Follow
Raja kumar Murugesan
Raja kumar Murugesan
Verified email at taylors.edu.my
Title
Cited by
Cited by
Year
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan, NZ Jhanjhi
IEEE Internet of Things Journal 8 (6), 4186-4210, 2020
1242020
A review of machine learning and deep learning techniques for anomaly detection in IoT data
R Al-amri, RK Murugesan, M Man, AF Abdulateef, MA Al-Sharafi, ...
Applied Sciences 11 (12), 5320, 2021
952021
Smart home technologies: A preliminary review
S Balakrishnan, H Vasudavan, RK Murugesan
Proceedings of the 6th International Conference on Information Technology …, 2018
532018
Classification of instagram fake users using supervised machine learning algorithms
KR Purba, D Asirvatham, RK Murugesan
International Journal of Electrical and Computer Engineering 10 (3), 2763, 2020
442020
A theoretical framework to build trust and prevent fake news in social media using blockchain
TW Jing, RK Murugesan
Recent trends in data science and soft computing: Proceedings of the 3rd …, 2019
422019
SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications
SM Muzammal, RK Murugesan, NZ Jhanjhi, LT Jung
2020 International Conference on Computational Intelligence (ICCI), 305-310, 2020
382020
Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods
Supriyanto, IH Hasbullah, RK Murugesan, S Ramadass
IETE Technical Review 30 (1), 64-71, 2013
382013
Instagram post popularity trend analysis and prediction using hashtag, image assessment, and user history features.
KR Purba, D Asirvatham, RK Murugesan
Int. Arab J. Inf. Technol. 18 (1), 85-94, 2021
292021
Security mechanism for IPv6 stateless address autoconfiguration
S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ...
2015 International Conference on Automation, Cognitive Science, Optics …, 2015
262015
Securing duplicate address detection on IPv6 using distributed trust mechanism
S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ...
Int J Simulation—Systems, Sci Technol 17 (26), 2016
212016
Trust network, blockchain and evolution in social media to build trust and prevent fake news
WJ Tee, RK Murugesan
2018 Fourth International Conference on Advances in Computing, Communication …, 2018
182018
Trust and mobility-based protocol for secure routing in Internet of Things
SM Muzammal, RK Murugesan, NZ Jhanjhi, MS Hossain, A Yassine
Sensors 22 (16), 6215, 2022
162022
A study on leveraging blockchain technology for IoT security enhancement
SM Muzammal, RK Murugesan
2018 Fourth International Conference on Advances in Computing, Communication …, 2018
162018
A trust-based model for secure routing against RPL attacks in internet of things
SM Muzammal, RK Murugesan, NZ Jhanjhi, M Humayun, AO Ibrahim, ...
Sensors 22 (18), 7052, 2022
142022
Introducing mobility metrics in trust-based security of routing protocol for internet of things
SM Muzammal, RK Murugesan, NZ Jhanjhi
2021 National Computing Colleges Conference (NCCC), 1-5, 2021
142021
Improvement of address resolution security in IPv6 local network using trust-ND
S Praptodiyono, IH Hasbullah, M Anbar, RK Murugesan, A Osman
TELKOMNIKA Indonesian Journal of Electrical Engineering 13 (1), 195-202, 2015
132015
Toward a full exploitation of IoT in smart cities: a review of IoT anomaly detection techniques
R Al-Amri, RK Murugesan, EM Alshari, HS Alhadawi
Proceedings of International Conference on Emerging Technologies and …, 2022
122022
Improving security of duplicate address detection on IPv6 local network in public area
S Praptodiyono, IH Hasbullah, MM Kadhum, RK Murugesan, CY Wey, ...
2015 9th Asia Modelling Symposium (AMS), 123-128, 2015
122015
Review on ipv6 security vulnerability issues and mitigation methods
RK Murugesan, S Ramadass
International Journal of Network Security & Its Applications 4 (6), 173, 2012
122012
Review on ipv6 security vulnerability issues and mitigation methods
RK Murugesan, S Ramadass
International Journal of Network Security & Its Applications 4 (6), 173, 2012
122012
The system can't perform the operation now. Try again later.
Articles 1–20