
Rajarshi Roy ChowdhuryUniversiti Brunei Darussalam · Energy Systems Engineering
Rajarshi Roy Chowdhury
About
19
Publications
1,094
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
79
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (19)
In the cyberspace, device identification has become one of the most important factors in improving security of a network, containing both Internet of Things (IoT) and non-IoT devices. Resource-constraint IoT devices are generally more vulnerable than non-IoT devices, to different kinds of security threats, including Mirai botnet and spoofing attack...
The One Belt One Road Initiative (OBOR) by China presents a grand vision to the world that aims to foster cooperation among different countries in various fields such as global trade, international relations, infrastructure development, education, and technology. Also known as the Belt and Road Initiative (BRI), it comprises a network of roads, rai...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new security challenges to network administrators. Accurate device identification in the increasingly complex network structures is necessary. In this paper, a device fingerprinting (DFP) method has been proposed for device identification, based on digital foo...
span lang="EN-US">The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new security challenges to network administrators. Accurate device identification in the increasingly complex network structures is necessary. In this paper, a device fingerprinting (DFP) method has been proposed for device identification, ba...
The Internet of Things can be considered a technological revolution and has successfully merged the physical world with the digital world. However, heterogeneous IoT devices with different functionalities impose new security challenges in cyberspace, including node forgery, unauthorized access to data and cyberattacks. It is essential to identify n...
The usage of technologically advanced devices has seen a boom in many domains, including education, automation, and healthcare; with most of the services requiring Internet-connectivity. To secure a network, device identification plays key role. In this paper, a device fingerprinting (DFP) model, which is able to distinguish between Internet of Thi...
Matrix factorization (MS) is a collaborative filtering (CF) based approach, which is widely used for recommendation systems (RS). In this research work, we deal with the content recommendation problem for users in a content management system (CMS) based on users’ feedback data. The CMS is applied for publishing and pushing curated content to the em...
The usage of technologically advanced devices has seen a boom in many domains, including education, automation, and healthcare; with most of the services requiring Internet connectivity. To secure a network, device identification plays key role. In this paper, a device fingerprinting (DFP) model, which is able to distinguish between Internet of Thi...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new security challenges to network administrators. Accurate device identification in the increasingly complex network structures is necessary. In this paper, a device fingerprinting (DFP) method has been proposed for device identification, based on digital foo...
Modernization and technological advancement have made smart and convenient living environments, including smart houses and smart cities, possible, by combining the Internet of Things (IoT), data, and internet-based services over various communication protocols. IoT is the next generation of the Internet. However, commonly resource-constraint IoT de...
In cyberspace, a large number of Internet of Things (IoT) devices from different manufacturers with heterogeneous functionalities are connected together. It is challenging to identify all these devices in an IoT ecosystem. The situation becomes even more complicated when the devices come from the same manufacturer and of similar types due to their...
Matrix factorization (MS) is a collaborative filtering (CF) based approach, which is widely used for recommendation systems (RS). In this research work, we deal with the content recommendation problem for users in a content management system (CMS) based on users' feedback data. The CMS is applied for publishing and pushing curated content to the em...
Device fingerprinting is a problem of identifying a network device using network traffic data to secure against cyber-attacks. Automated device classification from a large set of network traffic features space is challenging for the devices connected in the cyberspace. In this work, the idea is to define a device-specific unique fingerprint by anal...
With the growth of wireless network technology-based devices, identifying the communication behaviour of wireless connectivity enabled devices, e.g. Internet of Things (IoT) devices, is one of the vital aspects, in managing and securing IoT networks. Initially, devices use frames to connect to the access point on the local area network and then, us...
Device identification is the process of identifying a device on Internet without using its assigned network or other credentials. The sharp rise of usage in Internet of Things (IoT) devices has imposed new challenges in device identification due to a wide variety of devices, protocols and control interfaces. In a network, conventional IoT devices i...
Cloud computing refers to high scalable computing applications, storages and platforms as a service to companies, individuals and governments. Therefore, SMB (Small and Medium Business) organizations are adapting cloud computing services gradually to save cost and to increase efficiency in their business environment. While cloud service benefits an...
Our goal is to propose and design a symmetric-key interdomain end-to-end authentication protocols for a mobile system. We will be considering three mobile service domains; each has an authentication server. We denote by AS1,AS2 and AS3 corresponding authentication servers. For simplicity, let AS1, AS2 ,AS3 represent those threedomains. This mobile...