S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS20001 | Abilesh Raja | Detection of Log4j Attack in SDN Environment |
2 | CB.EN.P2CYS20003 | A. Ajay Balaji | Botnet Detection with Machine Learning |
3 | CB.EN.P2CYS20004 | Akash Hari | Differential cryptanalysis of image encryption |
4 | CB.EN.P2CYS20005 | Ambrish R | Deep Learning for Classification of Encrypted Images |
5 | CB.EN.P2CYS20006 | Anirudh Srinivas Balaji | QUICLORIS: A Slow Denial-of-Service Attack on the QUIC Protocol |
6 | CB.EN.P2CYS20007 | Anjana Dinesh | Cryptanalysis of SPARX Family of Ciphers |
7 | CB.EN.P2CYS20008 | Arka Prava Sarkar | PE Header Analysis for Malware Detection PE Header Analysis for Malware Detection |
8 | CB.EN.P2CYS20009 | Artiben Tulsibhai Vadhaiya | Secret sharing using latin square |
9 | CB.EN.P2CYS20012 | Danda Prudhvi Krishna | SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier |
10 | CB.EN.P2CYS20013 | Divya T | A model to detect domain names generated by DGA malware |
11 | CB.EN.P2CYS20014 | Gandavaram Anuhya | Multipath TCP |
12 | CB.EN.P2CYS20016 | P. Gnanendra Prasad | Securely Importing of Back-Up File into Cryptowallet |
13 | CB.EN.P2CYS20017 | Gokul G | Smart wallet for creating sub tokens |
14 | CB.EN.P2CYS20019 | S Kowshik Hurshan | ZERO TRUST SECURITY |
15 | CB.EN.P2CYS20021 | Penumallu Abhiram Reddy | Android In-Memory Object Recovery and Reconstruction |
16 | CB.EN.P2CYS20022 | Pillai Anjali Anilkumar | Region Incrementing Scheme in Visual Cryptography |
17 | CB.EN.P2CYS20023 | Pinnamaneni Krishna Vamsi | Traffic classification http/2 |
18 | CB.EN.P2CYS20024 | Pradeep Kumar G | PRIVACY PRESERVATION IN VEHICULAR AD-HOCNETWORKS ( VANET ) |
19 | CB.EN.P2CYS20025 | Prathyusha V | Verifiable Secret Sharing Scheme for Audio Security |
20 | CB.EN.P2CYS20026 | Preethi R | A Secure Protocol for Authentication and Data Storage for Healthcare System |
21 | CB.EN.P2CYS20027 | Rahul Singh | Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web |
22 | CB.EN.P2CYS20028 | Sabari K K | Anomaly-based Intrusion Detection using GAN for Industrial Control Systems |
23 | CB.EN.P2CYS20029 | Sreelakshmi Girisan | ASCON CIPHER |
24 | CB.EN.P2CYS20030 | Sreelakshmi Tv | Differential-Linear Cryptanalysis from an AlgebraicPerspective |
25 | CB.EN.P2CYS20031 | Subhamoy Som | Bypassing FRP and screen lock on Android Device for data acquisition and forensic investigation |
26 | CB.EN.P2CYS20033 | Thummala Tejasree | Hash Function Based Software Watermarking |