Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2020 - 2022

S.No Roll No. Name Project Title
1 CB.EN.P2CYS20001 Abilesh Raja Detection of Log4j Attack in SDN Environment
2 CB.EN.P2CYS20003 A. Ajay Balaji Botnet Detection with Machine Learning
3 CB.EN.P2CYS20004 Akash Hari Differential cryptanalysis of image encryption
4 CB.EN.P2CYS20005 Ambrish R Deep Learning for Classification of Encrypted Images
5 CB.EN.P2CYS20006 Anirudh Srinivas Balaji QUICLORIS: A Slow Denial-of-Service Attack on the QUIC Protocol
6 CB.EN.P2CYS20007 Anjana Dinesh Cryptanalysis of SPARX Family of Ciphers
7 CB.EN.P2CYS20008 Arka Prava Sarkar PE Header Analysis for Malware Detection PE Header Analysis for Malware Detection
8 CB.EN.P2CYS20009 Artiben Tulsibhai Vadhaiya Secret sharing using latin square
9 CB.EN.P2CYS20012 Danda Prudhvi Krishna SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier
10 CB.EN.P2CYS20013 Divya T A model to detect domain names generated by DGA malware
11 CB.EN.P2CYS20014 Gandavaram Anuhya Multipath TCP
12 CB.EN.P2CYS20016 P. Gnanendra Prasad Securely Importing of Back-Up File into Cryptowallet
13 CB.EN.P2CYS20017 Gokul G Smart wallet for creating sub tokens
14 CB.EN.P2CYS20019 S Kowshik Hurshan ZERO TRUST SECURITY
15 CB.EN.P2CYS20021 Penumallu Abhiram Reddy Android In-Memory Object Recovery and Reconstruction
16 CB.EN.P2CYS20022 Pillai Anjali Anilkumar Region Incrementing Scheme in Visual Cryptography
17 CB.EN.P2CYS20023 Pinnamaneni Krishna Vamsi Traffic classification http/2
18 CB.EN.P2CYS20024 Pradeep Kumar G PRIVACY PRESERVATION IN VEHICULAR AD-HOCNETWORKS ( VANET )
19 CB.EN.P2CYS20025 Prathyusha V Verifiable Secret Sharing Scheme for Audio Security
20 CB.EN.P2CYS20026 Preethi R A Secure Protocol for Authentication and Data Storage for Healthcare System
21 CB.EN.P2CYS20027 Rahul Singh Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web
22 CB.EN.P2CYS20028 Sabari K K Anomaly-based Intrusion Detection using GAN for Industrial Control Systems
23 CB.EN.P2CYS20029 Sreelakshmi Girisan ASCON CIPHER
24 CB.EN.P2CYS20030 Sreelakshmi Tv Differential-Linear Cryptanalysis from an AlgebraicPerspective
25 CB.EN.P2CYS20031 Subhamoy Som Bypassing FRP and screen lock on Android Device for data acquisition and forensic investigation
26 CB.EN.P2CYS20033 Thummala Tejasree Hash Function Based Software Watermarking