| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS16001 | Aishwarya R | Mapping Browser Artifact using Metadata Association |
| 2 | CB.EN.P2CYS16002 | Anjana K | Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies |
| 3 | CB.EN.P2CYS16003 | Anuja J S | IRIS Template Security |
| 4 | CB.EN.P2CYS16004 | Aswathy S V | A Customized LTE Protocol for Registration, Location Update and Call Flow with analysis of Automobile Blockchain Application |
| 5 | CB.EN.P2CYS16005 | Aswin Kumar A | Facilitating Cryptojacking through Internet Middle Boxes: Feasibility Evaluation and Experimental Demonstration |
| 6 | CB.EN.P2CYS16006 | Chithra S | Online Lottery using Ethereum Blockchain |
| 7 | CB.EN.P2CYS16007 | Durga S | Server Side Template Injection - RCE for Modern Web Applications |
| 8 | CB.EN.P2CYS16008 | Guntupalli Manoj Kumar | IRC Based Botnet Detection by Bot Parameters Correlation |
| 9 | CB.EN.P2CYS16009 | Harikrishnan V N | Advanced Persistent Threat Detection Using SIEM |
| 10 | CB.EN.P2CYS16010 | Indhumathi Devi D | Lotto using Random Number Generator |
| 11 | CB.EN.P2CYS16011 | Jayasri K S | FAST - Firewall Audit and Security Tool |
| 12 | CB.EN.P2CYS16012 | Jithisha Rajan | Secure Storage Of Medical Images Using Wavelet Compression And Visual Cryptography |
| 13 | CB.EN.P2CYS16015 | Mahesh Kumar S | Distributed Human Interaction Proof for Public Blockchain Platform |
| 14 | CB.EN.P2CYS16016 | Mariya Benji | Secure Storage of Data in IPFS |
| 15 | CB.EN.P2CYS16017 | Meenakshi Suresh | Exploitation of HTTP/2 Proxies for Cryptojacking |
| 16 | CB.EN.P2CYS16018 | Pandimeena S | Image Watermarking using SVD and Securing it through Authentication |
| 17 | CB.EN.P2CYS16019 | Rajalakshmi A | Data provenance using Blockchain and IPFS |
| 18 | CB.EN.P2CYS16020 | Sajana P | Certificate Management System using Blockchain |
| 19 | CB.EN.P2CYS16021 | Silpa Viswambaran | Quantum Safe End to End Encryption System |
| 20 | CB.EN.P2CYS16022 | Sivasangari V | Modern Approach to Identify the Fake News using Machine Learning |
| 21 | CB.EN.P2CYS16023 | Srinidhi V | HDGAKA: Hierachical Dynamic Group based Authentication and Key Agreement Protocol for Machine Type Communication in LTE Networks |
| 22 | CB.EN.P2CYS16024 | Sudireddy Madhuri | Enhanced DTLS Protocol for IoT |
| 23 | CB.EN.P2CYS16025 | Suriya Prasath S | Rule Based Framework for Detecting Vulnerability Exploit |
| 24 | CB.EN.P2CYS16026 | Vighnesh S | Detection of Flooding Attack in IoT Network |
| 25 | CB.EN.P2CYS16027 | Vishnu Thampy R | Implementation of Secret Sharing Algorithm using Slack Space Concept |