Follow
anusha kannan
anusha kannan
Professor VIT University
Verified email at vit.ac.in
Title
Cited by
Cited by
Year
Improving medical communication process using recurrent networks and wearable antenna s11 variation with harmonic suppressions
P Subramani, F Al-Turjman, R Kumar, A Kannan, A Loganthan
Personal and Ubiquitous Computing, 1-13, 2023
292023
Comparative study for feature selection algorithms in intrusion detection system
K Anusha, E Sathiyamoorthy
Automatic Control and Computer Sciences 50, 1-9, 2016
212016
A new trust-based mechanism for detecting intrusions in MANET.
K Anusha, E Sathiyamoorthy
Inf. Secur. J. A Glob. Perspect. 26 (4), 153-165, 2017
132017
An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a manet environment
M Nandi, K Anusha
Wireless Personal Communications 127 (3), 2515-2533, 2022
122022
IOT based smart and flexible lighting in streets
MN Raju Anitha, K Akhila, KS Anusha, GS Lekha
International Journal of Engineering and technology, 2018
122018
Omamids: ontology based multi-agent model intrusion detection system for detecting web service attacks
K Anusha, E Sathiyamoorthy
Journal of Applied Security Research 11 (4), 489-508, 2016
122016
Adaptive routing mechanism in SDN to limit congestion
A Kannan, S Vijayan, M Narayanan, M Reddiar
Information Systems Design and Intelligent Applications: Proceedings of …, 2019
112019
ALBAE feature extraction based lung pneumonia and cancer classification
M Braveen, S Nachiyappan, R Seetha, K Anusha, A Ahilan, A Prasanth, ...
Soft Computing, 1-14, 2023
92023
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system
K Anusha, E Sathiyamoorthy
International Journal of Internet Technology and Secured Transactions 6 (3 …, 2016
82016
SURVEY OF BLOCK CHAIN TECHNOLOGY FOR DIGITIZATION IN INDIA
S. PRASANNA, N. MANIKANDAN, K. VIJAYAKUMAR and ANUSHA K
International Journal of Civil Engineering and Technology (IJCIET) 9 (6 …, 2018
7*2018
An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy
K Anusha, N Jayaleshwari, S Arun Kumar, GV Rajyalakshmi
International Journal of Engineering and Technology (IJET) 5 (3), 2575-84, 2013
52013
A Review on Prediction of Autism using Machine Learning Algorithm
DKA Mr. Siddharaj D Pujari
International Journal of Advanced Science and Technology 29 (6), 4669-4678, 2020
42020
Redundancy based WEP routing technology (IoT-WSN)
K Anusha
2015 International Conference on Signal Processing and Communication …, 2015
42015
Secured key management with trusted certificate revocation in MANET
M Narayanan, A Kannan, S Ulaganathan, M Reddiar
Information Systems Design and Intelligent Applications: Proceedings of …, 2019
32019
Quantum Dot-Sensitized Solar Cells Via Integrated Experimental And Modeling Study
L Gangadhar, A Kannan, PK Praseetha
Journal of Computational and Theoretical Nanoscience 16 (2), 436-440, 2019
22019
A PREDICTIVE TRUST MODEL FOR E-COMMERCE APPLICATIONS.
S NANDI, K ANUSHA, GV RAJYALAKSHMI
Journal of Theoretical & Applied Information Technology 55 (2), 2013
22013
A mutual certificate-based data privacy scheme for ubiquitous and sustainable computing system users
TSB Damodhar, P Anandan, C Nalini, MA Jerlin, A Victor, K Anusha, ...
Sustainable Energy Technologies and Assessments 58, 103356, 2023
12023
Data location integration with stable routing: Stable and optimal data transmission in wireless sensor networks
A Gayathri, D Ruby, N Manikandan, T Gopalakrishnan, K Anusha, ...
Transactions on Emerging Telecommunications Technologies, e4627, 2022
12022
MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network
K Anusha, E Sathiyamoorthy
International Journal of Information and Computer Security 9 (4), 361-386, 2017
12017
Investigations on Classification Algorithms for Intrusion Detection System in MANETS
K Anusha, D Ezhilmaran
2014 International Conference on Electronics, Communication and …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20