S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS18001 | ADIT GHILDIYAL | Cube Attack on trivium and espresso |
2 | CB.EN.P2CYS18002 | AISWARYA AJAY | Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack |
3 | CB.EN.P2CYS18003 | AISWARYA K K | Application of Secret Sharing Scheme in Software Watermarking |
4 | CB.EN.P2CYS18004 | ARAVIND DATH D | Role Mining in Distributed Firewall Using Matrix Factorization Methods |
5 | CB.EN.P2CYS18005 | ATHULYA A A | Towards the Detection of Phishing Attacks |
6 | CB.EN.P2CYS18006 | CHANDANA PRIYA L | (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations |
7 | CB.EN.P2CYS18007 | HARISH R | Facilitating Cryptojacking Through Internet Middle Boxes |
8 | CB.EN.P2CYS18008 | KARTHIK J | Video Game DRM:Analysis and Methods of Reinforce DRM |
9 | CB.EN.P2CYS18009 | KAVIYA A U | CCA Secure Proxy Re-encryption |
10 | CB.EN.P2CYS18010 | KAVURI SOWMYA | A secure protocol for delivery of firmware updates over the air in IoT devices |
11 | CB.EN.P2CYS18011 | KRIPA M | Blockchain Framework for Social Media DRM Based on Secret Sharing |
12 | CB.EN.P2CYS18012 | MUTHURAJ S | Detection and Prevention of Attacks on Active Directory Using SIEM |
13 | CB.EN.P2CYS18014 | PETER WALLKER A | Anonymous Network Based on Software Defined Networking |
14 | CB.EN.P2CYS18015 | PONNAPATI DIVYA JYOTHI | Vuln-check: A static Analyser Framework for security parameters in web |
15 | CB.EN.P2CYS18016 | PRIYANKA MOHAN V | Performance comparison of machine learning algorithms on intrusion detection system |
16 | CB.EN.P2CYS18017 | PUTREVU MOHAN ANAND | An Ensemble Approach For Algorithmically Generated Domain Name Detection Using Statistical And Lexical Analysis |
17 | CB.EN.P2CYS18018 | REETU MARIYA JACOB | Application of Visual Cryptography Scheme in Software Watermarking |
18 | CB.EN.P2CYS18019 | SAM JASPER R | Network Traffic classification Based on NIST statistical Test |
19 | CB.EN.P2CYS18020 | SANGEERTH P S | Blockchain based Smart Contracts in Automation of Shipping Ports |
20 | CB.EN.P2CYS18021 | SARNALA NARESH | Penetration testing On Oauth 2.0 protocol |
21 | CB.EN.P2CYS18022 | SAURABH SHRIVASTAVA | On the Statistical Analysis of ZUC, Espresso and Grain V1 |
22 | CB.EN.P2CYS18023 | SREERAG M | FBHash: A New Similarity Hashing Scheme for Digital Forensics |
23 | CB.EN.P2CYS18024 | SRIRAM A | Distinguishing Keystreams generated by various |
24 | CB.EN.P2CYS18025 | SUCHITRA DAS | Cryptosystems |
25 | CB.EN.P2CYS18027 | VARSHINI P | A Hierarchical key Management Protocol for communication between IoT devices |
26 | CB.EN.P2CYS18028 | VENKATA BHASKARA SASTRY T | Bluetooth Low Energy Devices: Attacks and Mitigations |
27 | CB.EN.P2CYS18029 | VISHNU V | Cyber Reconnaissance: Addressing the significance design considerations for reconnaissance tools. |
28 | CB.EN.P2CYS18030 | VIVEKANANTHAN V | Dynamic Watermarking Using Python AST |
29 | CB.EN.P2CYS18032 | YOGESHWAR B R | A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0 |