Follow
Rafidha Rehiman KA
Rafidha Rehiman KA
Assistant Professor
Verified email at cusat.ac.in
Title
Cited by
Cited by
Year
A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices –An Initial Prototype
KAR Rehiman, S Veni
Indian journal of science and technology, 2016
212016
A trust management model for sensor enabled mobile devices in IoT
KAR Rehiman, S Veni
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017
172017
Security, Privacy and Trust for smart Mobile devices in Internet of Things – A Literature Study
RR K A
International Journal of Advanced Research in Computer Engineering and …, 2015
10*2015
Blockchain federated learning framework for privacy-preservation
KM Sameera, P Vinod, KAR Rehiman, PN Jifhna, S Sebastian
International conference on advancements in smart computing and information …, 2022
32022
Multi-domain network traffic analysis using machine learning and deep learning techniques
D Arikkat, RR KA, Vinod, SY Yerima, Manoja, Pooja, S Sekhar, S James, ...
Proceedings of the 2022 Fourteenth International Conference on Contemporary …, 2022
32022
Compression and encryption approach for data security in mobile internet of things
M Hamburg
Int J Adv Res Comput Eng Technol 6 (1), 39-42, 2017
22017
A Privacy Preservation Framework Using Integration of Blockchain and Federated Learning
KM Sameera, KA Rafidha Rehiman, P Vinod
SN Computer Science 4 (6), 703, 2023
12023
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?
DR Arikkat, A Di Sorbo, CA Visaggio, M Conti
arXiv preprint arXiv:2306.16087, 2023
12023
Using Neural Network classifier Support Vector Machine Regression for the prediction of Melting Point of Drug-like compounds
KAR Rahiman, K Balakrishnan, KB Sherly
2011 International Conference on Emerging Trends in Electrical and Computer …, 2011
12011
Privacy-preserving in Blockchain-based Federated Learning systems
KM Sameera, S Nicolazzo, M Arazzi, A Nocera, RR KA, P Vinod, M Conti
Computer Communications, 2024
2024
CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition
PC Aravind, DR Arikkat, AS Krishnan, B Tesneem, A Sebastian, MJ Dev, ...
International Conference on Advancements in Smart Computing and Information …, 2023
2023
NLP-Based Techniques for Cyber Threat Intelligence
M Arazzi, DR Arikkat, S Nicolazzo, A Nocera, M Conti
arXiv preprint arXiv:2311.08807, 2023
2023
EXAM: Explainable Models for Analyzing Malicious Android Applications
KA Asmitha, P Vinod, KAR Rehiman, RP Verma, R Kumar, S Kumari, ...
International Conference on Advancements in Smart Computing and Information …, 2022
2022
Identity-Based Hashing and Light Weight Signature Scheme for IoT
KA Rafidha Rehiman, S Veni
New Trends in Computational Vision and Bio-inspired Computing: Selected …, 2020
2020
The Implementation Results of Identity-Based Hashing Algorithm for IoT
SV Rafidha Rehiman KA
International Journal of Innovative Technology and Exploring Engineering …, 2019
2019
Secure Method for Short Message Encoding And Encryption Using Elliptic Curve For IOT Mobile Devices
DSV Rafidha Rehiman K A
International Journal of Pure and Applied Mathematics 119 (No. 12), 15269-15278, 2018
2018
Detecting Low-Quality Models in Multidomain Federated Learning Systems
S KM, A Sgueglia, R Rehiman KA, CA Visaggio, A Di Sorbo
A SECRET SHARING SCHEME AND NATIONAL SECURITY ENHANCEMENT THROUGH NATURAL LANGUAGE PROCESSING
RR KA, L KS
The system can't perform the operation now. Try again later.
Articles 1–18