Team ID | Guide | Roll Numbers | Project Title | Team Members |
---|---|---|---|---|
21UCYS#01 | Dr. Amritha P P | 21012 21015 21027 21039 21054 |
Advanced Command and Control Framework for Covert Operations | Ashwin Anand Dyanesh S Karaka Sri Sai Nitin Manbendra Satpathy P Jivan Prasadd |
21UCYS#02 | Dr. Lakshmy K V | 21013 21020 21021 21026 21080 |
SafeChat - Instant Chat Application With End to End Encryption | Basi Reddy Rohith Reddy Golla Hemesh Sai Gundala Kushal Bhavani Reddy Kakara Manoj Ram Tippireddy Pavan Kumar Reddy |
21UCYS#03 | Dr. Ambili Kakkad Narayanan | 21010 21016 21038 21050 |
Cloud based SIEM Tool | Arjun C Santhosh G H Hem Sagar Madhav Harikumar Nishanth S |
21UCYS#04 | Dr. Amritha P P | 21009 21035 21036 21068 21087 |
Software Defined Perimeter | Aravind S M C Vivek Veera Ashwatha Prasad M K Saranesh E S Vishnu K |
21UCYS#05 | Dr. Hemalatha P | 21019 21025 21034 21069 21085 |
Building Cyber Defenses: Design and Deployment of an Effective Intrusion Prevention System | Gokulachselvan C D K S Santhossh Lakshmi Narayan P Seran Pandiyan I P Vinoth Kumar C |
21UCYS#06 | Mr. Anand R Nair | 21028 21044 21055 21062 21067 21083 |
Improving YARA-based Malware Detection: A Multi-faceted Approach | Karanam Hitesh Manjunath Molabanti Naga Ravi Chandra Penugonda V S Ganasekhar Bandreddy Ruthwik Krishna Sanneganti Dharmik Nagireddy Venkata Revan |
21UCYS#07 | Mr. Sreejith K | 21004 21022 21051 21061 21086 |
Ransomware Proof Backup Tool | Aishwarya G S Harshitha Ranjith Nithin S Roshni V Vinoth Kumar D |
21UCYS#08 | Mr. Anand R Nair | 21030 21037 21081 21082 |
Valv – A Secure Image Encrypted Gallery For Android | Kavali Sai Suvarchala Madari Kuruba Ganesh Koti Venkatadinesh Reddy Udumula Umashankar Kavya |
21UCYS#09 | Dr. Jevitha K P | 21008 21033 21072 |
An Empirical Study on the Evaluation and Enhancement of OWASP Core Rule Set in ModSecurity | Anuvarshini M K Kommuri Sai Suhitha Bala Sri Sai Tanvi Sonti |
21UCYS#10 | Mr. Ramaguru Radhakrishnan | 21003 21005 21014 21063 21078 21089 |
Application-Aware Clipboard Security Using Configurable Policy Rules | Aishwarya G Alagu Soundarya G Deepthi J S Adhwaith Suvetha D P Yaswanth Gadamsetti |
21UCYS#11 | Mr. Saurabh Shrivastava | 21052 21059 21071 21075 |
Design and Implementation of a Wi-Fi Offensive and Defensive Security Toolkit | Nithya Pranav S Rakshan K Sourabh Sasikanthan Sudipt Kumar |
21UCYS#12 | Dr. Praveen K | 21043 21045 21049 21073 21090 |
Docker Container Security: A Scanning-Centric Security Framework | Mohamed Jasir Faiez M M Monish Thanuvenkatesh Nishant V Sudeep V Yuvaraj Kumar G P |
21UCYS#13 | Mr. Sreejith K | 21002 21046 21053 21074 21079 |
Ransomware Proof Backup Tool | Achyuth Anand S A Mukesh Nived Dineshan Sudhir R T Swetha V |
21UCYS#14 | Dr. Chungath Srinivasan | 21017 21018 21023 21070 21076 |
Secure and Scalable SSH Certificate Management | G R Nitin Gokul Iniyan R Shree Om Sharma S Suganth Sarvesh |
21UCYS#15 | Mr. Ramaguru Radhakrishnan | 21001 21007 21056 21066 |
Port Watch Dog: Real-Time Port Scan Detection and Response Tool | Abinesh G Anu Priya P Pranav S R Sanjai Prashad D |
21UCYS#16 | Dr. Praveen K | 21006 21031 21032 21042 21058 21060 |
Implementing Command and Control (C&C) Server | Alooysius Vitalian J Kishanth K Kishore M Mittul R Siddharth Krishna R Ram Surya Suresh Kumar |
21UCYS#17 | Dr. Durga S | 21011 21040 21048 21077 21084 |
Intrusion Detection System | A S Deepan G Manomithran Niran R Sushmanth V M Vinayak R |
21UCYS#18 | Mr. Saurabh Shrivastava | 21041 21047 21057 |
TOTP Authenticator | Middivari Charan Kumar Reddy Nimmakayala Vihalroy Pushpanth Reddy P |