Students pursuing research in field of Cyber Security
Full Time Students
S.No.StudentResearch TopicInstitution Name
1
Prabhakar KCybersecurity of critical Industrial Internet IoT/Control Systems/SCADA networksAmrita Vishwa Vidyapeetham, Coimbatore
2
Nimmy KLightweight usable security solutions for IoTAmrita Vishwa Vidyapeetham, Coimbatore
3
Nerella SameeraDEVELOPMENT OF A SYSTEM FOR CYBER SECURITY ANALYTICSAndhra University College of Engineering, Visakhapatnam
4
Chamarty AnushaObject DetectionAndhra University College of Engineering, Visakhapatnam
5
MaivizhiSecurity in Wireless Sensor NetworksAnna University, Chennai
6
SarathaSoftware Requirements Validation using Mathematical ApproachAnna University, Chennai
7
Ponney V MTrust and Security in CloudAnna University, Chennai
8
Ganesh Suresh RagadeAnalysis and Modeling of Drinking Water Utilities by Using GIS in Aurangabad CityDr. Babasaheb Ambedkar Marathwada University, Aurangabad
9
Kirtee PanwarMultimedia SecurityGuru Gobind Singh Indraprastha University, Delhi
10
Kurian PolachanTestbed for Tactile Internet ApplicationsIndian Institute of Science, Bangalore
11
Rahul MitraFind Point Correspondence in Wide Baseline ImagesIndian Institute of Technology, Bombay
12
SHARAD JOSHIDevelopment of systems for multimedia security by identifying sources of multimedia contents, their authenticity and identification of forged regions for tampered multimedia.Indian Institute of Technology, Gandhinagar
13
Kalpana Dinkarrao JoshiOptimal Network Resource Allocation and Utilization using SDNIndian Institute of Technology, Hyderabad
14
Gufran SiddiquiCyber Immune SystemIndian Institute of Technology, Kanpur
15
SAURABH KUMARAndorid SecurityIndian Institute of Technology, Kanpur
16
Palvi AggarwalCyber Security: Understanding the Role of Deception as a Strategy in Cyber Attack DetectionIndian Institute of Technology, Mandi
17
Pravas Ranjan BalSoftware Fault Prediction: It deals with prediction of faults in software systems based on fault datasets.Indian Institute of Technology, Roorkee
18
IshantInference algorithms for probabilistic graphical modelIndraprastha Institute of Information Technology, Delhi
19
Ridhi JainOn-the-fly handling of concurrency bugs in multithreaded environment for real-time systemsIndraprastha Institute of Information Technology, Delhi
20
Priti KumariReal-time health monitoring of patients, sportspeople and military personnel has grown as an important requirement for longevity and performance. Body Sensor Network (BSN) is a platform for real-timeInternational Institute of Information Technology, Bangalore
21
Anjana PrabhakarIoT Security : A Zero Trust ApproachInternational Institute of Information Technology, Bangalore
22
Shweta SaharanMobile Cloud Computing SecurityMalaviya National Institute of Technology, Jaipur
23
D V N Siva KumarSecure Multi-Keyword Search over Encrypted DataNational Institute of Technology, Karnataka, Surathkal
24
Ashish SinghAccess Control Model for Healthcare SystemNational Institute of Technology, Patna
25
ABINAS PANDAFlow Aware Rule Placement in Openflow Enabled SDN NetworksNational Institute of Technology, Rourkela
26
Rahul Deo VermaDesign of securing the Border gateway routing protocolNational Institute of Technology, Sikkim
27
Kuldeep SinghDEVELOPMENT OF NETWORK INTRUSION DETECTION TECHNIQUES USING ARTIFICIAL IMMUNE SYSTEMPunjabi University, Patiala
28
KULDEEP SINGHA Secure Framework for Flying Ad-Hoc NetworksThapar University, Patiala
29
Kalavala Venkata SubramanyamCyber Security - Recent challenges and solutionsUniversity of Hyderabad, Hyderabad
Part Time Students
S.No.StudentResearch TopicInstitution Name
1
Misbah Urrahman SiddiquiA Novel Risk-Aware User Authentication SchemeAligarh Muslim University, Aligarh
2
Ashok Kumar MMetadata ForensicsAmrita Vishwa Vidyapeetham, Coimbatore
3
Ezhil Arasi.VDual level secure file deduplication with access control for dynamic data sharing in cloudAnna University, Chennai
4
D JULIET THESSALONICASOFTWARE CODE SMELL DETECTIONAnna University, Chennai
5
Bireswar BanikPHISHING ATTACK DETECTION USING MACHINE LEARNING TECHNIQUESGauhati University, Gauhati
6
Dhruba Jyoti BorahDetection of botnet using network traffic classification based approachGauhati University, Gauhati
7
Mridul SuklabaidyaMalware Detection in IoT/Traditional DevicesGauhati University, Gauhati
8
Deepti ChopraStudy and development of Mining and Prediction Techniques for Software RepositoriesGuru Gobind Singh Indraprastha University, Delhi
9
Abhishek GagnejaPedestrian detection based on deep learning for ADASIndian Institute of Technology, Delhi
10
KRISHNA RAO KAKKIRALAVideo Question Answering System for Surveillance VideosIndian Institute of Technology, Hyderabad
11
Mr. Surendra SinghDesign of Security Aware Packet Scheduling TechniquesIndian School of Mines, Dhanbad
12
Anil Kumar SutralaDesign and Analysis of Remote User Authentication Protocols Using Smartcards and BiometricsInternational Institute of Information Technology, Hyderabad
13
SYED TAHA OWAISAn Analytical Approach to eServices for eGovernmentJamia Millia Islamia, Delhi
14
Mr S MaruthiCyber securityOsmania University, Hyderabad
Back to Top