Follow
Vasaki Ponnusamy
Vasaki Ponnusamy
Assistant Professor at Higher Colleges of Technology UAE
Verified email at hct.ac.ae
Title
Cited by
Cited by
Year
Internet of things and ransomware: Evolution, mitigation and prevention
M Humayun, NZ Jhanjhi, A Alsayat, V Ponnusamy
Egyptian Informatics Journal 22 (1), 105-117, 2021
1942021
A fusion-based machine learning approach for the prediction of the onset of diabetes
MW Nadeem, HG Goh, V Ponnusamy, I Andonovic, MA Khan, M Hussain
Healthcare 9 (10), 1393, 2021
792021
Bone age assessment empowered with deep learning: a survey, open research challenges and future directions
MW Nadeem, HG Goh, A Ali, M Hussain, MA Khan, V Ponnusamy
Diagnostics 10 (10), 781, 2020
762020
Fusion-Based Machine Learning Architecture for Heart Disease Prediction.
MW Nadeem, HG Goh, MA Khan, M Hussain, MF Mushtaq
Computers, Materials & Continua 67 (2), 2021
732021
DDoS Detection in SDN using Machine Learning Techniques.
MW Nadeem, HG Goh, V Ponnusamy, Y Aun
Computers, Materials & Continua 71 (1), 2022
412022
IoT wireless intrusion detection and network Traffic Analysis.
V Ponnusamy, A Yichiet, NZ Jhanjhi, MF Almufareh
Computer Systems Science & Engineering 40 (3), 2022
312022
Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
S Kalhoro, M Rehman, V Ponnusamy, FB Shaikh
IEEE Access 9, 99339-99363, 2021
302021
An adaptive and flexible brain energized full body exoskeleton with IoT edge for assisting the paralyzed patients
S Jacob, M Alagirisamy, VG Menon, BM Kumar, NZ Jhanjhi, ...
IEEE Access 8, 100721-100731, 2020
302020
Intrusion detection systems in internet of things and mobile Ad-Hoc networks.
V Ponnusamy, M Humayun, NZ Jhanjhi, A Yichiet, MF Almufareh
Computer Systems Science & Engineering 40 (3), 2022
292022
Quantitative analysis of covid-19 patients: a preliminary statistical result of deep learning artificial intelligence framework
S Saeed, NZ Jhanjhi, M Naqvi, M Humayun, V Ponnusamy
ICT Solutions for Improving Smart Communities in Asia, 218-242, 2021
282021
A comparative analysis on traditional wired datasets and the need for wireless datasets for IoT wireless intrusion detection
TB Seong, V Ponnusamy, NZ Jhanjhi, R Annur, MN Talib
Indonesian Journal of Electrical Engineering and Computer Science 22 (2 …, 2021
162021
Fostering public-private partnership: between governments and technologists in developing national cybersecurity framework
V Ponnusamy, NZ Jhanjhi, M Humayun
Employing Recent Technologies for Improved Digital Governance, 237-255, 2020
162020
Energy analysis in Wireless Sensor Network: a comparison
V Ponnusamy
International Journal of Computer Networks and Communications Security 2 (9 …, 2014
152014
ZigBee wireless communication for monitoring renewable street light system
T Ramachandran, LT Jung, V Ponnusamy, A Hudaya
2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014
132014
User behaviour-based mobile authentication system
ABA Ali, V Ponnusamy, A Sangodiah
Advances in Computer Communication and Computational Sciences: Proceedings …, 2019
122019
Smartphone security using swipe behavior-based authentication
ABA Ali, V Ponnusamy, A Sangodiah, R Alroobaea, NZ Jhanjhi, U Ghosh, ...
Intelligent Automation & Soft Computing 29 (2), 571-585, 2021
112021
Bio-inspired energy scavenging in wireless ad hoc network
V Ponnusamy, LT Jung, T Ramachandran, N Zaman
2017 International Conference on Innovations in Electrical Engineering and …, 2017
102017
Biologically-Inspired Energy Harvesting through Wireless Sensor Technologies
V Ponnusamy
IGI Global, 2016
102016
Deep reinforcement learning based intrusion detection system with feature selections method and optimal hyper-parameter in IoT environment
S Bakhshad, V Ponnusamy, R Annur, M Waqasyz, H Alasmary, S Tux
2022 International Conference on Computer, Information and Telecommunication …, 2022
92022
Employing recent technologies for improved digital governance
V Ponnusamy, K Rafique, N Zaman
IGI Global, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20