Students pursuing research in field of Cyber Security |
Full Time Students |
S.No. | Student | Research Topic | Institution Name |
1
| Prabhakar K | Cybersecurity of critical Industrial Internet IoT/Control Systems/SCADA networks | Amrita Vishwa Vidyapeetham, Coimbatore |
2
| Nimmy K | Lightweight usable security solutions for IoT | Amrita Vishwa Vidyapeetham, Coimbatore |
3
| Nerella Sameera | DEVELOPMENT OF A SYSTEM FOR CYBER SECURITY ANALYTICS | Andhra University College of Engineering, Visakhapatnam |
4
| Chamarty Anusha | Object Detection | Andhra University College of Engineering, Visakhapatnam |
5
| Maivizhi | Security in Wireless Sensor Networks | Anna University, Chennai |
6
| Saratha | Software Requirements Validation using Mathematical Approach | Anna University, Chennai |
7
| Ponney V M | Trust and Security in Cloud | Anna University, Chennai |
8
| Ganesh Suresh Ragade | Analysis and Modeling of Drinking Water Utilities by Using GIS in Aurangabad City | Dr. Babasaheb Ambedkar Marathwada University, Aurangabad |
9
| Kirtee Panwar | Multimedia Security | Guru Gobind Singh Indraprastha University, Delhi |
10
| Kurian Polachan | Testbed for Tactile Internet Applications | Indian Institute of Science, Bangalore |
11
| Rahul Mitra | Find Point Correspondence in Wide Baseline Images | Indian Institute of Technology, Bombay |
12
| SHARAD JOSHI | Development of systems for multimedia security by identifying sources of multimedia contents, their authenticity and identification of forged regions for tampered multimedia. | Indian Institute of Technology, Gandhinagar |
13
| Kalpana Dinkarrao Joshi | Optimal Network Resource Allocation and Utilization using SDN | Indian Institute of Technology, Hyderabad |
14
| Gufran Siddiqui | Cyber Immune System | Indian Institute of Technology, Kanpur |
15
| SAURABH KUMAR | Andorid Security | Indian Institute of Technology, Kanpur |
16
| Palvi Aggarwal | Cyber Security: Understanding the Role of Deception as a Strategy in Cyber Attack Detection | Indian Institute of Technology, Mandi |
17
| Pravas Ranjan Bal | Software Fault Prediction: It deals with prediction of faults in software systems based on fault datasets. | Indian Institute of Technology, Roorkee |
18
| Ishant | Inference algorithms for probabilistic graphical model | Indraprastha Institute of Information Technology, Delhi |
19
| Ridhi Jain | On-the-fly handling of concurrency bugs in multithreaded environment for real-time systems | Indraprastha Institute of Information Technology, Delhi |
20
| Priti Kumari | Real-time health monitoring of patients, sportspeople and military personnel has grown as an important requirement for longevity and performance. Body Sensor Network (BSN) is a platform for real-time | International Institute of Information Technology, Bangalore |
21
| Anjana Prabhakar | IoT Security : A Zero Trust Approach | International Institute of Information Technology, Bangalore |
22
| Shweta Saharan | Mobile Cloud Computing Security | Malaviya National Institute of Technology, Jaipur |
23
| D V N Siva Kumar | Secure Multi-Keyword Search over Encrypted Data | National Institute of Technology, Karnataka, Surathkal |
24
| Ashish Singh | Access Control Model for Healthcare System | National Institute of Technology, Patna |
25
| ABINAS PANDA | Flow Aware Rule Placement in Openflow Enabled SDN Networks | National Institute of Technology, Rourkela |
26
| Rahul Deo Verma | Design of securing the Border gateway routing protocol | National Institute of Technology, Sikkim |
27
| Kuldeep Singh | DEVELOPMENT OF NETWORK INTRUSION DETECTION TECHNIQUES USING ARTIFICIAL IMMUNE SYSTEM | Punjabi University, Patiala |
28
| KULDEEP SINGH | A Secure Framework for Flying Ad-Hoc Networks | Thapar University, Patiala |
29
| Kalavala Venkata Subramanyam | Cyber Security - Recent challenges and solutions | University of Hyderabad, Hyderabad |
Part Time Students |
S.No. | Student | Research Topic | Institution Name |
1
| Misbah Urrahman Siddiqui | A Novel Risk-Aware User Authentication Scheme | Aligarh Muslim University, Aligarh |
2
| Ashok Kumar M | Metadata Forensics | Amrita Vishwa Vidyapeetham, Coimbatore |
3
| Ezhil Arasi.V | Dual level secure file deduplication with access control for dynamic data sharing in cloud | Anna University, Chennai |
4
| D JULIET THESSALONICA | SOFTWARE CODE SMELL DETECTION | Anna University, Chennai |
5
| Bireswar Banik | PHISHING ATTACK DETECTION USING MACHINE LEARNING TECHNIQUES | Gauhati University, Gauhati |
6
| Dhruba Jyoti Borah | Detection of botnet using network traffic classification based approach | Gauhati University, Gauhati |
7
| Mridul Suklabaidya | Malware Detection in IoT/Traditional Devices | Gauhati University, Gauhati |
8
| Deepti Chopra | Study and development of Mining and Prediction Techniques for Software Repositories | Guru Gobind Singh Indraprastha University, Delhi |
9
| Abhishek Gagneja | Pedestrian detection based on deep learning for ADAS | Indian Institute of Technology, Delhi |
10
| KRISHNA RAO KAKKIRALA | Video Question Answering System for Surveillance Videos | Indian Institute of Technology, Hyderabad |
11
| Mr. Surendra Singh | Design of Security Aware Packet Scheduling Techniques | Indian School of Mines, Dhanbad |
12
| Anil Kumar Sutrala | Design and Analysis of Remote User Authentication Protocols Using Smartcards and Biometrics | International Institute of Information Technology, Hyderabad |
13
| SYED TAHA OWAIS | An Analytical Approach to eServices for eGovernment | Jamia Millia Islamia, Delhi |
14
| Mr S Maruthi | Cyber security | Osmania University, Hyderabad |