Dr. M. Anand Kumar
ProfessorAdigrat University, Ethiopia
Highest Degree
Ph.D. in Computer Science from Karpagam University, India
Share this Profile
Area of Interest:
Selected Publications
- Reshmi, S. and M. Anand Kumar, 2016. Survey on identifying packet misbehavior in network virtualization. Indian J. Sci. Technol., 9: 1-11.
CrossRef | Direct Link | - Reshmi, S. and M. Anand Kumar, 2016. Secured structural design for software defined data center networks. Int. J. Comput. Sci. Mobile Comput., 15: 532-537.
Direct Link | - Mohankumar, M. and M. Anand Kumar, 2016. Green database design model in software development life cycle phase. Indian J. Sci. Technol., 9: 1-9.
CrossRef | Direct Link | - Bimal, V.O. and M.A. Kumar, 2016. Performance analysis of timeline algorithm against CONS, PBS_PRO and BestGap in grid environment using Alea. Int. J. Applied Eng. Res., 11: 5132-5138.
Direct Link | - Anand Kumar, M. and M. Naveen Kumar, 2016. Medical data mining techniques for health care systems. Int. J. Eng. Sci. Comput., 6: 641-646.
- Ahamed, A.K.A., M. Anand Kumar and B.L. Shivakumar, 2016. Secured Data Forwarding Routing Protocol (SDFRP) for heterogeneous mobile ad hoc networks. Int. J. Comput. Trends Technol., 39: 53-61.
- Anand Kumar, M. and M. Mohan Kumar, 2015. A green it star model approach for software development life cycle. Int. J. Adv. Technol. Eng. Sci., 3: 548-559.
- Anand Kumar, M. and K. Appathurai, 2015. Performance analysis of blowfish, IDEA and AES encryption algorithms. J. Comput. Sci., 9: 38-43.
- Anand Kumar, M. and K. Appathurai, 2015. A study on spatio-temporal access methods in spatial databases. J. Comput. Sci., 9: 32-37.
- Anand Kumar, M. and S. Umadevi, 2013. A comparative analysis of symmetric encryption algorithms for data communication. J. Comput. Sci., 12: 293-303.
- Anand Kumar, M. and S. Karthikeyan, 2013. An enhanced security for TCP/IP protocol suite. Int. J. Comput. Sci. Mobile Comput., 2: 331-338.
- Anand Kumar, M. and S. Karthikeyan, 2012. Investigating the efficiency of Blowfish and Rejindael (AES) algorithms. Int. J. Comput. Network Inf. Security, 4: 22-28.
CrossRef | Direct Link | - Anand Kumar, M. and S. Karthikeyan, 2012. A new 512 bit cipher for secure communication. Int. J. Comput. Network Inform. Secur., 11: 55-61.
CrossRef | Direct Link | - Kumar, M.A., S. Karthikeyan, K. Appathurai and P. Nagarajan, 2011. A novel security protocol based on hybrid cryptography. Int. J. Comput. Sci. Syst. Eng. Inform. Technol., 4: 35-39.
- Kumar, M.A., S. Karthikeyan and K. Appathurai, 2011. A novel security protocol for TCP/IP protocol suite. Proceedings of the International Conference on Communication and Signal Processing, March 17-18, 2011, Karunya University-India -.
- Appathurai, K., M.A. Kumar and Dr. S. Karthikeyan, 2011. "Investigating the Efficiency of Spatial Temporal Access Methods in Spatial Databases". Proceeding of the National Conference on Computer Communication and Informatics( NCCC), February, 2011, RVS Arts and Science College -.
- Anand, M.K. and Dr. S. Karthikeyan, 2011. "Investigating the Efficiency of Modern Symmetric Cryptographic Algorithms Proceeding of the UGC Sponsored National Conference on Data Warehousing and Data Mining, March 4-5th, 2011, Gobi Arts and Science, -.
- Anand, K.M. and Dr. S. Karthikeyan, 2011. Comparative Analysis for IPv4 and IPv6. Proceeding of the "National Conference on Computer Communication and Informatics (NCCC), February 2011 RVS Arts and Science College -.
- Anand Kumar, M., S. Karthikeyan, K. Appathurai and P. Nagarajan, 2011. A new way towards security in TCP/IP protocol suite. WSEAS Latest Trends Comput., 1: 46-50.
- Anand Kumar, M. and S. Karthikeyan, 2011. Security model for TCP/IP protocol suite. J. Adv. Inf. Technol., 2: 87-91.
CrossRef | Direct Link | - Anand Kumar, M. and S. Karthikeyan, 2011. A security protocol for Real Time Applications (RTA). J. Comput. Sci., 5: 321-325.
- Kumar, M.A., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative analysis of IPv4 and IPv6 to evaluate performance. Int. J. Comput. Network Security, 2: 67-71.
- Kumar, M.A. and S. Karthikeyan, 2010. A new security architecture for TCP/IP protocol suite. Int. J. Adv. Res. Comput. Sci., 1: 177-181.
- Anand, M.K., K. appathurai and P. Nagarajan, 2010. An Empirical Comparison Of Internet Message Control Protocol Suites. Proceeding of the 2010 International Conference on Informatics, Cybernetics and Computer Applications, July 19-21, 2010, Jain University, Bangalore, India -.
- Anand, M.K., K. appathurai and P. Nagarajan, 2010. Proceeding of the 1st International conference on Intelligent Information Systems And Management, June 10 - 12, 2010, RVS Engineering College, -.
- Anand, K.M., K. Appathurai and P. Nagarajan, 2010. "Survey in ICMP security pitfalls". Proceedings of the National Conference on Latest Trends in IT, January 5-6, 2010, Nehru Arts and Science College, -.
- Anand, K.M., K. Appathurai and P. Nagarajan, 2010. "Security in TCP/IP Protocols". Proceeding of the National Conference on Latest Trends in IT, January 5 and 6, 2010, Nehru Arts and Science College, -.
- Kumar, M.A., K. Appathurai and P. Nagarajan, 2009. Troubleshooting networks with internet control message protocol. CiiT Int. J. Networking Commun. Eng., 1: 163-168.
- Anand, K.M. and K. Geetha, 2005. "XML-Time Stamping Protocol". Proceeding of International Conference on Business Economics and Finance 2005, September 29-30, 2005, Adikalamatha College. -.