-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
263da69
commit 231da75
Showing
1 changed file
with
22 additions
and
23 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,32 +1,31 @@ | ||
|
||
# TIFAC-CORE in Cyber Security - M.Tech 2009 - 2011 ![](https://img.shields.io/badge/-Live-brightgreen) | ||
# TIFAC-CORE in Cyber Security - M.Tech Projects | ||
|
||
<p align="center"> | ||
<img src="https://amrita-tifac-cyber-blockchain.github.io/Amrita-TIFAC-Cyber-Blockchain/AVV_PNG.png" alt ="Amrita" width="400" /> | ||
<img src="https://amrita-tifac-cyber-blockchain.github.io/Amrita-TIFAC-Cyber-Blockchain/TIFAC-CORE_in_Cyber_Security.png" alt ="TIFAC-CYBER" width="180" /> | ||
</p> | ||
|
||
## Completed ![](https://img.shields.io/badge/-Completed-darkgreen) | ||
## M.Tech 2009 - 2011 ![](https://img.shields.io/badge/-Completed-darkgreen) | ||
|
||
| S.No | Roll Number | Name | | ||
|:----:|:-----------:|:----:| | ||
| 1 | CB.EN.P2CYS09001 | Aathira K. S. | | ||
| 2 | CB.EN.P2CYS09002 | Abinaya N. | | ||
| 3 | CB.EN.P2CYS09003 | Aishwarya Nandakumar | | ||
| 4 | CB.EN.P2CYS09004 | Anju S.S. | | ||
| 5 | CB.EN.P2CYS09005 | Arthy S. | | ||
| 6 | CB.EN.P2CYS09006 | Arun Thomas | | ||
| 7 | CB.EN.P2CYS09007 | Asha Vijayan | | ||
| 8 | CB.EN.P2CYS09008 | Athira M. Nambiar | | ||
| 9 | CB.EN.P2CYS09009 | Balaji R. | | ||
| 10 | CB.EN.P2CYS09010 | Darsana R. | | ||
| 11 | CB.EN.P2CYS09011 | Ganesh Naghu K. J. | | ||
| 12 | CB.EN.P2CYS09012 | Harmya P. | | ||
| 13 | CB.EN.P2CYS09013 | Hemanth Vatturi | | ||
| 14 | CB.EN.P2CYS09014 | Hiran V. Nath | | ||
| 15 | CB.EN.P2CYS09016 | Noopa Jagadeesh | | ||
| 16 | CB.EN.P2CYS09018 | Priya P. | | ||
| 17 | CB.EN.P2CYS09020 | Thulasi N. Kutty | | ||
| 18 | CB.EN.P2CYS09022 | Yazhini C. | | ||
| S.No | Roll No. | Name | Project Title | | ||
|:----:|:-----------:|:----|:----| | ||
| 1 | CB.EN.P2CYS09001 | Aathira K. S. | Anti-Malware System Using Bloom Filters and Ensemble Pattern Matching Algorithms | | ||
| 2 | CB.EN.P2CYS09002 | Abinaya N. | Host Identity Protocol Analysis | | ||
| 3 | CB.EN.P2CYS09003 | Aishwarya Nandakumar | Non-Linear Secret Sharing for Gray Scale and Binary Images | | ||
| 4 | CB.EN.P2CYS09004 | Anju S.S. | Quantitative and Qualitative Steganalysis of Images | | ||
| 5 | CB.EN.P2CYS09005 | Arthy S. | Cryptanalysis of Stream Ciphers Using SAT Solvers | | ||
| 6 | CB.EN.P2CYS09006 | Arun Thomas | Statistical Analysis of Block Cipher | | ||
| 7 | CB.EN.P2CYS09007 | Asha Vijayan | A System Approach for DDoS Detection Using Hidden Markov Models | | ||
| 8 | CB.EN.P2CYS09008 | Athira M. Nambiar | Secure Databases Through Distributed Source Coding of Sift Descriptors | | ||
| 9 | CB.EN.P2CYS09009 | Balaji R. | Security in Smartphones for Enterprise Applications | | ||
| 10 | CB.EN.P2CYS09010 | Darsana R. | Securing System Against Buffer Overflow and Rootkit Attacks | | ||
| 11 | CB.EN.P2CYS09011 | Ganesh Naghu K. J. | VoIP Security | | ||
| 12 | CB.EN.P2CYS09012 | Harmya P. | Image Steganography Using Covering Codes | | ||
| 13 | CB.EN.P2CYS09013 | Hemanth Vatturi | Statistical Testing on Stream Cipher | | ||
| 14 | CB.EN.P2CYS09014 | Hiran V. Nath | Reconciliation Engine and Metric for Network Vulnerability Assessment | | ||
| 15 | CB.EN.P2CYS09016 | Noopa Jagadeesh | Verifiable Secret Sharing in Images | | ||
| 16 | CB.EN.P2CYS09018 | Priya P. | Performance Evaluation of Supervised and Unsupervised Filtering Techniques in Spam Detection | | ||
| 17 | CB.EN.P2CYS09020 | Thulasi N. Kutty | Performance Enhancement of Intrusion Detection Using Adaboost Based Algorithm | | ||
| 18 | CB.EN.P2CYS09022 | Yazhini C. | Mobile Security for Enterprise Applications | | ||
|
||
|