A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices –An Initial Prototype KAR Rehiman, S Veni Indian journal of science and technology, 2016 | 21 | 2016 |
A trust management model for sensor enabled mobile devices in IoT KAR Rehiman, S Veni 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017 | 17 | 2017 |
Security, Privacy and Trust for smart Mobile devices in Internet of Things – A Literature Study RR K A International Journal of Advanced Research in Computer Engineering and …, 2015 | 10* | 2015 |
Blockchain federated learning framework for privacy-preservation KM Sameera, P Vinod, KAR Rehiman, PN Jifhna, S Sebastian International conference on advancements in smart computing and information …, 2022 | 3 | 2022 |
Multi-domain network traffic analysis using machine learning and deep learning techniques D Arikkat, RR KA, Vinod, SY Yerima, Manoja, Pooja, S Sekhar, S James, ... Proceedings of the 2022 Fourteenth International Conference on Contemporary …, 2022 | 3 | 2022 |
Compression and encryption approach for data security in mobile internet of things M Hamburg Int J Adv Res Comput Eng Technol 6 (1), 39-42, 2017 | 2 | 2017 |
A Privacy Preservation Framework Using Integration of Blockchain and Federated Learning KM Sameera, KA Rafidha Rehiman, P Vinod SN Computer Science 4 (6), 703, 2023 | 1 | 2023 |
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? DR Arikkat, A Di Sorbo, CA Visaggio, M Conti arXiv preprint arXiv:2306.16087, 2023 | 1 | 2023 |
Using Neural Network classifier Support Vector Machine Regression for the prediction of Melting Point of Drug-like compounds KAR Rahiman, K Balakrishnan, KB Sherly 2011 International Conference on Emerging Trends in Electrical and Computer …, 2011 | 1 | 2011 |
Privacy-preserving in Blockchain-based Federated Learning systems KM Sameera, S Nicolazzo, M Arazzi, A Nocera, RR KA, P Vinod, M Conti Computer Communications, 2024 | | 2024 |
CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition PC Aravind, DR Arikkat, AS Krishnan, B Tesneem, A Sebastian, MJ Dev, ... International Conference on Advancements in Smart Computing and Information …, 2023 | | 2023 |
NLP-Based Techniques for Cyber Threat Intelligence M Arazzi, DR Arikkat, S Nicolazzo, A Nocera, M Conti arXiv preprint arXiv:2311.08807, 2023 | | 2023 |
EXAM: Explainable Models for Analyzing Malicious Android Applications KA Asmitha, P Vinod, KAR Rehiman, RP Verma, R Kumar, S Kumari, ... International Conference on Advancements in Smart Computing and Information …, 2022 | | 2022 |
Identity-Based Hashing and Light Weight Signature Scheme for IoT KA Rafidha Rehiman, S Veni New Trends in Computational Vision and Bio-inspired Computing: Selected …, 2020 | | 2020 |
The Implementation Results of Identity-Based Hashing Algorithm for IoT SV Rafidha Rehiman KA International Journal of Innovative Technology and Exploring Engineering …, 2019 | | 2019 |
Secure Method for Short Message Encoding And Encryption Using Elliptic Curve For IOT Mobile Devices DSV Rafidha Rehiman K A International Journal of Pure and Applied Mathematics 119 (No. 12), 15269-15278, 2018 | | 2018 |
Detecting Low-Quality Models in Multidomain Federated Learning Systems S KM, A Sgueglia, R Rehiman KA, CA Visaggio, A Di Sorbo | | |
A SECRET SHARING SCHEME AND NATIONAL SECURITY ENHANCEMENT THROUGH NATURAL LANGUAGE PROCESSING RR KA, L KS | | |