Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2012 - 2014

S.No Roll No. Name Project Title
1 CB.EN.P2CYS11015 Reno Robert R. Differential Execution Analysis for Obfuscation Detection
2 CB.EN.P2CYS12001 Ajvad Rahman K.P Steganongraphy in Voice Over IP
3 CB.EN.P2CYS12002 Akhitha S. Kumar Authentication System using Biometric, Visual Cryptography and OTP
4 CB.EN.P2CYS12003 Ambarish A. Mitigating Hill-Climb Attack in Biometric Digital Signatures
5 CB.EN.P2CYS12004 Anjana S. Secure Image Steganography using Wavelet Filter Banks
6 CB.EN.P2CYS12005 Anumol E. T. Use of One-Class SVM with SIEM for Attack Prediction
7 CB.EN.P2CYS12006 Aparna S. Phish Indicator: Plug-In for Detecting Phishing Sites
8 CB.EN.P2CYS12007 Aravind V. Analyzing the effectiveness of Content Security Policy in Chrome Extensions
9 CB.EN.P2CYS12008 Arun M. Towards Equitable Mining of Hierarchical Roles
10 CB.EN.P2CYS12009 Arun Kumar S. Threat Detection Using Log Analysis
11 CB.EN.P2CYS12010 Asad K. S. Light Weight Stream Ciphers With Built in Authentication Mecha­nisms
12 CB.EN.P2CYS12011 Ashok Kumar M. Generating secured fabrication for Communicating Sturdy-OTP
13 CB.EN.P2CYS12012 Chandini Rajeev A Novel Image Watermarking Scheme in Qualified coefficients using Wavelet Transform
14 CB.EN.P2CYS12013 Devisree G. S. Advanced Forensic Analysis and Evidence Collection of Web Browser Activity
15 CB.EN.P2CYS12014 Divya T. Real Time Intrusion Prediction using Hidden Markov Model with Genetic Algorithm
16 CB.EN.P2CYS12015 Jayasree N. A model for Effective Steganalysis of VoIP
17 CB.EN.P2CYS12016 Manoj Kumar A Fully Simulatable Oblivious Transfer Scheme using Vector Decom­position
18 CB.EN.P2CYS12017 Mukil Rajeev Enhancing Security Implementations using Apache Storm
19 CB.EN.P2CYS12018 Nithin Sasi Privacy Preserving System using Ciphertext-PolicyAttribute-BasedEn­cryption
20 CB.EN.P2CYS12019 Rahul P. K. Improver Transport Layer Security
21 CB.EN.P2CYS12020 Rakesh P. Menon Intrusion Prediction System
22 CB.EN.P2CYS12021 Ranjith R. Secure Private Cloud Storage
23 CB.EN.P2CYS12022 Ranjith V. Analysis of T- Function based Stream Cipher
24 CB.EN.P2CYS12023 Rinu Kuriakose Quantitative Steganalysis of JPEG images using JRM
25 CB.EN.P2CYS12024 Sanal Kumar P. Automatic Rule Generation in Firewall and Policy Conflict Resolution
26 CB.EN.P2CYS12025 Vijay Anand P. Network Security as a Service for Smart Phones
27 CB.EN.P2CYS12026 Vivek Amruth C. Multi-Level Steganography for Smart Phones