Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC Cyber

M.Tech 2021 - 2023

S.No Roll No. Name Project Title (Linked to Project Repo) Publications/Patent
1 CB.EN.P2CYS21001  Akshay Mohan  Machine Learning based Detection of Hidden Data in Network Packets Click Here 
2 CB.EN.P2CYS21002  Aparna Tripathi  Enhancing Digital Forensic Readiness: Automated detection of missing and null log values   
3 CB.EN.P2CYS21003  Aravinth Raj S  Hybrid Intrusion Detection System for Industrial Control System Click Here
4 CB.EN.P2CYS21004  Arvind Sriram  Extended Audio Secret Sharing Scheme with Polarity Detection   
5 CB.EN.P2CYS21005  Ashutosh Kumar  Detecting Cross Site Request Forgery using machine   
6 CB.EN.P2CYS21006  Ashwin Prashanth Parthiban  RIPDroid: Android Malware Detection based on Permissions and IP Reputation Model Click Here 
7 CB.EN.P2CYS21008  Chougule Mandar Pravin  Classifying DNS over HTTPS (DoH) Malicious/Benign Traffic using Deep Learning Models Click Here 
8 CB.EN.P2CYS21011  Gowriprasad Kuruba Bedala  Securing Web Browsing: Detection of Browser In The Browser Attack   
9 CB.EN.P2CYS21012  Gurram Vishal Raj  Exploiting Neural Network Model for Hiding and Triggering Malware Click Here
10 CB.EN.P2CYS21013  H.Nikhitha  Deep learning based attack for classifying the key of   
11 CB.EN.P2CYS21014  Indrakanti Lakshmi Aishwarya  Improving the security of LCB against Deep Learning-based attacks   
12 CB.EN.P2CYS21015  Khandagale Swapneel Raosaheb  MeRiT: Media Rights Tracking using Hyperledger Fabric and AWS Rekognition   
13 CB.EN.P2CYS21017  Mohamed Feroz Khan D  Blockchain Forensics using OSINT and Temporal Graph Visualization   
14 CB.EN.P2CYS21018  Pothuri Lakshmi Harika  Bridging the gaps in Solidity Smart Contract Vulnerability Detection Tools   
15 CB.EN.P2CYS21019  Prithvish N A  Robust image watermarking technique to resist geometric transformation attacks   
16 CB.EN.P2CYS21020  Pruthviraj Nitin Deshmukh  Anomaly Based Detection of Log4j Vulnerability in SDN   
17 CB.EN.P2CYS21021  Riya V Raj  GAN based Anomaly Intrusion Detection for Industrial Controller System Click Here 
18 CB.EN.P2CYS21022  Shanthosh  K P  Security Inspection of Site-to-Site VPN by exploiting Internet Key Exchange(IKE) using OSPF   
19 CB.EN.P2CYS21023  Siddharth Bose  Security Analysis of CMS based Websites through CMSPY   
20 CB.EN.P2CYS21024  Swarag Sharma  Security Analysis of OAuth 2.0 Protocol   
21 CB.EN.P2CYS21025  T K Vrinda  Cryptanalysis of Selected Chaotic Image Encryption Schemes   
22 CB.EN.P2CYS21026  Vignesh Rajakumar  Deep Learning Based Cryptanalysis on SLIM Cipher Click Here 
23 CB.EN.P2CYS21027  Vinay B Sudheer     
24 CB.EN.P2CYS21028  T. Vishnu Vardhan  Protecting cloud computing against DDOS attack Click Here