang

Elizabeth Chang

University of New South Wales

Publications: 15

Mehmet A. Orgun

Mehmet A. Orgun

Macquarie University

Publications: 14

Shui Yu

Shui Yu

University of Technology Sydney

Publications: 13

Trending Scientists

Hiroshi Imai

Hiroshi Imai

University of Tokyo

Mani Golparvar-Fard

Mani Golparvar-Fard

University of Illinois at Urbana-Champaign

Yiping Wang

Yiping Wang

Shenzhen University

Richard F. Heck

Richard F. Heck

University of Delaware

Takayoshi Nakano

Takayoshi Nakano

Osaka University

José M. Sogo

José M. Sogo

ETH Zurich

Niro Higuchi

Niro Higuchi

National Institute of Amazonian Research

Chaolun Allen Chen

Chaolun Allen Chen

Academia Sinica

Thomas C. Harrington

Thomas C. Harrington

Iowa State University

Marco Giovannini

Marco Giovannini

University of California, Los Angeles

Andrew P. Negri

Andrew P. Negri

Australian Institute of Marine Science

R.D.G. Theakston

R.D.G. Theakston

Liverpool School of Tropical Medicine

Peter W. M. Hermans

Peter W. M. Hermans

University Medical Center Utrecht

Weiqi Zhou

Weiqi Zhou

Chinese Academy of Sciences

Anthony J. Windebank

Anthony J. Windebank

Mayo Clinic

Eliana Palazzi

Eliana Palazzi

National Institute for Astrophysics

Something went wrong. Please try again later.