Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2016 - 2018

S.No Roll No. Name Project Title
1 CB.EN.P2CYS16001 Aishwarya R Mapping Browser Artifact using Metadata Association
2 CB.EN.P2CYS16002 Anjana K Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies
3 CB.EN.P2CYS16003 Anuja J S IRIS Template Security
4 CB.EN.P2CYS16004 Aswathy S V A Customized LTE Protocol for Registration, Location Update and Call Flow with analysis of Automobile Blockchain Application
5 CB.EN.P2CYS16005 Aswin Kumar A Facilitating Cryptojacking through Internet Middle Boxes: Feasibility Evaluation and Experimental Demonstration
6 CB.EN.P2CYS16006 Chithra S Online Lottery using Ethereum Blockchain
7 CB.EN.P2CYS16007 Durga S Server Side Template Injection - RCE for Modern Web Applications
8 CB.EN.P2CYS16008 Guntupalli Manoj Kumar IRC Based Botnet Detection by Bot Parameters Correlation
9 CB.EN.P2CYS16009 Harikrishnan V N Advanced Persistent Threat Detection Using SIEM
10 CB.EN.P2CYS16010 Indhumathi Devi D Lotto using Random Number Generator
11 CB.EN.P2CYS16011 Jayasri K S FAST - Firewall Audit and Security Tool
12 CB.EN.P2CYS16012 Jithisha Rajan Secure Storage Of Medical Images Using Wavelet Compression And Visual Cryptography
13 CB.EN.P2CYS16015 Mahesh Kumar S Distributed Human Interaction Proof for Public Blockchain Platform
14 CB.EN.P2CYS16016 Mariya Benji Secure Storage of Data in IPFS
15 CB.EN.P2CYS16017 Meenakshi Suresh Exploitation of HTTP/2 Proxies for Cryptojacking
16 CB.EN.P2CYS16018 Pandimeena S Image Watermarking using SVD and Securing it through Authentication
17 CB.EN.P2CYS16019 Rajalakshmi A Data provenance using Blockchain and IPFS
18 CB.EN.P2CYS16020 Sajana P Certificate Management System using Blockchain
19 CB.EN.P2CYS16021 Silpa Viswambaran Quantum Safe End to End Encryption System
20 CB.EN.P2CYS16022 Sivasangari V Modern Approach to Identify the Fake News using Machine Learning
21 CB.EN.P2CYS16023 Srinidhi V HDGAKA: Hierachical Dynamic Group based Authentication and Key Agreement Protocol for Machine Type Communication in LTE Networks
22 CB.EN.P2CYS16024 Sudireddy Madhuri Enhanced DTLS Protocol for IoT
23 CB.EN.P2CYS16025 Suriya Prasath S Rule Based Framework for Detecting Vulnerability Exploit
24 CB.EN.P2CYS16026 Vighnesh S Detection of Flooding Attack in IoT Network
25 CB.EN.P2CYS16027 Vishnu Thampy R Implementation of Secret Sharing Algorithm using Slack Space Concept