| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS18001 | ADIT GHILDIYAL | Cube Attack on trivium and espresso |
| 2 | CB.EN.P2CYS18002 | AISWARYA AJAY | Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack |
| 3 | CB.EN.P2CYS18003 | AISWARYA K K | Application of Secret Sharing Scheme in Software Watermarking |
| 4 | CB.EN.P2CYS18004 | ARAVIND DATH D | Role Mining in Distributed Firewall Using Matrix Factorization Methods |
| 5 | CB.EN.P2CYS18005 | ATHULYA A A | Towards the Detection of Phishing Attacks |
| 6 | CB.EN.P2CYS18006 | CHANDANA PRIYA L | (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations |
| 7 | CB.EN.P2CYS18007 | HARISH R | Facilitating Cryptojacking Through Internet Middle Boxes |
| 8 | CB.EN.P2CYS18008 | KARTHIK J | Video Game DRM:Analysis and Methods of Reinforce DRM |
| 9 | CB.EN.P2CYS18009 | KAVIYA A U | CCA Secure Proxy Re-encryption |
| 10 | CB.EN.P2CYS18010 | KAVURI SOWMYA | A secure protocol for delivery of firmware updates over the air in IoT devices |
| 11 | CB.EN.P2CYS18011 | KRIPA M | Blockchain Framework for Social Media DRM Based on Secret Sharing |
| 12 | CB.EN.P2CYS18012 | MUTHURAJ S | Detection and Prevention of Attacks on Active Directory Using SIEM |
| 13 | CB.EN.P2CYS18014 | PETER WALLKER A | Anonymous Network Based on Software Defined Networking |
| 14 | CB.EN.P2CYS18015 | PONNAPATI DIVYA JYOTHI | Vuln-check: A static Analyser Framework for security parameters in web |
| 15 | CB.EN.P2CYS18016 | PRIYANKA MOHAN V | Performance comparison of machine learning algorithms on intrusion detection system |
| 16 | CB.EN.P2CYS18017 | PUTREVU MOHAN ANAND | An Ensemble Approach For Algorithmically Generated Domain Name Detection Using Statistical And Lexical Analysis |
| 17 | CB.EN.P2CYS18018 | REETU MARIYA JACOB | Application of Visual Cryptography Scheme in Software Watermarking |
| 18 | CB.EN.P2CYS18019 | SAM JASPER R | Network Traffic classification Based on NIST statistical Test |
| 19 | CB.EN.P2CYS18020 | SANGEERTH P S | Blockchain based Smart Contracts in Automation of Shipping Ports |
| 20 | CB.EN.P2CYS18021 | SARNALA NARESH | Penetration testing On Oauth 2.0 protocol |
| 21 | CB.EN.P2CYS18022 | SAURABH SHRIVASTAVA | On the Statistical Analysis of ZUC, Espresso and Grain V1 |
| 22 | CB.EN.P2CYS18023 | SREERAG M | FBHash: A New Similarity Hashing Scheme for Digital Forensics |
| 23 | CB.EN.P2CYS18024 | SRIRAM A | Distinguishing Keystreams generated by various |
| 24 | CB.EN.P2CYS18025 | SUCHITRA DAS | Cryptosystems |
| 25 | CB.EN.P2CYS18027 | VARSHINI P | A Hierarchical key Management Protocol for communication between IoT devices |
| 26 | CB.EN.P2CYS18028 | VENKATA BHASKARA SASTRY T | Bluetooth Low Energy Devices: Attacks and Mitigations |
| 27 | CB.EN.P2CYS18029 | VISHNU V | Cyber Reconnaissance: Addressing the significance design considerations for reconnaissance tools. |
| 28 | CB.EN.P2CYS18030 | VIVEKANANTHAN V | Dynamic Watermarking Using Python AST |
| 29 | CB.EN.P2CYS18032 | YOGESHWAR B R | A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0 |