Follow
Dr. Anjan K Koundinya
Dr. Anjan K Koundinya
Associate Director R&D Forensics, SISA Information Security Pvt. Ltd
Verified email at sisainfosec.com
Title
Cited by
Cited by
Year
MapReduce design of K-means clustering algorithm
PP Anchalia, AK Koundinya, NK Srinath
2013 International Conference on Information Science and Applications (ICISA …, 2013
1022013
Map/Reduce Deisgn and Implementation of Apriori Alogirthm for handling voluminous data-sets
AK Koundinya, KAK Sharma, K Kumar, KU Shanbag
arXiv preprint arXiv:1212.4692, 2012
222012
IoT (Internet of Things) based efficiency monitoring system for bio-gas plants
V Acharya, VV Hegde, K Anjan, M Kumar
2017 2nd International Conference on Computational Systems and Information …, 2017
162017
Comparative study and performance analysis of encryption in RSA, ECC and Goldwasser-Micali cryptosystems
G HS, M Seetha, AK Koundinya, P CA
International Journal of Application or Innovation in Engineering …, 2014
162014
Performance analysis of Goldwasser-Micali cryptosystem
R Shruthi, P Sumana, AK Koundinya
International Journal of Advanced Research in Computer and Communication …, 2013
152013
Performance Analysis of Parallel Pollard's Rho Algorithm
AK Koundinya
arXiv preprint arXiv:1305.4365, 2013
142013
Behavioral analysis of transport layer based hybrid covert channel
K Anjan, J Abraham
Recent Trends in Network Security and Applications: Third International …, 2010
142010
Calibrated security measures for centralized iot applications of smart grids
AK Koundinya, GS Sharvani, KU Rao
2016 international conference on computation system and information …, 2016
82016
Two-layer encryption based on paillier and elgamal cryptosystem for privacy violation
AK Koundinya, G SK
International Journal of Wireless and Microwave Technologies 11 (3), 9-15, 2021
72021
Design of Transport layer based Hybrid covert channel detection engine
J Abraham, M Jadhav V
arXiv preprint arXiv:1101.0104, 2010
72010
Design of Transport layer based Hybrid covert channel detection engine
J Abraham, M Jadhav V
arXiv preprint arXiv:1101.0104, 2010
72010
Intrusion tolerant architecture for SDN networks through flow monitoring
B Manu, AK Koundinya
2017 2nd International Conference on Computational Systems and Information …, 2017
62017
Design and performance analysis of secure elliptic curve cryptosystem
HS Gururaja, M Seetha, AK Koundinya
International journal of advanced research in computer and communication …, 2013
62013
Secure dynamic carpooling android application using novel multi-agent approach for an organization
P Kashyap, AK Koundinya
2016 International Conference on Computation System and Information …, 2016
42016
Construction of covert channel using data hiding mechanism in Ipv 4
H Rajesh, K Anjan
International Journal of Research in Computer and Communication Technology 4 …, 2015
42015
Privacy Preserving Multifactor authentication schemes in a Distributed Environment: An Overview
S Champakamala, P Anjan, P Karunakar
Int. J. Innov. Res. Stud 2, 123-131, 2013
32013
CNN-based security authentication for wireless multimedia devices
SK Gautham, A Koundinya
Int. J. Wirel. Microw. Technol 11 (4), 1-10, 2021
22021
Detection of phishing websites using machine learning techniques
AV Bhagyashree, AK Koundinya
Int. J. Comput. Sci., Inf. Secur 18 (7), 2020
22020
Ambulance Hub: A Cloud Based Solution for Ambulance Services
P Mohapatra, AK Koundinya
2017 2nd International Conference on Computational Systems and Information …, 2017
22017
Cloud based applications for health monitoring systems using wearable sensors
MS Navya, A Nihitha, AK Koundinya
2016 International Conference on Computation System and Information …, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20