Personal information

Activities

Works (9)

DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

Cluster Computing
2024 | Journal article
EID:

2-s2.0-85195410821

Part of ISSN: 15737543 13867857
Contributors: Rajasekar, V.R.; Rajkumar, S.
Source: Self-asserted source
RAJASEKAR V R via Scopus - Elsevier

A Study on Internet of Things Devices Vulnerabilities using Shodan

International Journal of Computing
2023 | Journal article
EID:

2-s2.0-85165057192

Part of ISSN: 23125381 17276209
Contributors: Rajasekar, V.R.; Rajkumar, S.
Source: Self-asserted source
RAJASEKAR V R via Scopus - Elsevier

Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard

Cybernetics and Information Technologies
2023 | Journal article
EID:

2-s2.0-85179469376

Part of ISSN: 13144081 13119702
Contributors: Kanshi, A.; Soundrapandiyan, R.; Anita Sofia, V.S.; Rajasekar, V.R.
Source: Self-asserted source
RAJASEKAR V R via Scopus - Elsevier

A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network

Microprocessors and Microsystems
2022 | Journal article
EID:

2-s2.0-85138052760

Part of ISSN: 01419331
Contributors: Rajasekar, V.R.; Rajkumar, S.
Source: Self-asserted source
RAJASEKAR V R via Scopus - Elsevier
grade
Preferred source (of 2)‎

Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study

2021 28th IEEE International Conference on Electronics, Circuits, and Systems (ICECS)
2021-11-28 | Conference paper | Writing - review & editing
Contributors: RAJASEKAR V R
Source: Self-asserted source
RAJASEKAR V R
grade
Preferred source (of 2)‎

Password-based Authentication in Computer Security: Why is it still there?

The SIJ Transactions on Computer Science Engineering & its Applications (CSEA)
2017-06-22 | Journal article
Part of ISSN: 2321-2373
Part of ISSN: 2321-2381
Contributors: RAJASEKAR V R
Source: Self-asserted source
RAJASEKAR V R

The need for effective information security awareness practices in Oman higher educational institutions

2016 | Conference paper
Contributors: RAJASEKAR V R
Source: Self-asserted source
RAJASEKAR V R

Multicasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication

Communications in Computer and Information Science
2012 | Journal article
Part of ISBN: 9783642352102
Part of ISBN: 9783642352119
Part of ISSN: 1865-0929
Part of ISSN: 1865-0937
Contributors: RAJASEKAR V R
Source: Self-asserted source
RAJASEKAR V R
grade
Preferred source (of 2)‎

Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography

International Journal of Computer Science and Security (IJCSS)
2009-10-21 | Journal article | Writing - review & editing
Contributors: RAJASEKAR V R
Source: Self-asserted source
RAJASEKAR V R