default search action
Balaji Rajendran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Jitendra Kumar, Balaji Rajendran, Sithu D. Sudarsan:
Zero-Day Malware Classification and Detection Using Machine Learning. SN Comput. Sci. 5(1): 93 (2024) - [c16]Sanjay Adiwal, S. Shuaib Ahmed, Balaji Rajendran, Mohammad Misbahuddin, S. D. Sudarsan:
Role of PKI in Securing AMQP Communication. PKIA 2024: 1-8 - 2023
- [c15]Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D, Sithu D. Sudarsan:
Health Assessment of 1485 Top Level Domain's Name Servers. COMSNETS 2023: 54-59 - [c14]Anoop Kumar Pandey, Aashish Banati, Balaji Rajendran, Sithu D. Sudarsan, K. K. Soundra Pandian:
Cryptographic Challenges and Security in Post Quantum Cryptography Migration: A Prospective Approach. PKIA 2023: 1-8 - 2022
- [j4]Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D:
A Quantitative Method for Measuring Health of Authoritative Name Servers. Int. J. Inf. Secur. Priv. 16(1): 1-19 (2022) - [c13]Lavanya Palani, Anoop Kumar Pandey, Balaji Rajendran, B. S. Bindhumadhava, Sithu D. Sudarsan:
A Study of PKI Ecosystem in South Asian and Oceania Countries. PKIA 2022: 1-5 - 2021
- [j3]Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D, Gopinath Palaniappan:
Revisiting the Performance of DNS Queries on a DNS Hierarchy Testbed over Dual-Stack. Comput. J. 64(6): 843-859 (2021) - 2020
- [j2]Anoop Kumar Pandey, Balaji Rajendran, Kumari Roshni V. S:
AutoAdd: Automated Bootstrapping of an IoT Device on a Network. SN Comput. Sci. 1(1): 46:1-46:5 (2020) - [c12]Anoop Kumar Pandey, Saubhik Kumar, Balaji Rajendran, B. S. Bindhumadhava:
e-Parakh: Unsupervised Online Examination System. TENCON 2020: 667-671
2010 – 2019
- 2019
- [i1]Gopinath Palaniappan, Balaji Rajendran, S. Sangeetha, Kumari Roshni V. S:
An Intrusion Using Malware and DDNS. CoRR abs/1902.09158 (2019) - 2017
- [c11]Selva Kumar Shekar, Kayarvizhy Nagappan, Balaji Rajendran:
SADI: Stochastic Approach to Compute Degree of Importance in Web-Based Information Propagation. CSOC (3) 2017: 331-338 - [c10]Balaji Rajendran:
Evolution of PKI ecosystem. PKIA 2017: 9-10 - [c9]Jitendra Kumar, Balaji Rajendran, B. S. Bindhumadhava, N. Sarat Chandra Babu:
XML wrapping attack mitigation using positional token. PKIA 2017: 36-42 - [c8]Anoop Kumar Pandey, Balaji Rajendran, B. S. Bindhumadhava:
Digital token based remote administration. PKIA 2017: 63-66 - [c7]Balaji Rajendran, Anoop Kumar Pandey, B. S. Bindhumadhava:
Secure and privacy preserving digital payment. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-5 - 2013
- [c6]V. Spoorthi, Balaji Rajendran, K. Chandrasekaran:
Key Update Mechanism in PKI: Study and a New Approach. ADCONS 2013: 253-258 - 2010
- [p1]Balaji Rajendran, Iyakutti Kombiah:
Socio-contextual Network Mining for User Assistance in Web-based Knowledge Gathering Tasks. From Sociology to Computing in Social Networks 2010: 81-93
2000 – 2009
- 2009
- [j1]Balaji Rajendran, Neelanarayanan Venkataraman:
FOSS Solutions for Community Development. Int. J. Inf. Commun. Technol. Hum. Dev. 1(1): 22-32 (2009) - [c5]Balaji Rajendran, Dnyanesh Pawar:
An intelligent contextual support system for intrusion detection tasks. CHIMIT 2009 - [c4]Balaji Rajendran, K. Iyakutti:
Socio-contextual model of knowledge sharing among user assisting agents. ISI 2009: 260-265 - [c3]Balaji Rajendran, K. Iyakutti:
Cognitive Agents for Understanding the Complexities Involved in Web-based Knowledgegathering Tasks. SMC 2009: 1310-1315 - 2008
- [c2]Balaji Rajendran:
Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems. ISI Workshops 2008: 384-389 - 2004
- [c1]Sree Kumar R., Neelanarayanan Venkataraman, Balaji R.:
Deployment of ICT application in rural India - our experience. ICWI 2004: 965-968
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint