S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS11015 | Reno Robert R. | Differential Execution Analysis for Obfuscation Detection |
2 | CB.EN.P2CYS12001 | Ajvad Rahman K.P | Steganongraphy in Voice Over IP |
3 | CB.EN.P2CYS12002 | Akhitha S. Kumar | Authentication System using Biometric, Visual Cryptography and OTP |
4 | CB.EN.P2CYS12003 | Ambarish A. | Mitigating Hill-Climb Attack in Biometric Digital Signatures |
5 | CB.EN.P2CYS12004 | Anjana S. | Secure Image Steganography using Wavelet Filter Banks |
6 | CB.EN.P2CYS12005 | Anumol E. T. | Use of One-Class SVM with SIEM for Attack Prediction |
7 | CB.EN.P2CYS12006 | Aparna S. | Phish Indicator: Plug-In for Detecting Phishing Sites |
8 | CB.EN.P2CYS12007 | Aravind V. | Analyzing the effectiveness of Content Security Policy in Chrome Extensions |
9 | CB.EN.P2CYS12008 | Arun M. | Towards Equitable Mining of Hierarchical Roles |
10 | CB.EN.P2CYS12009 | Arun Kumar S. | Threat Detection Using Log Analysis |
11 | CB.EN.P2CYS12010 | Asad K. S. | Light Weight Stream Ciphers With Built in Authentication Mechanisms |
12 | CB.EN.P2CYS12011 | Ashok Kumar M. | Generating secured fabrication for Communicating Sturdy-OTP |
13 | CB.EN.P2CYS12012 | Chandini Rajeev | A Novel Image Watermarking Scheme in Qualified coefficients using Wavelet Transform |
14 | CB.EN.P2CYS12013 | Devisree G. S. | Advanced Forensic Analysis and Evidence Collection of Web Browser Activity |
15 | CB.EN.P2CYS12014 | Divya T. | Real Time Intrusion Prediction using Hidden Markov Model with Genetic Algorithm |
16 | CB.EN.P2CYS12015 | Jayasree N. | A model for Effective Steganalysis of VoIP |
17 | CB.EN.P2CYS12016 | Manoj Kumar | A Fully Simulatable Oblivious Transfer Scheme using Vector Decomposition |
18 | CB.EN.P2CYS12017 | Mukil Rajeev | Enhancing Security Implementations using Apache Storm |
19 | CB.EN.P2CYS12018 | Nithin Sasi | Privacy Preserving System using Ciphertext-PolicyAttribute-BasedEncryption |
20 | CB.EN.P2CYS12019 | Rahul P. K. | Improver Transport Layer Security |
21 | CB.EN.P2CYS12020 | Rakesh P. Menon | Intrusion Prediction System |
22 | CB.EN.P2CYS12021 | Ranjith R. | Secure Private Cloud Storage |
23 | CB.EN.P2CYS12022 | Ranjith V. | Analysis of T- Function based Stream Cipher |
24 | CB.EN.P2CYS12023 | Rinu Kuriakose | Quantitative Steganalysis of JPEG images using JRM |
25 | CB.EN.P2CYS12024 | Sanal Kumar P. | Automatic Rule Generation in Firewall and Policy Conflict Resolution |
26 | CB.EN.P2CYS12025 | Vijay Anand P. | Network Security as a Service for Smart Phones |
27 | CB.EN.P2CYS12026 | Vivek Amruth C. | Multi-Level Steganography for Smart Phones |