His scientific interests lie mostly in Computer security, Computer network, Cloud computing security, Access control and Computer security model. His research integrates issues of Cloud computing and The Internet in his study of Computer security. His Cloud computing study combines topics from a wide range of disciplines, such as Virtual machine, Anomaly detection and Intrusion detection system.
His Computer network research incorporates themes from Network Access Control, Security association, Wireless ad hoc network and Scheme. His specific area of interest is Access control, where Vijay Varadharajan studies Role-based access control. His study in Computer security model is interdisciplinary in nature, drawing from both Trust management, Security service, Security information and event management and Property.
His main research concerns Computer security, Computer network, Access control, Authorization and Cryptography. His Computer security research integrates issues from Cloud computing and Cloud computing security. The study incorporates disciplines such as Wireless ad hoc network, Intrusion detection system and Distributed computing in addition to Computer network.
His work in Intrusion detection system covers topics such as Virtual machine which are related to areas like Enterprise information security architecture. His research on Access control focuses in particular on Role-based access control. His Cryptography research includes elements of Encryption and Public-key cryptography.
His primary areas of study are Computer security, Software-defined networking, Computer network, Enterprise information security architecture and Malware. Vijay Varadharajan has included themes like Cloud computing and Cloud computing security in his Computer security study. The various areas that Vijay Varadharajan examines in his Cloud computing study include Virtual machine, Data security, Encryption and Cryptography.
His work on PATH is typically connected to Control theory as part of general Computer network study, connecting several disciplines of science. In his work, Computer security model and Software security assurance is strongly intertwined with Distributed System Security Architecture, which is a subfield of Enterprise information security architecture. His Malware research is multidisciplinary, incorporating elements of Data mining, Classifier, Artificial intelligence, Android and Evasion.
Computer security, Cloud computing security, Intrusion detection system, Cloud computing and Computer network are his primary areas of study. Computer security and Software-defined networking are frequently intertwined in his study. His Intrusion detection system study incorporates themes from Machine learning, Anomaly detection, The Internet and Malware.
His Cloud computing research is multidisciplinary, relying on both Virtual machine, Cryptography and Internet privacy. His work investigates the relationship between Cryptography and topics such as Computer data storage that intersect with problems in Encryption. His Computer network study combines topics in areas such as Domain and Database.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
Lan Zhou;Vijay Varadharajan;Michael Hitchens.
IEEE Transactions on Information Forensics and Security (2013)
Review: Wireless sensor network key management survey and taxonomy
Junqi Zhang;Vijay Varadharajan.
Journal of Network and Computer Applications (2010)
TrustLite: a security architecture for tiny embedded devices
Patrick Koeberl;Steffen Schulz;Ahmad-Reza Sadeghi;Vijay Varadharajan.
european conference on computer systems (2014)
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection
Preeti Mishra;Vijay Varadharajan;Uday Tupakula;Emmanuel S. Pilli.
IEEE Communications Surveys and Tutorials (2019)
Autoencoder-based feature learning for cyber security applications
Mahmood Yousefi-Azar;Vijay Varadharajan;Len Hamey;Uday Tupakula.
international joint conference on neural network (2017)
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Jia Yu;Kui Ren;Cong Wang;Vijay Varadharajan.
IEEE Transactions on Information Forensics and Security (2015)
An analysis of the proxy problem in distributed systems
V. Varadharajan;P. Allen;S. Black.
ieee symposium on security and privacy (1991)
CP-ABE With Constant-Size Keys for Lightweight Devices
Fuchun Guo;Yi Mu;Willy Susilo;Duncan S. Wong.
IEEE Transactions on Information Forensics and Security (2014)
Intrusion detection techniques in cloud environment
Preeti Mishra;Emmanuel S. Pilli;Vijay Varadharajan;Udaya Tupakula.
Journal of Network and Computer Applications (2017)
A Trust based Access Control Framework for P2P File-Sharing Systems
Huu Tran;M. Hitchens;V. Varadharajan;P. Watters.
hawaii international conference on system sciences (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: