Search
Skip to Search Results- 13Rogers, Leonard (Supervisor)
- 1Benny, Bijin
- 1Bodlapati, Narendra Reddy
- 1Dhanani, Ishant
- 1Ganganagari, Praharsh Reddy
- 1Ganipineni, Rajendra
- 2Cybersecurity
- 2Machine learning
- 1Artificial intelligence
- 1Computer security
- 1Computers, Access control, Passwords
- 1Hacking
-
2021-11-04
Security of IPv4 packets is of great importance as it carries user’s important data in the payload. There are different technologies like VPN, SSL that uses different security mechanisms to protect user’s data from being accessed by the attackers. However, with the advancement in technologies...
-
2021-10-04
The main objective of this project is to study, analyse and define some of the best practices to prevent zero-day and polymorphic attacks. Zero-day refers to the vulnerability or an attack that has zero days between the time the vulnerability is discovered and the first attack. The operating...
-
2021-01-01
Automated hacking is a modern approach to conduct computer hacking with a significantly higher performance rate directly or remotely. Automated hacking is carried out by computer programs that are programmed to analyze the vulnerability of a system(s) and carry out hacking attacks based on the...