From 231da751372e23a38e21aad8da34767ef7b68987 Mon Sep 17 00:00:00 2001 From: Ramaguru Radhakrishnan <7790256+ramagururadhakrishnan@users.noreply.github.com> Date: Thu, 11 Jul 2024 13:41:13 +0530 Subject: [PATCH] Details Updated --- batch/2009-11.md | 45 ++++++++++++++++++++++----------------------- 1 file changed, 22 insertions(+), 23 deletions(-) diff --git a/batch/2009-11.md b/batch/2009-11.md index 221f0fa..5084c20 100644 --- a/batch/2009-11.md +++ b/batch/2009-11.md @@ -1,32 +1,31 @@ - -# TIFAC-CORE in Cyber Security - M.Tech 2009 - 2011 ![](https://img.shields.io/badge/-Live-brightgreen) +# TIFAC-CORE in Cyber Security - M.Tech Projects
-## Completed ![](https://img.shields.io/badge/-Completed-darkgreen) +## M.Tech 2009 - 2011 ![](https://img.shields.io/badge/-Completed-darkgreen) -| S.No | Roll Number | Name | -|:----:|:-----------:|:----:| -| 1 | CB.EN.P2CYS09001 | Aathira K. S. | -| 2 | CB.EN.P2CYS09002 | Abinaya N. | -| 3 | CB.EN.P2CYS09003 | Aishwarya Nandakumar | -| 4 | CB.EN.P2CYS09004 | Anju S.S. | -| 5 | CB.EN.P2CYS09005 | Arthy S. | -| 6 | CB.EN.P2CYS09006 | Arun Thomas | -| 7 | CB.EN.P2CYS09007 | Asha Vijayan | -| 8 | CB.EN.P2CYS09008 | Athira M. Nambiar | -| 9 | CB.EN.P2CYS09009 | Balaji R. | -| 10 | CB.EN.P2CYS09010 | Darsana R. | -| 11 | CB.EN.P2CYS09011 | Ganesh Naghu K. J. | -| 12 | CB.EN.P2CYS09012 | Harmya P. | -| 13 | CB.EN.P2CYS09013 | Hemanth Vatturi | -| 14 | CB.EN.P2CYS09014 | Hiran V. Nath | -| 15 | CB.EN.P2CYS09016 | Noopa Jagadeesh | -| 16 | CB.EN.P2CYS09018 | Priya P. | -| 17 | CB.EN.P2CYS09020 | Thulasi N. Kutty | -| 18 | CB.EN.P2CYS09022 | Yazhini C. | +| S.No | Roll No. | Name | Project Title | +|:----:|:-----------:|:----|:----| +| 1 | CB.EN.P2CYS09001 | Aathira K. S. | Anti-Malware System Using Bloom Filters and Ensemble Pattern Matching Algorithms | +| 2 | CB.EN.P2CYS09002 | Abinaya N. | Host Identity Protocol Analysis | +| 3 | CB.EN.P2CYS09003 | Aishwarya Nandakumar | Non-Linear Secret Sharing for Gray Scale and Binary Images | +| 4 | CB.EN.P2CYS09004 | Anju S.S. | Quantitative and Qualitative Steganalysis of Images | +| 5 | CB.EN.P2CYS09005 | Arthy S. | Cryptanalysis of Stream Ciphers Using SAT Solvers | +| 6 | CB.EN.P2CYS09006 | Arun Thomas | Statistical Analysis of Block Cipher | +| 7 | CB.EN.P2CYS09007 | Asha Vijayan | A System Approach for DDoS Detection Using Hidden Markov Models | +| 8 | CB.EN.P2CYS09008 | Athira M. Nambiar | Secure Databases Through Distributed Source Coding of Sift Descriptors | +| 9 | CB.EN.P2CYS09009 | Balaji R. | Security in Smartphones for Enterprise Applications | +| 10 | CB.EN.P2CYS09010 | Darsana R. | Securing System Against Buffer Overflow and Rootkit Attacks | +| 11 | CB.EN.P2CYS09011 | Ganesh Naghu K. J. | VoIP Security | +| 12 | CB.EN.P2CYS09012 | Harmya P. | Image Steganography Using Covering Codes | +| 13 | CB.EN.P2CYS09013 | Hemanth Vatturi | Statistical Testing on Stream Cipher | +| 14 | CB.EN.P2CYS09014 | Hiran V. Nath | Reconciliation Engine and Metric for Network Vulnerability Assessment | +| 15 | CB.EN.P2CYS09016 | Noopa Jagadeesh | Verifiable Secret Sharing in Images | +| 16 | CB.EN.P2CYS09018 | Priya P. | Performance Evaluation of Supervised and Unsupervised Filtering Techniques in Spam Detection | +| 17 | CB.EN.P2CYS09020 | Thulasi N. Kutty | Performance Enhancement of Intrusion Detection Using Adaboost Based Algorithm | +| 18 | CB.EN.P2CYS09022 | Yazhini C. | Mobile Security for Enterprise Applications |