Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2018 - 2020

S.No Roll No. Name Project Title
1 CB.EN.P2CYS18001 ADIT GHILDIYAL Cube Attack on trivium and espresso
2 CB.EN.P2CYS18002 AISWARYA AJAY Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack
3 CB.EN.P2CYS18003 AISWARYA K K Application of Secret Sharing Scheme in Software Watermarking
4 CB.EN.P2CYS18004 ARAVIND DATH D Role Mining in Distributed Firewall Using Matrix Factorization Methods
5 CB.EN.P2CYS18005 ATHULYA A A Towards the Detection of Phishing Attacks
6 CB.EN.P2CYS18006 CHANDANA PRIYA L (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations
7 CB.EN.P2CYS18007 HARISH R Facilitating Cryptojacking Through Internet Middle Boxes
8 CB.EN.P2CYS18008 KARTHIK J Video Game DRM:Analysis and Methods of Reinforce DRM
9 CB.EN.P2CYS18009 KAVIYA A U CCA Secure Proxy Re-encryption
10 CB.EN.P2CYS18010 KAVURI SOWMYA A secure protocol for delivery of firmware updates over the air in IoT devices
11 CB.EN.P2CYS18011 KRIPA M Blockchain Framework for Social Media DRM Based on Secret Sharing
12 CB.EN.P2CYS18012 MUTHURAJ S Detection and Prevention of Attacks on Active Directory Using SIEM
13 CB.EN.P2CYS18014 PETER WALLKER A Anonymous Network Based on Software Defined Networking
14 CB.EN.P2CYS18015 PONNAPATI DIVYA JYOTHI Vuln-check: A static Analyser Framework for security parameters in web
15 CB.EN.P2CYS18016 PRIYANKA MOHAN V Performance comparison of machine learning algorithms on intrusion detection system
16 CB.EN.P2CYS18017 PUTREVU MOHAN ANAND An Ensemble Approach For Algorithmically Generated Domain Name Detection Using Statistical And Lexical Analysis
17 CB.EN.P2CYS18018 REETU MARIYA JACOB Application of Visual Cryptography Scheme in Software Watermarking
18 CB.EN.P2CYS18019 SAM JASPER R Network Traffic classification Based on NIST statistical Test
19 CB.EN.P2CYS18020 SANGEERTH P S Blockchain based Smart Contracts in Automation of Shipping Ports
20 CB.EN.P2CYS18021 SARNALA NARESH Penetration testing On Oauth 2.0 protocol
21 CB.EN.P2CYS18022 SAURABH SHRIVASTAVA On the Statistical Analysis of ZUC, Espresso and Grain V1
22 CB.EN.P2CYS18023 SREERAG M FBHash: A New Similarity Hashing Scheme for Digital Forensics
23 CB.EN.P2CYS18024 SRIRAM A Distinguishing Keystreams generated by various
24 CB.EN.P2CYS18025 SUCHITRA DAS Cryptosystems
25 CB.EN.P2CYS18027 VARSHINI P A Hierarchical key Management Protocol for communication between IoT devices
26 CB.EN.P2CYS18028 VENKATA BHASKARA SASTRY T Bluetooth Low Energy Devices: Attacks and Mitigations
27 CB.EN.P2CYS18029 VISHNU V Cyber Reconnaissance: Addressing the significance design considerations for reconnaissance tools.
28 CB.EN.P2CYS18030 VIVEKANANTHAN V Dynamic Watermarking Using Python AST
29 CB.EN.P2CYS18032 YOGESHWAR B R A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0