MapReduce design of K-means clustering algorithm PP Anchalia, AK Koundinya, NK Srinath 2013 International Conference on Information Science and Applications (ICISA …, 2013 | 102 | 2013 |
Map/Reduce Deisgn and Implementation of Apriori Alogirthm for handling voluminous data-sets AK Koundinya, KAK Sharma, K Kumar, KU Shanbag arXiv preprint arXiv:1212.4692, 2012 | 22 | 2012 |
IoT (Internet of Things) based efficiency monitoring system for bio-gas plants V Acharya, VV Hegde, K Anjan, M Kumar 2017 2nd International Conference on Computational Systems and Information …, 2017 | 16 | 2017 |
Comparative study and performance analysis of encryption in RSA, ECC and Goldwasser-Micali cryptosystems G HS, M Seetha, AK Koundinya, P CA International Journal of Application or Innovation in Engineering …, 2014 | 16 | 2014 |
Performance analysis of Goldwasser-Micali cryptosystem R Shruthi, P Sumana, AK Koundinya International Journal of Advanced Research in Computer and Communication …, 2013 | 15 | 2013 |
Performance Analysis of Parallel Pollard's Rho Algorithm AK Koundinya arXiv preprint arXiv:1305.4365, 2013 | 14 | 2013 |
Behavioral analysis of transport layer based hybrid covert channel K Anjan, J Abraham Recent Trends in Network Security and Applications: Third International …, 2010 | 14 | 2010 |
Calibrated security measures for centralized iot applications of smart grids AK Koundinya, GS Sharvani, KU Rao 2016 international conference on computation system and information …, 2016 | 8 | 2016 |
Two-layer encryption based on paillier and elgamal cryptosystem for privacy violation AK Koundinya, G SK International Journal of Wireless and Microwave Technologies 11 (3), 9-15, 2021 | 7 | 2021 |
Design of Transport layer based Hybrid covert channel detection engine J Abraham, M Jadhav V arXiv preprint arXiv:1101.0104, 2010 | 7 | 2010 |
Design of Transport layer based Hybrid covert channel detection engine J Abraham, M Jadhav V arXiv preprint arXiv:1101.0104, 2010 | 7 | 2010 |
Intrusion tolerant architecture for SDN networks through flow monitoring B Manu, AK Koundinya 2017 2nd International Conference on Computational Systems and Information …, 2017 | 6 | 2017 |
Design and performance analysis of secure elliptic curve cryptosystem HS Gururaja, M Seetha, AK Koundinya International journal of advanced research in computer and communication …, 2013 | 6 | 2013 |
Secure dynamic carpooling android application using novel multi-agent approach for an organization P Kashyap, AK Koundinya 2016 International Conference on Computation System and Information …, 2016 | 4 | 2016 |
Construction of covert channel using data hiding mechanism in Ipv 4 H Rajesh, K Anjan International Journal of Research in Computer and Communication Technology 4 …, 2015 | 4 | 2015 |
Privacy Preserving Multifactor authentication schemes in a Distributed Environment: An Overview S Champakamala, P Anjan, P Karunakar Int. J. Innov. Res. Stud 2, 123-131, 2013 | 3 | 2013 |
CNN-based security authentication for wireless multimedia devices SK Gautham, A Koundinya Int. J. Wirel. Microw. Technol 11 (4), 1-10, 2021 | 2 | 2021 |
Detection of phishing websites using machine learning techniques AV Bhagyashree, AK Koundinya Int. J. Comput. Sci., Inf. Secur 18 (7), 2020 | 2 | 2020 |
Ambulance Hub: A Cloud Based Solution for Ambulance Services P Mohapatra, AK Koundinya 2017 2nd International Conference on Computational Systems and Information …, 2017 | 2 | 2017 |
Cloud based applications for health monitoring systems using wearable sensors MS Navya, A Nihitha, AK Koundinya 2016 International Conference on Computation System and Information …, 2016 | 2 | 2016 |