| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS15001 | Aarthy Devi A | Wireless Security Auditing |
| 2 | CB.EN.P2CYS15002 | Akash Krishnan V | Anomaly based IDS using Artificial Neural Network with SNMP Data |
| 3 | CB.EN.P2CYS15003 | Ambili K N | Mobile To Mobile Payment System Using Blockchain |
| 4 | CB.EN.P2CYS15004 | Arun Thomas | RPL Attack Detection in Internet of Things |
| 5 | CB.EN.P2CYS15005 | Aswin K Gopan | Hackergoods in Underground Economy |
| 6 | CB.EN.P2CYS15006 | Atul K R | Detection of slow HTTP DoS attack using splunk |
| 7 | CB.EN.P2CYS15007 | Dilsheer Ali P | Malware Classification in Sandbox Environment Using Machine Learning Algorithm |
| 8 | CB.EN.P2CYS15008 | Indu G | Android Application For Uploading Image Shares To Multiple Cloud Service Providers |
| 9 | CB.EN.P2CYS15009 | Kalpana K | Storing and Retrieving Captured History of Operations in Key Management Interoperability Protocol |
| 10 | CB.EN.P2CYS15010 | Kalpika Ramesh | Host based zeus bot detection |
| 11 | CB.EN.P2CYS15011 | Krishna Ram Prakash R | Opaque Predicate Detection by Static Analysis of Binary Executables |
| 12 | CB.EN.P2CYS15012 | Krishna Sugunan | Android Malware Detection Using Machine Learning Techniques |
| 13 | CB.EN.P2CYS15013 | Krithika R | Jordan Center Segregation: Rumors in Social Media Networks |
| 14 | CB.EN.P2CYS15014 | Lakshmi S | A Quasigroup based Synchronous Stream Cipher for Lightweight Applications |
| 15 | CB.EN.P2CYS15015 | Lakshmi Siva Sankar | Survey of Consensus Protocols on Blockchain Applications |
| 16 | CB.EN.P2CYS15016 | Lekshmi R Krishnan | Capturing History of Operations in Key Management Interoperability Protocol |
| 17 | CB.EN.P2CYS15017 | Moumita Roy | Maintaining the Integrity of Digital Evidence usingPiecewise Hashing |
| 18 | CB.EN.P2CYS15018 | Nischai V | Concurrency Fuzzer |
| 19 | CB.EN.P2CYS15019 | Pallavi Krishnan | Analysis of Homomorphic Encryption Schemes |
| 20 | CB.EN.P2CYS15020 | Prem T | Hiding in Slack Space |
| 21 | CB.EN.P2CYS15022 | Santhya R | GeSIS: Android App for Firebase Cloud Storing with GeoTag and its Vulnerability Assessment |
| 22 | CB.EN.P2CYS15024 | Siva Niranjan Raja M | Detection of Ransomware using Security Information and Event Management |
| 23 | CB.EN.P2CYS15025 | Sudakshina Singha Roy | CBEAT: Chrome Browser Extension Analysis Tool |