Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2013 - 2015

S.No Roll No. Name Project Title
1 CB.EN.P2CYS13001 Aiyyappan P S Adding Proactive Forensic Support to Android
2 CB.EN.P2CYS13002 Akshay Eldho Jose FPGA Based Gigabit Network Intrusion Detection System Using
3 CB.EN.P2CYS13003 Amruth M D Two Factor Authentication Using Otp In Android
4 CB.EN.P2CYS13004 Anuraj S High Speed Network Intrusion Detection System Using FPGA
5 CB.EN.P2CYS13005 Asish K S Security Improvements to the Android Kernel
6 CB.EN.P2CYS13006 Bharathula Pavani Equitable Machine Learning Algorithms To Probe Over P2p Botnets
7 CB.EN.P2CYS13008 Induja K Active Warden Steganographic Attack In Frequency Domain
8 CB.EN.P2CYS13009 Jayakrishnan M A Real Time Scoring System To Detect And Report Malicious Domains
9 CB.EN.P2CYS13010 Jamsheed K Cloud Integrated Logging Of Android System Events
10 CB.EN.P2CYS13011 Jithin Thomas Andoor Log Correlation Using Machine Learning For Threat Prediction
11 CB.EN.P2CYS13012 Manoj K Baby Ensuring Storage Security And Computation Verification In Cloud Computing
12 CB.EN.P2CYS13013 Maria James Dynamic Auditing Of Encrypted Data Stored In Cloud
13 CB.EN.P2CYS13014 Megha Mukundan P Cryptanalysis of Lightweight Hash Function - QUARK
14 CB.EN.P2CYS13015 Navaneeth Kumar K Threat Analytics Using Log Correlation
15 CB.EN.P2CYS13016 Nidhin Dinesh Role-Based Access Control For Encrypted Data Using Vector Decomposition
16 CB.EN.P2CYS13017 Nikhil George Network Traffic Monitoring And Control For Android
17 CB.EN.P2CYS13018 Priya S Information Hiding In H.264, H.265 And Mjpeg
18 CB.EN.P2CYS13019 Priyanka S A Secure And Enhanced Replacement For Zygote Of The Android Framework
19 CB.EN.P2CYS13020 Ravi M R System-Level Protection and Trojan Detection in Third-Party IP Cores Using Voting Techniques
20 CB.EN.P2CYS13021 Remya S Filteringmalicious Javascript To Preventmutation Cross-Site Scripting Attack
21 CB.EN.P2CYS13022 Shyam Sunder N Xss Prevention Techniques For Protecting Web Browsers
22 CB.EN.P2CYS13023 Sreedivya Muraleedharan M Comparison Of Steganographic Algorithmswith And Without Using Distortion Functions
23 CB.EN.P2CYS13024 Sreenitha N An Android Framework Service Manager And Activity Manager In Scala
24 CB.EN.P2CYS13025 Yadu K An Encryption Scheme To Prevent Binder Exploits