Shitharth
Shitharth
Home
Skills
Experience
Achievements
Certifications
Publications
Gallery
Contact
CV
Light
Dark
Automatic
security
SCMC: Smart city measurement and control process for data security with data mining algorithms
In this paper the importance of monitoring smart city with integration of sensors and Internet of Things (IoT) is discussed with …
Shitharth Selvarajan
,
Hariprasath Manoharan
,
Sonali Goel
,
Chiranjeevi Prakash Akili
,
S. Murugesan
,
Vaishali Joshi
Cite
DOI
URL
Federated learning optimization: A computational blockchain process with offloading analysis to enhance security
The Internet of Things (IoT) technology in various applications used in data processing systems requires high security because more …
Shitharth Selvarajan
,
Hariprasath Manoharan
,
Achyut Shankar
,
Rakan A. Alsowail
,
Saravanan Pandiaraj
,
Seyyed Ahmad Edalatpanah
,
Wattana Viriyasitavat
Cite
DOI
URL
Improved Security for Multimedia Data Visualization Using Hierarchical Clustering Algorithm
In this paper, a realization technique is designed with unique analytical model for transmitting multimedia data to appropriate end …
Shitharth Selvarajan
,
Hariprasath Manoharan
,
Alaa O. Khadidos
,
Achyut Shankar
,
Carsten Maple
,
Adil O. Khadidos
,
Shahid Mumtaz
Cite
DOI
URL
A security model for smart grid SCADA systems using stochastic neural network
Detection of cyber-threats in the smart grid Supervisory Control and Data Acquisition (SCADA) is still remains one of the complex and …
Osama Bassam J. Rabie
,
Shitharth Selvarajan
,
Daniyal Alghazzawi
,
Abhishek Kumar
,
Syed Hasan
,
Muhammad Zubair Asghar
Cite
DOI
URL
Adaptive neuro-fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs
Vehicular Adhoc Networks (VANET) facilitate inter-vehicle communication using their dedicated connection infrastructure. Numerous …
V Thiruppathy Kesavan
,
S Murugavalli
,
Manoharan Premkumar
,
Shitharth Selvarajan
Cite
DOI
URL
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous …
Shitharth Selvarajan
,
Gautam Srivastava
,
Alaa O. Khadidos
,
Adil O. Khadidos
,
Mohamed Baza
,
Ali Alshehri
,
Jerry Chun-Wei Lin
Cite
DOI
Distinctive Measurement Scheme for Security and Privacy in Internet of Things Applications Using Machine Learning Algorithms
More significant data are available thanks to the present Internet of Things (IoT) application trend, which can be accessed in the …
Wadee Alhalabi
,
Amal Al-Rasheed
,
Hariprasath Manoharan
,
Eatedal Alabdulkareem
,
Mai Alduailij
,
Mona Alduailij
,
Shitharth Selvarajan
Cite
DOI
URL
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm
In recent years the process of transportation needs a highly effective traffic system in order to monitor all consumer goods as many …
Shitharth Selvarajan
,
Fahad S. Alotaibi
,
Hariprasath Manoharan
,
Adil O. Khadidos
,
Khaled H. Alyoubi
,
Abdulrhman M. Alshareef
Cite
DOI
URL
Malware Detection Classification using Recurrent Neural Network
Nowadays, increasing numbers of malicious programs are becoming a serious problem, which increases the need for automated detection and …
P.Suresh Kumar
,
Umi Salma. B
,
Isa Mishra
,
Shitharth Selvarajan
,
Diwakar Ramanuj Tripathi
Cite
DOI
URL
An Intelligent Security Framework Based on Collaborative Mutual Authentication Model for Smart City Networks
With the advent of smart city networks and increased utilization of vehicles, the Internet of Vehicles (IoV) has attracted more …
Alaa O. Khadidos
,
Shitharth Selvarajan
,
Hariprasath Manoharan
,
Ayman Yafoz
,
Adil O. Khadidos
,
Khaled H. Alyoubi
Cite
DOI
URL
»
Cite
×