Search
Skip to Search Results- 13Rogers, Leonard (Supervisor)
- 1Benny, Bijin
- 1Bodlapati, Narendra Reddy
- 1Dhanani, Ishant
- 1Ganganagari, Praharsh Reddy
- 1Ganipineni, Rajendra
- 2Cybersecurity
- 2Machine learning
- 1Artificial intelligence
- 1Computer security
- 1Computers, Access control, Passwords
- 1Hacking
-
2019-03-08
This project studies the various techniques used in memory injection attack and how to detect/avoid them using various network security monitoring (NSM) tools. Among various available techniques of memory injection, Reflective DLL injection has been studied in detail. The above objective has been...
-
2019-01-01
In this Capstone Project, I aimed at implementing a basic SDN structure with Mininet and two controllers i.e. POX and Floodlight, learning over the period, how it is an advantage over traditional network implementation and analyzing how the architecture of SDN is an enhancement. (As cited in...
-
2020-01-01
Internet of Things is an emerging technology that can connect and join both physical and digital world altogether under the same ecosystem. IoT consists of sensors, actuators, and embedded chipsets in the physical devices enabling them to be smart. So, they can exchange data between them without...
-
2021-11-04
Security of IPv4 packets is of great importance as it carries user’s important data in the payload. There are different technologies like VPN, SSL that uses different security mechanisms to protect user’s data from being accessed by the attackers. However, with the advancement in technologies...
-
2021-10-04
The main objective of this project is to study, analyse and define some of the best practices to prevent zero-day and polymorphic attacks. Zero-day refers to the vulnerability or an attack that has zero days between the time the vulnerability is discovered and the first attack. The operating...
-
2021-01-01
Automated hacking is a modern approach to conduct computer hacking with a significantly higher performance rate directly or remotely. Automated hacking is carried out by computer programs that are programmed to analyze the vulnerability of a system(s) and carry out hacking attacks based on the...
-
2021-01-01
The advent of the internet and the World Wide Web has made vast amounts of information accessible at our fingertips. It is said that an average person living in the modern society is exposed to as much information in a day as a person who lived 100 years ago would have seen in a whole year. But...
-
Analysis of Current Portable App Creating Utilities and Fork of the Current Best Open Source Utility
Download2021-10-04
The main objective of this work is to analyse the current portable app creating utilities and to fork the best currently available open-source portable app creating utilities with some improvements. A portable application is a software product implemented to be portable from one computer network...
-
2021-10-04
WAP Tracker will be useful to network analysts to manage, track and identify Wireless Access Points within a specific area. The basic features are: Identify all Wireless Access Point signals within the measuring devices range and list them on screen with measured signal strength; All identified...
-
2021-10-04
Intrusion prevention has become an extremely important feature of the Defense-in-Depth strategy. The intention of this project is to build the Linux-based open source system which functions as an IPS based on a merger/rewrite of Wireshark and Snort with IP Geolocation built in. This system should...