Students pursuing research in field of Cyber Security
Full Time Students
S.No.StudentResearch TopicInstitution Name
1
Prabhakar KCybersecurity of critical Industrial Internet IoT/Control Systems/SCADA networksAmrita Vishwa Vidyapeetham, Coimbatore
2
Nimmy KLightweight usable security solutions for IoTAmrita Vishwa Vidyapeetham, Coimbatore
3
Nerella SameeraDEVELOPMENT OF A SYSTEM FOR CYBER SECURITY ANALYTICSAndhra University College of Engineering, Visakhapatnam
4
Chamarty AnushaObject DetectionAndhra University College of Engineering, Visakhapatnam
5
Ponney V MTrust and Security in CloudAnna University, Chennai
6
MaivizhiSecurity in Wireless Sensor NetworksAnna University, Chennai
7
SarathaSoftware Requirements Validation using Mathematical ApproachAnna University, Chennai
8
Ganesh Suresh RagadeAnalysis and Modeling of Drinking Water Utilities by Using GIS in Aurangabad CityDr. Babasaheb Ambedkar Marathwada University, Aurangabad
9
Kirtee PanwarMultimedia SecurityGuru Gobind Singh Indraprastha University, Delhi
10
Kurian PolachanTestbed for Tactile Internet ApplicationsIndian Institute of Science, Bangalore
11
Rahul MitraFind Point Correspondence in Wide Baseline ImagesIndian Institute of Technology, Bombay
12
RADHIKA B SSecurity and Privacy in Open Systems using Information FlowIndian Institute of Technology, Bombay
13
SHARAD JOSHIDevelopment of systems for multimedia security by identifying sources of multimedia contents, their authenticity and identification of forged regions for tampered multimedia.Indian Institute of Technology, Gandhinagar
14
Kalpana Dinkarrao JoshiOptimal Network Resource Allocation and Utilization using SDNIndian Institute of Technology, Hyderabad
15
SAURABH KUMARAndorid SecurityIndian Institute of Technology, Kanpur
16
Gufran SiddiquiCyber Immune SystemIndian Institute of Technology, Kanpur
17
Palvi AggarwalCyber Security: Understanding the Role of Deception as a Strategy in Cyber Attack DetectionIndian Institute of Technology, Mandi
18
Pravas Ranjan BalSoftware Fault Prediction: It deals with prediction of faults in software systems based on fault datasets.Indian Institute of Technology, Roorkee
19
IshantInference algorithms for probabilistic graphical modelIndraprastha Institute of Information Technology, Delhi
20
Ridhi JainOn-the-fly handling of concurrency bugs in multithreaded environment for real-time systemsIndraprastha Institute of Information Technology, Delhi
21
Priti KumariReal-time health monitoring of patients, sportspeople and military personnel has grown as an important requirement for longevity and performance. Body Sensor Network (BSN) is a platform for real-timeInternational Institute of Information Technology, Bangalore
22
Anjana PrabhakarSecurity in Wireless Multi-hop Network(tentative)International Institute of Information Technology, Bangalore
23
Shweta SaharanMobile Cloud Computing SecurityMalaviya National Institute of Technology, Jaipur
24
D V N Siva KumarSecure Multi-Keyword Search over Encrypted DataNational Institute of Technology, Karnataka, Surathkal
25
Ashish SinghAccess Control Model for Healthcare SystemNational Institute of Technology, Patna
26
ABINAS PANDAFlow Aware Rule Placement in Openflow Enabled SDN NetworksNational Institute of Technology, Rourkela
27
Rahul Deo VermaDesign of securing the Border gateway routing protocolNational Institute of Technology, Sikkim
28
Kuldeep SinghDEVELOPMENT OF NETWORK INTRUSION DETECTION TECHNIQUES USING ARTIFICIAL IMMUNE SYSTEMPunjabi University, Patiala
29
KULDEEP SINGHA Secure Framework for Flying Ad-Hoc NetworksThapar University, Patiala
30
Kalavala Venkata SubramanyamCyber Security - Recent challenges and solutionsUniversity of Hyderabad, Hyderabad
Part Time Students
S.No.StudentResearch TopicInstitution Name
1
Misbah Urrahman SiddiquiA Novel Risk-Aware User Authentication SchemeAligarh Muslim University, Aligarh
2
Ashok Kumar MMetadata ForensicsAmrita Vishwa Vidyapeetham, Coimbatore
3
Ezhil Arasi.VDual level secure file deduplication with access control for dynamic data sharing in cloudAnna University, Chennai
4
D JULIET THESSALONICASOFTWARE CODE SMELL DETECTIONAnna University, Chennai
5
Bireswar BanikPHISHING ATTACK DETECTION USING MACHINE LEARNING TECHNIQUESGauhati University, Gauhati
6
Dhruba Jyoti BorahDetection of botnet using network traffic classification based approachGauhati University, Gauhati
7
Mridul SuklabaidyaMalware Detection in IoT/Traditional DevicesGauhati University, Gauhati
8
Deepti ChopraStudy and development of Mining and Prediction Techniques for Software RepositoriesGuru Gobind Singh Indraprastha University, Delhi
9
Abhishek GagnejaPedestrian detection based on deep learning for ADASIndian Institute of Technology, Delhi
10
KRISHNA RAO KAKKIRALAVideo Question Answering System for Surveillance VideosIndian Institute of Technology, Hyderabad
11
Mr. Surendra SinghDesign of Security Aware Packet Scheduling TechniquesIndian School of Mines, Dhanbad
12
Anil Kumar SutralaDesign and Analysis of Remote User Authentication Protocols Using Smartcards and BiometricsInternational Institute of Information Technology, Hyderabad
13
SYED TAHA OWAISAn Analytical Approach to eServices for eGovernmentJamia Millia Islamia, Delhi
14
VINAY THAKURDESIGNING OF UNIFORM MODEL FOR MULTIPURPOSE CADASTRAL SYSTEM IN INDIAJamia Millia Islamia, Delhi
15
Mr S MaruthiCyber securityOsmania University, Hyderabad
16
Amrendra SharanDefending against DDoS Attack in IoTUniversity Institute of Engineering and Technology, Panjab University, Chandigarh
Back to Top