Research Publications for Vimal Kumar

Welcome to the University of Waikato research publications search page. This database includes all research publications produced by the University from 1998.

See Also: Research Links | Student Research Theses | Research Commons

Author's Publications

Publications ByKUMAR, Vimal

  Use our Online Phonebook to contact our current staff members.

  • Chew, C., & Kumar, V. (2019). Behaviour based ransomware detection. In G. Lee, & Y. Jin (Eds.), Proc 34th International Conference on Computers and Their Applications (CATA 2019) Vol. 58 (pp. 127-136). EasyChair. doi:10.29007/t5q7

  • Dekker, M., & Kumar, V. (2019). Using audio characteristics for mobile device authentication. In J. K. Liu, & X. Huang (Eds.), Proc International Conference on Network and System Security (NSS 2019) LNCS 11928 (pp. 98-113). Sapporo, Japan. doi:10.1007/978-3-030-36938-5_6

  • Kumar, V. (2019). A bilinear pairing based secure data aggregation scheme for WSNs. In Proc 15th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 102-107). Tangier, Morocco: IEEE. doi:10.1109/iwcmc.2019.8766759

  • Kumar, V., Spanias, A., Sen, A., & Madria, S. (2018). Secure Sensor Cloud. Morgan & Claypool. doi:10.2200/S00886ED1V01Y201811ASE018

  • Mrema, E., & Kumar, V. (2018). Fine grained attribute based access control of healthcare data. In Proc 12th International Symposium on Medical Information and Communication Technology (ISMICT 2018) (pp. 5 pages). Conference held Sydney, Australia: IEEE. doi:10.1109/ISMICT.2018.8573699

  • Reichherzer, T., Timm, M., Earley, N., Reyes, N., & Kumar, V. (2017). Using machine learning techniques to track individuals & their fitness activities. In A. Bossard, G. Lee, & L. Miller (Eds.), Proc 32nd International Conference on Computers and Their Applications (pp. 119-124). Conference held Honolulu, Hawaii.

  • Tang, C., Kumar, V., & Chaisiri, S. (2017). Understanding software-defined perimeter. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 151-169). London: IET. doi:10.1049/PBSE007E_ch7

  • Kumar, V., Chaisiri, S., & Ko, R. (Eds.) (2017). Data security in cloud computing. Institution of Engineering and Technology.

  • Kumar, V., Chaisiri, S., & Ko, R. (2017). A data-centric view of cloud security. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 1-17). London: IET. doi:10.1049/PBSE007E_ch1

  • Bowen, J., Hinze, A., Griffiths, C., Kumar, V., & Bainbridge, D. (2017). Personal data collection in the workplace: ethical and technical challenges. In Proc 31st British Human Computer Interaction Conference (HCI 2017) (pp. 10 pages). Conference held Sunderland, UK. doi:10.14236/ewic/HCI2017.57

This page has been reformatted for printing.