Skip to content

Commit

Permalink
Details Updated
Browse files Browse the repository at this point in the history
  • Loading branch information
ramagururadhakrishnan authored Jul 11, 2024
1 parent 263da69 commit 231da75
Showing 1 changed file with 22 additions and 23 deletions.
45 changes: 22 additions & 23 deletions batch/2009-11.md
Original file line number Diff line number Diff line change
@@ -1,32 +1,31 @@

# TIFAC-CORE in Cyber Security - M.Tech 2009 - 2011 ![](https://img.shields.io/badge/-Live-brightgreen)
# TIFAC-CORE in Cyber Security - M.Tech Projects

<p align="center">
<img src="https://amrita-tifac-cyber-blockchain.github.io/Amrita-TIFAC-Cyber-Blockchain/AVV_PNG.png" alt ="Amrita" width="400" />
<img src="https://amrita-tifac-cyber-blockchain.github.io/Amrita-TIFAC-Cyber-Blockchain/TIFAC-CORE_in_Cyber_Security.png" alt ="TIFAC-CYBER" width="180" />
</p>

## Completed ![](https://img.shields.io/badge/-Completed-darkgreen)
## M.Tech 2009 - 2011 ![](https://img.shields.io/badge/-Completed-darkgreen)

| S.No | Roll Number | Name |
|:----:|:-----------:|:----:|
| 1 | CB.EN.P2CYS09001 | Aathira K. S. |
| 2 | CB.EN.P2CYS09002 | Abinaya N. |
| 3 | CB.EN.P2CYS09003 | Aishwarya Nandakumar |
| 4 | CB.EN.P2CYS09004 | Anju S.S. |
| 5 | CB.EN.P2CYS09005 | Arthy S. |
| 6 | CB.EN.P2CYS09006 | Arun Thomas |
| 7 | CB.EN.P2CYS09007 | Asha Vijayan |
| 8 | CB.EN.P2CYS09008 | Athira M. Nambiar |
| 9 | CB.EN.P2CYS09009 | Balaji R. |
| 10 | CB.EN.P2CYS09010 | Darsana R. |
| 11 | CB.EN.P2CYS09011 | Ganesh Naghu K. J. |
| 12 | CB.EN.P2CYS09012 | Harmya P. |
| 13 | CB.EN.P2CYS09013 | Hemanth Vatturi |
| 14 | CB.EN.P2CYS09014 | Hiran V. Nath |
| 15 | CB.EN.P2CYS09016 | Noopa Jagadeesh |
| 16 | CB.EN.P2CYS09018 | Priya P. |
| 17 | CB.EN.P2CYS09020 | Thulasi N. Kutty |
| 18 | CB.EN.P2CYS09022 | Yazhini C. |
| S.No | Roll No. | Name | Project Title |
|:----:|:-----------:|:----|:----|
| 1 | CB.EN.P2CYS09001 | Aathira K. S. | Anti-Malware System Using Bloom Filters and Ensemble Pattern Matching Algorithms |
| 2 | CB.EN.P2CYS09002 | Abinaya N. | Host Identity Protocol Analysis |
| 3 | CB.EN.P2CYS09003 | Aishwarya Nandakumar | Non-Linear Secret Sharing for Gray Scale and Binary Images |
| 4 | CB.EN.P2CYS09004 | Anju S.S. | Quantitative and Qualitative Steganalysis of Images |
| 5 | CB.EN.P2CYS09005 | Arthy S. | Cryptanalysis of Stream Ciphers Using SAT Solvers |
| 6 | CB.EN.P2CYS09006 | Arun Thomas | Statistical Analysis of Block Cipher |
| 7 | CB.EN.P2CYS09007 | Asha Vijayan | A System Approach for DDoS Detection Using Hidden Markov Models |
| 8 | CB.EN.P2CYS09008 | Athira M. Nambiar | Secure Databases Through Distributed Source Coding of Sift Descriptors |
| 9 | CB.EN.P2CYS09009 | Balaji R. | Security in Smartphones for Enterprise Applications |
| 10 | CB.EN.P2CYS09010 | Darsana R. | Securing System Against Buffer Overflow and Rootkit Attacks |
| 11 | CB.EN.P2CYS09011 | Ganesh Naghu K. J. | VoIP Security |
| 12 | CB.EN.P2CYS09012 | Harmya P. | Image Steganography Using Covering Codes |
| 13 | CB.EN.P2CYS09013 | Hemanth Vatturi | Statistical Testing on Stream Cipher |
| 14 | CB.EN.P2CYS09014 | Hiran V. Nath | Reconciliation Engine and Metric for Network Vulnerability Assessment |
| 15 | CB.EN.P2CYS09016 | Noopa Jagadeesh | Verifiable Secret Sharing in Images |
| 16 | CB.EN.P2CYS09018 | Priya P. | Performance Evaluation of Supervised and Unsupervised Filtering Techniques in Spam Detection |
| 17 | CB.EN.P2CYS09020 | Thulasi N. Kutty | Performance Enhancement of Intrusion Detection Using Adaboost Based Algorithm |
| 18 | CB.EN.P2CYS09022 | Yazhini C. | Mobile Security for Enterprise Applications |


0 comments on commit 231da75

Please sign in to comment.