S.No | Roll No. | Name | Project Title |
---|---|---|---|
1 | CB.EN.P2CYS21001 | Akshay Mohan | Machine Learning based Detection of Hidden Data in Network Packets |
2 | CB.EN.P2CYS21002 | Aparna Tripathi | Enhancing Digital Forensic Readiness: Automated detection of missing and null log values |
3 | CB.EN.P2CYS21003 | Aravinth Raj S | Hybrid Intrusion Detection System for Industrial Control System |
4 | CB.EN.P2CYS21004 | Arvind Sriram | Extended Audio Secret Sharing Scheme with Polarity Detection |
5 | CB.EN.P2CYS21005 | Ashutosh Kumar | Detecting Cross Site Request Forgery using machine |
6 | CB.EN.P2CYS21006 | Ashwin Prashanth Parthiban | RIPDroid: Android Malware Detection based on Permissions and IP Reputation Model |
7 | CB.EN.P2CYS21008 | Chougule Mandar Pravin | Classifying DNS over HTTPS (DoH) Malicious/Benign Traffic using Deep Learning Models |
8 | CB.EN.P2CYS21011 | Gowriprasad Kuruba Bedala | Securing Web Browsing: Detection of Browser In The Browser Attack |
9 | CB.EN.P2CYS21012 | Gurram Vishal Raj | Exploiting Neural Network Model for Hiding and Triggering Malware |
10 | CB.EN.P2CYS21013 | H.Nikhitha | Deep learning based attack for classifying the key of |
11 | CB.EN.P2CYS21014 | Indrakanti Lakshmi Aishwarya | Improving the security of LCB against Deep Learning-based attacks |
12 | CB.EN.P2CYS21015 | Khandagale Swapneel Raosaheb | MeRiT: Media Rights Tracking using Hyperledger Fabric and AWS Rekognition |
13 | CB.EN.P2CYS21017 | Mohamed Feroz Khan D | Blockchain Forensics using OSINT and Graph |
14 | CB.EN.P2CYS21018 | Pothuri Lakshmi Harika | Bridging the Gaps in Solidity Smart Contract |
15 | CB.EN.P2CYS21019 | Prithvish N A | Robust image watermarking technique to resist geometric transformation attacks |
16 | CB.EN.P2CYS21020 | Pruthviraj Nitin Deshmukh | Anomaly Based Detection of Log4j Vulnerability in SDN |
17 | CB.EN.P2CYS21021 | Riya V Raj | GAN based Anomaly Intrusion Detection for Industrial Controller System |
18 | CB.EN.P2CYS21022 | Shanthosh K P | Security Inspection of Site-to-Site VPN by exploiting Internet Key Exchange(IKE) using OSPF |
19 | CB.EN.P2CYS21023 | Siddharth Bose | Security Analysis of CMS based Websites through CMSPY |
20 | CB.EN.P2CYS21024 | Swarag Sharma | Security Analysis of OAuth 2.0 Protocol |
21 | CB.EN.P2CYS21025 | T K Vrinda | Cryptanalysis of Selected Chaotic Image Encryption Schemes |
22 | CB.EN.P2CYS21026 | Vignesh Rajakumar | Deep Learning Based Cryptanalysis on SLIM Cipher |
23 | CB.EN.P2CYS21027 | Vinay B Sudheer | |
24 | CB.EN.P2CYS21028 | T. Vishnu Vardhan | Protecting cloud computing against DDOS attack |