1 | -- | 22 | Shailesh Pancham Khapre, Vishakha Chauhan, Vinam Tomar, P. R. Mahapatra, Nidhi Bansal. A Method of Identifying User Identity Based on Username Features |
23 | -- | 29 | Rajaguru D., Puviyarasi T., T. Vengattaraman. A Review on Edge Connectivity Framework for Handheld Computing |
30 | -- | 39 | Rajaguru D., Puviyarasi T., T. Vengattaraman. Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System |
40 | -- | 51 | Manimaran Aridoss. Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications |
52 | -- | 57 | Balakrishnan Natarajan, Shantharajah Periyasamy, Shrinivas S. G.. Image Visual Improvement on Handheld Devices Using Linear Mapping Function |
58 | -- | 71 | P. Victer Paul, D. Veeraiah. Multi-Layered Security Model for Hadoop Environment: Security Model for Hadoop |