| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS13001 | Aiyyappan P S | Adding Proactive Forensic Support to Android |
| 2 | CB.EN.P2CYS13002 | Akshay Eldho Jose | FPGA Based Gigabit Network Intrusion Detection System Using |
| 3 | CB.EN.P2CYS13003 | Amruth M D | Two Factor Authentication Using Otp In Android |
| 4 | CB.EN.P2CYS13004 | Anuraj S | High Speed Network Intrusion Detection System Using FPGA |
| 5 | CB.EN.P2CYS13005 | Asish K S | Security Improvements to the Android Kernel |
| 6 | CB.EN.P2CYS13006 | Bharathula Pavani | Equitable Machine Learning Algorithms To Probe Over P2p Botnets |
| 7 | CB.EN.P2CYS13008 | Induja K | Active Warden Steganographic Attack In Frequency Domain |
| 8 | CB.EN.P2CYS13009 | Jayakrishnan M | A Real Time Scoring System To Detect And Report Malicious Domains |
| 9 | CB.EN.P2CYS13010 | Jamsheed K | Cloud Integrated Logging Of Android System Events |
| 10 | CB.EN.P2CYS13011 | Jithin Thomas Andoor | Log Correlation Using Machine Learning For Threat Prediction |
| 11 | CB.EN.P2CYS13012 | Manoj K Baby | Ensuring Storage Security And Computation Verification In Cloud Computing |
| 12 | CB.EN.P2CYS13013 | Maria James | Dynamic Auditing Of Encrypted Data Stored In Cloud |
| 13 | CB.EN.P2CYS13014 | Megha Mukundan P | Cryptanalysis of Lightweight Hash Function - QUARK |
| 14 | CB.EN.P2CYS13015 | Navaneeth Kumar K | Threat Analytics Using Log Correlation |
| 15 | CB.EN.P2CYS13016 | Nidhin Dinesh | Role-Based Access Control For Encrypted Data Using Vector Decomposition |
| 16 | CB.EN.P2CYS13017 | Nikhil George | Network Traffic Monitoring And Control For Android |
| 17 | CB.EN.P2CYS13018 | Priya S | Information Hiding In H.264, H.265 And Mjpeg |
| 18 | CB.EN.P2CYS13019 | Priyanka S | A Secure And Enhanced Replacement For Zygote Of The Android Framework |
| 19 | CB.EN.P2CYS13020 | Ravi M R | System-Level Protection and Trojan Detection in Third-Party IP Cores Using Voting Techniques |
| 20 | CB.EN.P2CYS13021 | Remya S | Filteringmalicious Javascript To Preventmutation Cross-Site Scripting Attack |
| 21 | CB.EN.P2CYS13022 | Shyam Sunder N | Xss Prevention Techniques For Protecting Web Browsers |
| 22 | CB.EN.P2CYS13023 | Sreedivya Muraleedharan M | Comparison Of Steganographic Algorithmswith And Without Using Distortion Functions |
| 23 | CB.EN.P2CYS13024 | Sreenitha N | An Android Framework Service Manager And Activity Manager In Scala |
| 24 | CB.EN.P2CYS13025 | Yadu K | An Encryption Scheme To Prevent Binder Exploits |