Search
Skip to Search Results- 13Rogers, Leonard (Supervisor)
- 1Benny, Bijin
- 1Bodlapati, Narendra Reddy
- 1Dhanani, Ishant
- 1Ganganagari, Praharsh Reddy
- 1Ganipineni, Rajendra
- 2Cybersecurity
- 2Machine learning
- 1Artificial intelligence
- 1Computer security
- 1Computers, Access control, Passwords
- 1Hacking
-
2019-03-08
This project studies the various techniques used in memory injection attack and how to detect/avoid them using various network security monitoring (NSM) tools. Among various available techniques of memory injection, Reflective DLL injection has been studied in detail. The above objective has been...
-
2019-01-01
In this Capstone Project, I aimed at implementing a basic SDN structure with Mininet and two controllers i.e. POX and Floodlight, learning over the period, how it is an advantage over traditional network implementation and analyzing how the architecture of SDN is an enhancement. (As cited in...
-
2020-01-01
Internet of Things is an emerging technology that can connect and join both physical and digital world altogether under the same ecosystem. IoT consists of sensors, actuators, and embedded chipsets in the physical devices enabling them to be smart. So, they can exchange data between them without...
-
2021-10-01
The main objective of this project is to study and analyse about the Ransomware malware and its types, attacking vectors, prevention techniques and analysed the system behaviour when infected with Ransomware and implemented basic recovery techniques of infected system. Ransomware is a malware...
-
Analysis of Currently Open and Closed-source Software for the Creation of an AI Personal Assistant
Download2021-11-05
In this modern age of the 21st century, personal assistants are fantastic for everybody. It has paved the way for modern technology where computers can be asked questions. As individuals do with humans and may communicate with Intelligent Personal Assistants. In many ways, this new technology,...
-
2021-10-29
The risk of online personal information breaches is increasing as people put more critical data online., strong authentication protecting this information is not being adopted quickly enough to deal with the threat. Online security specialists recommend people should use two-factor authentication...
-
2021-11-04
Security of IPv4 packets is of great importance as it carries user’s important data in the payload. There are different technologies like VPN, SSL that uses different security mechanisms to protect user’s data from being accessed by the attackers. However, with the advancement in technologies...
-
2021-10-04
The main objective of this project is to study, analyse and define some of the best practices to prevent zero-day and polymorphic attacks. Zero-day refers to the vulnerability or an attack that has zero days between the time the vulnerability is discovered and the first attack. The operating...
-
2021-01-01
Automated hacking is a modern approach to conduct computer hacking with a significantly higher performance rate directly or remotely. Automated hacking is carried out by computer programs that are programmed to analyze the vulnerability of a system(s) and carry out hacking attacks based on the...
-
2021-01-01
The advent of the internet and the World Wide Web has made vast amounts of information accessible at our fingertips. It is said that an average person living in the modern society is exposed to as much information in a day as a person who lived 100 years ago would have seen in a whole year. But...