S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS09001 | Aathira K. S. | Anti-Malware System Using Bloom Filters and Ensemble Pattern Matching Algorithms |
2 | CB.EN.P2CYS09002 | Abinaya N. | Host Identity Protocol Analysis |
3 | CB.EN.P2CYS09003 | Aishwarya Nandakumar | Non-Linear Secret Sharing for Gray Scale and Binary Images |
4 | CB.EN.P2CYS09004 | Anju S.S. | Quantitative and Qualitative Steganalysis of Images |
5 | CB.EN.P2CYS09005 | Arthy S. | Cryptanalysis of Stream Ciphers Using SAT Solvers |
6 | CB.EN.P2CYS09006 | Arun Thomas | Statistical Analysis of Block Cipher |
7 | CB.EN.P2CYS09007 | Asha Vijayan | A System Approach for DDoS Detection Using Hidden Markov Models |
8 | CB.EN.P2CYS09008 | Athira M. Nambiar | Secure Databases Through Distributed Source Coding of Sift Descriptors |
9 | CB.EN.P2CYS09009 | Balaji R. | Security in Smartphones for Enterprise Applications |
10 | CB.EN.P2CYS09010 | Darsana R. | Securing System Against Buffer Overflow and Rootkit Attacks |
11 | CB.EN.P2CYS09011 | Ganesh Naghu K. J. | VoIP Security |
12 | CB.EN.P2CYS09012 | Harmya P. | Image Steganography Using Covering Codes |
13 | CB.EN.P2CYS09013 | Hemanth Vatturi | Statistical Testing on Stream Cipher |
14 | CB.EN.P2CYS09014 | Hiran V. Nath | Reconciliation Engine and Metric for Network Vulnerability Assessment |
15 | CB.EN.P2CYS09016 | Noopa Jagadeesh | Verifiable Secret Sharing in Images |
16 | CB.EN.P2CYS09018 | Priya P. | Performance Evaluation of Supervised and Unsupervised Filtering Techniques in Spam Detection |
17 | CB.EN.P2CYS09020 | Thulasi N. Kutty | Performance Enhancement of Intrusion Detection Using Adaboost Based Algorithm |
18 | CB.EN.P2CYS09022 | Yazhini C. | Mobile Security for Enterprise Applications |