

Table of Contents
Articles
A Brief Review of Cyber Attacks on Internet of Things and its Mitigation Techniques |
PDF
![]() |
Dr. Selvakumar Manickam | 1-4 |
Collaborative Authentication and Attack Detection Scheme for Mobile Ad Hoc Network |
PDF
![]() |
C. Daniel Nesa Kumar | 5-6 |
Opportunities and Challenges in High Mobility Wireless Communication- 5G |
PDF
![]() |
Dr. N. Kavitha, G. Sumalatha, C. Malaranbal | 7-8 |
A Literature Survey on Big Data |
PDF
![]() |
P. Usha, Dr. N. Kavitha | 9-11 |
A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks |
PDF
![]() |
P. K. Manoj Kumar, K. S. Arya | 12-13 |
K-Means Clustering for Asthma Endotypes |
PDF
![]() |
S. Poorani, Dr. P. Balasubramanie, Dr. D. Vimal Kumar | 14-15 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640