Table of Contents
Articles
| A Brief Review of Cyber Attacks on Internet of Things and its Mitigation Techniques |
PDF
|
| Dr. Selvakumar Manickam | 1-4 |
| Collaborative Authentication and Attack Detection Scheme for Mobile Ad Hoc Network |
PDF
|
| C. Daniel Nesa Kumar | 5-6 |
| Opportunities and Challenges in High Mobility Wireless Communication- 5G |
PDF
|
| Dr. N. Kavitha, G. Sumalatha, C. Malaranbal | 7-8 |
| A Literature Survey on Big Data |
PDF
|
| P. Usha, Dr. N. Kavitha | 9-11 |
| A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks |
PDF
|
| P. K. Manoj Kumar, K. S. Arya | 12-13 |
| K-Means Clustering for Asthma Endotypes |
PDF
|
| S. Poorani, Dr. P. Balasubramanie, Dr. D. Vimal Kumar | 14-15 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640