


default search action
Raja Kumar Murugesan
Person information
- affiliation: Taylor's University, Selangor, Malaysia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Abhiram Sharma
, R. Suganya
, P. B. Krishna
, Rudra Raj
, Raja Kumar Murugesan
:
Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE. IEEE Access 12: 195926-195942 (2024) - 2022
- [j11]Kristo Radion Purba, David Asirvatham
, Raja Kumar Murugesan
:
Influence maximization diffusion models based on engagement and activeness on instagram. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2831-2839 (2022) - [j10]Syeda Mariam Muzammal
, Raja Kumar Murugesan
, NZ Jhanjhi
, M. Shamim Hossain
, Abdulsalam Yassine:
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. Sensors 22(16): 6215 (2022) - [j9]Syeda Mariam Muzammal
, Raja Kumar Murugesan
, Noor Zaman Jhanjhi
, Mamoona Humayun
, Ashraf Osman Ibrahim
, Abdelzahir Abdelmaboud
:
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things. Sensors 22(18): 7052 (2022) - 2021
- [j8]Kristo Radion Purba, David Asirvatham
, Raja Kumar Murugesan
:
Instagram post popularity trend analysis and prediction using hashtag, image assessment, and user history features. Int. Arab J. Inf. Technol. 18(1): 85-94 (2021) - [j7]Syeda Mariam Muzammal, Raja Kumar Murugesan:
Enhanced authentication and access control in Internet of Things: a potential blockchain-based method. Int. J. Grid Util. Comput. 12(5/6): 469-485 (2021) - [j6]Syeda Mariam Muzammal
, Raja Kumar Murugesan
, N. Z. Jhanjhi
:
A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches. IEEE Internet Things J. 8(6): 4186-4210 (2021) - [c10]Rafia Afzal, Raja Kumar Murugesan
:
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. ACeS 2021: 459-468 - [c9]Poornima Mahadevappa
, Raja Kumar Murugesan
:
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. ACeS 2021: 505-514 - [i3]Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan:
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks. CoRR abs/2111.01383 (2021) - [i2]Poornima Mahadevappa, Raja Kumar Murugesan:
A Data Quarantine Model to Secure Data in Edge Computing. CoRR abs/2111.07672 (2021) - [i1]Poornima Mahadevappa, Raja Kumar Murugesan:
Review of Data Integrity Attacks and Mitigation Methods in Edge computing. CoRR abs/2112.02757 (2021) - 2020
- [j5]Kristo Radion Purba, David Asirvatham
, Raja Kumar Murugesan
:
An analysis and prediction model of outsiders percentage as a new popularity metric on Instagram. ICT Express 6(3): 243-248 (2020) - [c8]Poornima Mahadevappa
, Raja Kumar Murugesan
:
Study of Container-Based Virtualisation and Threats in Fog Computing. ACeS 2020: 535-549 - [c7]Tee Wee Jing
, Raja Kumar Murugesan
:
Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology. ACeS 2020: 674-684
2010 – 2019
- 2019
- [j4]Hewawasam Puwakpitiyage Chamode Anjana, Paramesura Rao Vegnish Rao, Muhammad Syahir Amali bin Muhammad Azizi, Tee Wee Jing
, Raja Kumar Murugesan
, M. D. Hamzah:
A Proposed Web Based Real Time Brain Computer Interface (BCI) System for Usability Testing. Int. J. Online Biomed. Eng. 15(7): 111-123 (2019) - [j3]Hewawasam Puwakpitiyage Chamode Anjana, Paramesura Rao Vegnish Rao, Muhammad Syahir Amali bin Muhammad Azizi, Tee Wee Jing
, Raja Kumar Murugesan
, M. D. Hamzah:
A Proposed Web Based Real Time Brain Computer Interface (BCI) System for Usability Testing. Int. J. Online Biomed. Eng. 15(8): 108-119 (2019) - [c6]Syeda Mariam Muzammal
, Raja Kumar Murugesan
:
A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology. ACeS 2019: 18-32 - 2018
- [c5]Sumathi Balakrishnan, Hemalata Vasudavan, Raja Kumar Murugesan
:
Smart Home Technologies: A Preliminary Review. ICIT 2018: 120-127 - 2015
- [c4]Tee Wee Jing
, Wong Seng Yue
, Raja Kumar Murugesan
:
Learning Outcome Enhancement via Serious Game: Implementing Game-Based Learning Framework in Blended Learning Environment. ICITCS 2015: 1-3 - 2014
- [j2]Rajesh Karunamurthy, Srinivasan Rajavelu
, Raja Kumar Murugesan
:
Introduction to the special issue on Recent trends in communications and signal processing. Comput. Electr. Eng. 40(4): 1253-1254 (2014) - 2013
- [j1]Srinivasan Rajavelu
, G. Radhamani, Raja Kumar Murugesan
:
Introduction to Special Issue on Recent Trends in Communications and Signal Processing. Comput. Electr. Eng. 39(3): 971-972 (2013) - [c3]Supriyanto
, Raja Kumar Murugesan
, Azlan Osman, Sureswaran Ramadass:
Security mechanism for IPv6 router discovery based on distributed trust management. RFID-TA 2013: 1-6 - 2010
- [c2]Raja Kumar Murugesan
, Sureswaran Ramadass:
A plausible approach for further decentralization of IPv6 address distribution. AINTEC 2010: 1-8 - [c1]Raja Kumar Murugesan
, Sureswaran Ramadass:
A Hybrid Address Allocation Algorithm for IPv6. CNSA 2010: 509-517
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-14 17:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint