S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS13001 | Aiyyappan P S | Adding Proactive Forensic Support to Android |
2 | CB.EN.P2CYS13002 | Akshay Eldho Jose | FPGA Based Gigabit Network Intrusion Detection System Using |
3 | CB.EN.P2CYS13003 | Amruth M D | Two Factor Authentication Using Otp In Android |
4 | CB.EN.P2CYS13004 | Anuraj S | High Speed Network Intrusion Detection System Using FPGA |
5 | CB.EN.P2CYS13005 | Asish K S | Security Improvements to the Android Kernel |
6 | CB.EN.P2CYS13006 | Bharathula Pavani | Equitable Machine Learning Algorithms To Probe Over P2p Botnets |
7 | CB.EN.P2CYS13008 | Induja K | Active Warden Steganographic Attack In Frequency Domain |
8 | CB.EN.P2CYS13009 | Jayakrishnan M | A Real Time Scoring System To Detect And Report Malicious Domains |
9 | CB.EN.P2CYS13010 | Jamsheed K | Cloud Integrated Logging Of Android System Events |
10 | CB.EN.P2CYS13011 | Jithin Thomas Andoor | Log Correlation Using Machine Learning For Threat Prediction |
11 | CB.EN.P2CYS13012 | Manoj K Baby | Ensuring Storage Security And Computation Verification In Cloud Computing |
12 | CB.EN.P2CYS13013 | Maria James | Dynamic Auditing Of Encrypted Data Stored In Cloud |
13 | CB.EN.P2CYS13014 | Megha Mukundan P | Cryptanalysis of Lightweight Hash Function - QUARK |
14 | CB.EN.P2CYS13015 | Navaneeth Kumar K | Threat Analytics Using Log Correlation |
15 | CB.EN.P2CYS13016 | Nidhin Dinesh | Role-Based Access Control For Encrypted Data Using Vector Decomposition |
16 | CB.EN.P2CYS13017 | Nikhil George | Network Traffic Monitoring And Control For Android |
17 | CB.EN.P2CYS13018 | Priya S | Information Hiding In H.264, H.265 And Mjpeg |
18 | CB.EN.P2CYS13019 | Priyanka S | A Secure And Enhanced Replacement For Zygote Of The Android Framework |
19 | CB.EN.P2CYS13020 | Ravi M R | System-Level Protection and Trojan Detection in Third-Party IP Cores Using Voting Techniques |
20 | CB.EN.P2CYS13021 | Remya S | Filteringmalicious Javascript To Preventmutation Cross-Site Scripting Attack |
21 | CB.EN.P2CYS13022 | Shyam Sunder N | Xss Prevention Techniques For Protecting Web Browsers |
22 | CB.EN.P2CYS13023 | Sreedivya Muraleedharan M | Comparison Of Steganographic Algorithmswith And Without Using Distortion Functions |
23 | CB.EN.P2CYS13024 | Sreenitha N | An Android Framework Service Manager And Activity Manager In Scala |
24 | CB.EN.P2CYS13025 | Yadu K | An Encryption Scheme To Prevent Binder Exploits |