A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches SM Muzammal, RK Murugesan, NZ Jhanjhi IEEE Internet of Things Journal 8 (6), 4186-4210, 2020 | 130 | 2020 |
A review of machine learning and deep learning techniques for anomaly detection in IoT data R Al-amri, RK Murugesan, M Man, AF Abdulateef, MA Al-Sharafi, ... Applied Sciences 11 (12), 5320, 2021 | 106 | 2021 |
Smart home technologies: A preliminary review S Balakrishnan, H Vasudavan, RK Murugesan Proceedings of the 6th International Conference on Information Technology …, 2018 | 55 | 2018 |
Classification of instagram fake users using supervised machine learning algorithms KR Purba, D Asirvatham, RK Murugesan International Journal of Electrical and Computer Engineering 10 (3), 2763, 2020 | 46 | 2020 |
A theoretical framework to build trust and prevent fake news in social media using blockchain TW Jing, RK Murugesan Recent trends in data science and soft computing: Proceedings of the 3rd …, 2019 | 43 | 2019 |
SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications SM Muzammal, RK Murugesan, NZ Jhanjhi, LT Jung 2020 International Conference on Computational Intelligence (ICCI), 305-310, 2020 | 40 | 2020 |
Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods Supriyanto, IH Hasbullah, RK Murugesan, S Ramadass IETE Technical Review 30 (1), 64-71, 2013 | 38 | 2013 |
Instagram post popularity trend analysis and prediction using hashtag, image assessment, and user history features. KR Purba, D Asirvatham, RK Murugesan Int. Arab J. Inf. Technol. 18 (1), 85-94, 2021 | 29 | 2021 |
Security mechanism for IPv6 stateless address autoconfiguration S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ... 2015 International Conference on Automation, Cognitive Science, Optics …, 2015 | 27 | 2015 |
A trust-based model for secure routing against RPL attacks in internet of things SM Muzammal, RK Murugesan, NZ Jhanjhi, M Humayun, AO Ibrahim, ... Sensors 22 (18), 7052, 2022 | 22 | 2022 |
Securing duplicate address detection on IPv6 using distributed trust mechanism S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ... Int J Simulation—Systems, Sci Technol 17 (26), 2016 | 22 | 2016 |
Trust and mobility-based protocol for secure routing in Internet of Things SM Muzammal, RK Murugesan, NZ Jhanjhi, MS Hossain, A Yassine Sensors 22 (16), 6215, 2022 | 19 | 2022 |
A study on leveraging blockchain technology for IoT security enhancement SM Muzammal, RK Murugesan 2018 Fourth International Conference on Advances in Computing, Communication …, 2018 | 19 | 2018 |
Trust network, blockchain and evolution in social media to build trust and prevent fake news WJ Tee, RK Murugesan 2018 Fourth International Conference on Advances in Computing, Communication …, 2018 | 19 | 2018 |
Introducing mobility metrics in trust-based security of routing protocol for internet of things SM Muzammal, RK Murugesan, NZ Jhanjhi 2021 National Computing Colleges Conference (NCCC), 1-5, 2021 | 16 | 2021 |
Toward a full exploitation of IoT in smart cities: a review of IoT anomaly detection techniques R Al-Amri, RK Murugesan, EM Alshari, HS Alhadawi Proceedings of International Conference on Emerging Technologies and …, 2022 | 15 | 2022 |
Improvement of address resolution security in IPv6 local network using trust-ND S Praptodiyono, IH Hasbullah, M Anbar, RK Murugesan, A Osman TELKOMNIKA Indonesian Journal of Electrical Engineering 13 (1), 195-202, 2015 | 14 | 2015 |
Cognitive IoT integration for smart healthcare: Case study for heart disease detection and monitoring KGRR Devi, RM Chozhan, R Murugesan 2019 international conference on recent advances in energy-efficient …, 2019 | 13 | 2019 |
Improving security of duplicate address detection on IPv6 local network in public area S Praptodiyono, IH Hasbullah, MM Kadhum, RK Murugesan, CY Wey, ... 2015 9th Asia Modelling Symposium (AMS), 123-128, 2015 | 13 | 2015 |
Review on ipv6 security vulnerability issues and mitigation methods RK Murugesan, S Ramadass International Journal of Network Security & Its Applications 4 (6), 173, 2012 | 13 | 2012 |