| S.No | Roll No. | Name | Project Title |
|---|---|---|---|
| 1 | CB.EN.P2CYS20001 | Abilesh Raja | Detection of Log4j Attack in SDN Environment |
| 2 | CB.EN.P2CYS20003 | A. Ajay Balaji | Botnet Detection with Machine Learning |
| 3 | CB.EN.P2CYS20004 | Akash Hari | Differential cryptanalysis of image encryption |
| 4 | CB.EN.P2CYS20005 | Ambrish R | Deep Learning for Classification of Encrypted Images |
| 5 | CB.EN.P2CYS20006 | Anirudh Srinivas Balaji | QUICLORIS: A Slow Denial-of-Service Attack on the QUIC Protocol |
| 6 | CB.EN.P2CYS20007 | Anjana Dinesh | Cryptanalysis of SPARX Family of Ciphers |
| 7 | CB.EN.P2CYS20008 | Arka Prava Sarkar | PE Header Analysis for Malware Detection PE Header Analysis for Malware Detection |
| 8 | CB.EN.P2CYS20009 | Artiben Tulsibhai Vadhaiya | Secret sharing using latin square |
| 9 | CB.EN.P2CYS20012 | Danda Prudhvi Krishna | SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier |
| 10 | CB.EN.P2CYS20013 | Divya T | A model to detect domain names generated by DGA malware |
| 11 | CB.EN.P2CYS20014 | Gandavaram Anuhya | Multipath TCP |
| 12 | CB.EN.P2CYS20016 | P. Gnanendra Prasad | Securely Importing of Back-Up File into Cryptowallet |
| 13 | CB.EN.P2CYS20017 | Gokul G | Smart wallet for creating sub tokens |
| 14 | CB.EN.P2CYS20019 | S Kowshik Hurshan | ZERO TRUST SECURITY |
| 15 | CB.EN.P2CYS20021 | Penumallu Abhiram Reddy | Android In-Memory Object Recovery and Reconstruction |
| 16 | CB.EN.P2CYS20022 | Pillai Anjali Anilkumar | Region Incrementing Scheme in Visual Cryptography |
| 17 | CB.EN.P2CYS20023 | Pinnamaneni Krishna Vamsi | Traffic classification http/2 |
| 18 | CB.EN.P2CYS20024 | Pradeep Kumar G | PRIVACY PRESERVATION IN VEHICULAR AD-HOCNETWORKS ( VANET ) |
| 19 | CB.EN.P2CYS20025 | Prathyusha V | Verifiable Secret Sharing Scheme for Audio Security |
| 20 | CB.EN.P2CYS20026 | Preethi R | A Secure Protocol for Authentication and Data Storage for Healthcare System |
| 21 | CB.EN.P2CYS20027 | Rahul Singh | Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web |
| 22 | CB.EN.P2CYS20028 | Sabari K K | Anomaly-based Intrusion Detection using GAN for Industrial Control Systems |
| 23 | CB.EN.P2CYS20029 | Sreelakshmi Girisan | ASCON CIPHER |
| 24 | CB.EN.P2CYS20030 | Sreelakshmi Tv | Differential-Linear Cryptanalysis from an AlgebraicPerspective |
| 25 | CB.EN.P2CYS20031 | Subhamoy Som | Bypassing FRP and screen lock on Android Device for data acquisition and forensic investigation |
| 26 | CB.EN.P2CYS20033 | Thummala Tejasree | Hash Function Based Software Watermarking |