Vasaki Ponnusamy
Vasaki Ponnusamy
Assistant Professor at Universiti Tunku Abdul Rahman, Malaysia
Verified email at
Cited by
Cited by
Internet of things and ransomware: Evolution, mitigation and prevention
M Humayun, NZ Jhanjhi, A Alsayat, V Ponnusamy
Egyptian Informatics Journal 22 (1), 105-117, 2021
Bone age assessment empowered with deep learning: a survey, open research challenges and future directions
MW Nadeem, HG Goh, A Ali, M Hussain, MA Khan, V Ponnusamy
Diagnostics 10 (10), 781, 2020
Fusion-based machine learning architecture for heart disease prediction
MW Nadeem, HG Goh, MA Khan, M Hussain, MF Mushtaq, ...
A fusion-based machine learning approach for the prediction of the onset of diabetes
MW Nadeem, HG Goh, V Ponnusamy, I Andonovic, MA Khan, M Hussain
Healthcare 9 (10), 1393, 2021
An adaptive and flexible brain energized full body exoskeleton with IoT edge for assisting the paralyzed patients
S Jacob, M Alagirisamy, VG Menon, BM Kumar, NZ Jhanjhi, ...
IEEE Access 8, 100721-100731, 2020
Energy analysis in Wireless Sensor Network: a comparison
V Ponnusamy
International Journal of Computer Networks and Communications Security 2 (9 …, 2014
Fostering Public-Private Partnership: Between Governments and Technologists in Developing National Cybersecurity Framework
V Ponnusamy, NZ Jhanjhi, M Humayun
Employing Recent Technologies for Improved Digital Governance, 237-255, 2020
ZigBee wireless communication for monitoring renewable street light system
T Ramachandran, LT Jung, V Ponnusamy, A Hudaya
2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014
Anycast group membership management protocol
V Ponnusamy, EK Karuppiah, R Abdullah
9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732) 3 …, 2003
Ddos detection in sdn usingmachine learning techniques
MW Nadeem, HG Goh, V Ponnusamy, Y Aun
Comput. Mater. Contin. 71 (1), 771-789, 2022
Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
S Kalhoro, M Rehman, V Ponnusamy, FB Shaikh
IEEE Access 9, 99339-99363, 2021
Quantitative analysis of COVID-19 patients: A preliminary statistical result of deep learning artificial intelligence framework
S Saeed, NZ Jhanjhi, M Naqvi, M Humayun, V Ponnusamy
ICT Solutions for Improving Smart Communities in Asia, 218-242, 2021
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
LT Chean, V Ponnusamy, SM Fati
2018 IEEE Symposium on Computer Applications & Industrial Electronics …, 2018
Energy harvesting methods for Internet of Things
V Ponnusamy, YP Tay, LH Lee, TJ Low, CW Zhao
Securing the Internet of Things: concepts, methodologies, tools, and …, 2020
A biologically inspired energy efficient intrusion detection system
V Ponnusamy, A Hudaya, AG Downe
2012 International Conference on Computer & Information Science (ICCIS) 2 …, 2012
Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network
V Ponnusamy, A Abdullah
2010 Sixth International Conference on Intelligent Environments, 215-219, 2010
Cybersecurity governance on social engineering awareness
V Ponnusamy, LMP Selvam, K Rafique
Employing Recent Technologies for Improved Digital Governance, 210-236, 2020
User behaviour-based mobile authentication system
ABA Ali, V Ponnusamy, A Sangodiah
Advances in Computer Communication and Computational Sciences, 461-472, 2019
Energy efficient routing protocols in wireless sensor networks: A survey
V Ponnusamy, A Abdullah, AG Downe
Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and …, 2012
Facilitating Learning Through Web 2.0 Collaboration-Cases Across the Culture
E Park, R Mohan, V Ponnusamy
EdMedia+ Innovate Learning, 3764-3764, 2009
The system can't perform the operation now. Try again later.
Articles 1–20