| A Novel Approach to Detect Tampered Wireless Network Applications – B.TECH PROJECTS IN NS2 |
| Personalized two party key exchange protocol– B.TECH PROJECTS IN NS2 |
| A security model for timing attack in cloud environment– B.TECH PROJECTS IN NS2 |
| Energy efficient hierarchical trust management scheme for solving cluster head compromising problem in wireless sensor networks– B.TECH PROJECTS IN NS2 |
| IInternet safe in the 1st cycle of basic education: The Internet as an educational resource in supervised teaching practice– B.TECH PROJECTS IN NS2 |
| Social network monitoring application for parents with children under thirteen– B.TECH PROJECTS IN NS2 |
| Meaningful keyword search in relational databases with large and complex schema– B.TECH PROJECTS IN NS2 |
| Windows NT pagefile.sys Virtual Memory Analysis– B.TECH PROJECTS IN NS2 |
| Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews– B.TECH PROJECTS IN NS2 |
| Leakage Prototype Learning for Profiled Differential Side-channel Cryptanalysis– B.TECH PROJECTS IN NS2 |
| An overview of secure friend matching in mobile social networks– B.TECH PROJECTS IN NS2 |
| Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs– B.TECH PROJECTS IN NS2 |
| A feasible method to combat against DDoS attack in SDN network– B.TECH PROJECTS IN NS2 |
| Embedded R&D for Cybersecurity in an Operational Environment– B.TECH PROJECTS IN NS2 |
| Protecting users’ privacy in healthcare cloud computing with APB-TTP– B.TECH PROJECTS IN NS2 |
| Design of heterogeneous wireless network for data transmission with MTC user– B.TECH PROJECTS IN NS2 |
| A novel approach for detection of SQL injection and cross site scripting attacks– B.TECH PROJECTS IN NS2 |
| Cyber Operations Education: Building Capacity in a Priority Area– B.TECH PROJECTS IN NS2 |
| QUALISIS-Br: An Approach to Improve the Quality of Brazilian Health Information Systems– B.TECH PROJECTS IN NS2 |
| Novel Approaches to Protecting Block Ciphers by Distributing Round Keys– B.TECH PROJECTS IN NS2 |
| Pixel value differencing steganography techniques: Analysis and open challenge– B.TECH PROJECTS IN NS2 |
| Routing-guided authentication in Wireless Sensor Networks– B.TECH PROJECTS IN NS2 |
| A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes– B.TECH PROJECTS IN NS2 |
| GraphSC: Parallel Secure Computation Made Easy– B.TECH PROJECTS IN NS2 |
| Fuzzing CAN Packets into Automobiles– B.TECH PROJECTS IN NS2 |
| 2015 IEEE B.TECH PROJECTS IN NS2 |