S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS16001 | Aishwarya R | Mapping Browser Artifact using Metadata Association |
2 | CB.EN.P2CYS16002 | Anjana K | Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies |
3 | CB.EN.P2CYS16003 | Anuja J S | IRIS Template Security |
4 | CB.EN.P2CYS16004 | Aswathy S V | A Customized LTE Protocol for Registration, Location Update and Call Flow with analysis of Automobile Blockchain Application |
5 | CB.EN.P2CYS16005 | Aswin Kumar A | Facilitating Cryptojacking through Internet Middle Boxes: Feasibility Evaluation and Experimental Demonstration |
6 | CB.EN.P2CYS16006 | Chithra S | Online Lottery using Ethereum Blockchain |
7 | CB.EN.P2CYS16007 | Durga S | Server Side Template Injection - RCE for Modern Web Applications |
8 | CB.EN.P2CYS16008 | Guntupalli Manoj Kumar | IRC Based Botnet Detection by Bot Parameters Correlation |
9 | CB.EN.P2CYS16009 | Harikrishnan V N | Advanced Persistent Threat Detection Using SIEM |
10 | CB.EN.P2CYS16010 | Indhumathi Devi D | Lotto using Random Number Generator |
11 | CB.EN.P2CYS16011 | Jayasri K S | FAST - Firewall Audit and Security Tool |
12 | CB.EN.P2CYS16012 | Jithisha Rajan | Secure Storage Of Medical Images Using Wavelet Compression And Visual Cryptography |
13 | CB.EN.P2CYS16015 | Mahesh Kumar S | Distributed Human Interaction Proof for Public Blockchain Platform |
14 | CB.EN.P2CYS16016 | Mariya Benji | Secure Storage of Data in IPFS |
15 | CB.EN.P2CYS16017 | Meenakshi Suresh | Exploitation of HTTP/2 Proxies for Cryptojacking |
16 | CB.EN.P2CYS16018 | Pandimeena S | Image Watermarking using SVD and Securing it through Authentication |
17 | CB.EN.P2CYS16019 | Rajalakshmi A | Data provenance using Blockchain and IPFS |
18 | CB.EN.P2CYS16020 | Sajana P | Certificate Management System using Blockchain |
19 | CB.EN.P2CYS16021 | Silpa Viswambaran | Quantum Safe End to End Encryption System |
20 | CB.EN.P2CYS16022 | Sivasangari V | Modern Approach to Identify the Fake News using Machine Learning |
21 | CB.EN.P2CYS16023 | Srinidhi V | HDGAKA: Hierachical Dynamic Group based Authentication and Key Agreement Protocol for Machine Type Communication in LTE Networks |
22 | CB.EN.P2CYS16024 | Sudireddy Madhuri | Enhanced DTLS Protocol for IoT |
23 | CB.EN.P2CYS16025 | Suriya Prasath S | Rule Based Framework for Detecting Vulnerability Exploit |
24 | CB.EN.P2CYS16026 | Vighnesh S | Detection of Flooding Attack in IoT Network |
25 | CB.EN.P2CYS16027 | Vishnu Thampy R | Implementation of Secret Sharing Algorithm using Slack Space Concept |