S.No |
Project Code |
Cyber Security Project Topics |
Cyber Security Projects |
1 |
CYS01 |
Physical Layer Security Enhancement via Intelligent Omni-Surfaces and UAV-Friendly Jamming |
2 |
CYS02 |
Point Cloud Adversarial Perturbation Generation for Adversarial Attacks |
3 |
CYS03 |
IRS-Aided Wireless Communication: From Physics to Channel Modeling and Characterization |
4 |
CYS04 |
A Flexible NTT-Based Multiplier for Post-Quantum Cryptography |
5 |
CYS05 |
An Ultra-Low Energy Solution for Large-Scale Distributed Audio Monitoring |
6 |
CYS06 |
A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System |
7 |
CYS07 |
An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure |
8 |
CYS08 |
Extended Cyclic Codes Sandwiched Between Reed–Muller Codes |
9 |
CYS09 |
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences |
10 |
CYS10 |
A Tutorial on the Sequential Sampling Impulse Radar Concept and Selected Applications |
11 |
CYS11 |
Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives |
12 |
CYS12 |
Next-Generation IoT Devices: Sustainable Eco-Friendly Manufacturing, Energy Harvesting, and Wireless Connectivity |
13 |
CYS13 |
On the Differential Spectrum and the APcN Property of a Class of Power Functions Over Finite Fields |
14 |
CYS14 |
Multilevel Fine Fingerprint Authentication Method for Key Operating Equipment Identification in Cyber-Physical Systems |
15 |
CYS15 |
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing |
16 |
CYS16 |
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection |
17 |
CYS17 |
ePoSt: Practical and Client-Friendly Proof of Storage-Time |
18 |
CYS18 |
Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car |
19 |
CYS19 |
Implementation of Risk-Aggregated Substation Testbed Using Generative Adversarial Networks |
20 |
CYS20 |
An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks |
21 |
CYS21 |
Resilient Load Frequency Control of Multi-Area Power Systems Under DoS Attacks |
22 |
CYS22 |
Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks |
23 |
CYS23 |
A Research Review of OpenFlow for Datacenter Networking |
24 |
CYS24 |
AVET: A Novel Transform Function to Improve Cancellable Biometrics Security |
25 |
CYS25 |
Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks |