Internet of things and ransomware: Evolution, mitigation and prevention M Humayun, NZ Jhanjhi, A Alsayat, V Ponnusamy Egyptian Informatics Journal 22 (1), 105-117, 2021 | 58 | 2021 |
Bone age assessment empowered with deep learning: a survey, open research challenges and future directions MW Nadeem, HG Goh, A Ali, M Hussain, MA Khan, V Ponnusamy Diagnostics 10 (10), 781, 2020 | 55 | 2020 |
Fusion-based machine learning architecture for heart disease prediction MW Nadeem, HG Goh, MA Khan, M Hussain, MF Mushtaq, ... TECH SCIENCE PRESS, 2021 | 52 | 2021 |
A fusion-based machine learning approach for the prediction of the onset of diabetes MW Nadeem, HG Goh, V Ponnusamy, I Andonovic, MA Khan, M Hussain Healthcare 9 (10), 1393, 2021 | 43 | 2021 |
An adaptive and flexible brain energized full body exoskeleton with IoT edge for assisting the paralyzed patients S Jacob, M Alagirisamy, VG Menon, BM Kumar, NZ Jhanjhi, ... IEEE Access 8, 100721-100731, 2020 | 18 | 2020 |
Energy analysis in Wireless Sensor Network: a comparison V Ponnusamy International Journal of Computer Networks and Communications Security 2 (9 …, 2014 | 16 | 2014 |
ZigBee wireless communication for monitoring renewable street light system T Ramachandran, LT Jung, V Ponnusamy, A Hudaya 2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014 | 12 | 2014 |
Anycast group membership management protocol V Ponnusamy, EK Karuppiah, R Abdullah 9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732) 3 …, 2003 | 10 | 2003 |
Fostering Public-Private Partnership: Between Governments and Technologists in Developing National Cybersecurity Framework V Ponnusamy, NZ Jhanjhi, M Humayun Employing Recent Technologies for Improved Digital Governance, 237-255, 2020 | 8 | 2020 |
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing LT Chean, V Ponnusamy, SM Fati 2018 IEEE Symposium on Computer Applications & Industrial Electronics …, 2018 | 8 | 2018 |
Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review S Kalhoro, M Rehman, V Ponnusamy, FB Shaikh IEEE Access 9, 99339-99363, 2021 | 7 | 2021 |
Energy harvesting methods for Internet of Things V Ponnusamy, YP Tay, LH Lee, TJ Low, CW Zhao Securing the Internet of Things: concepts, methodologies, tools, and …, 2020 | 7 | 2020 |
A biologically inspired energy efficient intrusion detection system V Ponnusamy, A Hudaya, AG Downe 2012 International Conference on Computer & Information Science (ICCIS) 2 …, 2012 | 7 | 2012 |
Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network V Ponnusamy, A Abdullah 2010 Sixth International Conference on Intelligent Environments, 215-219, 2010 | 7 | 2010 |
Cybersecurity governance on social engineering awareness V Ponnusamy, LMP Selvam, K Rafique Employing Recent Technologies for Improved Digital Governance, 210-236, 2020 | 6 | 2020 |
User behaviour-based mobile authentication system ABA Ali, V Ponnusamy, A Sangodiah Advances in Computer Communication and Computational Sciences, 461-472, 2019 | 6 | 2019 |
Energy efficient routing protocols in wireless sensor networks: A survey V Ponnusamy, A Abdullah, AG Downe Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and …, 2012 | 6 | 2012 |
Facilitating Learning Through Web 2.0 Collaboration-Cases Across the Culture E Park, R Mohan, V Ponnusamy EdMedia+ Innovate Learning, 3764-3764, 2009 | 6 | 2009 |
Promoting better learning skills through online discussion boards V Ponnusamy, R Subramaniam, T Murugiah 2009 International Conference on Future Computer and Communication, 695-699, 2009 | 6 | 2009 |
Quantitative analysis of COVID-19 patients: A preliminary statistical result of deep learning artificial intelligence framework S Saeed, NZ Jhanjhi, M Naqvi, M Humayun, V Ponnusamy ICT Solutions for Improving Smart Communities in Asia, 218-242, 2021 | 5 | 2021 |