NETWORK SECURITY 2021-2022 Final Projects 2021 2022 TITLE LIST

Page 1


SNO OK3NS01 OK3NS02 OK3NS03 OK3NS04 OK3NS05 OK3NS06 OK3NS07 OK3NS08 OK3NS09 OK3NS10 OK3NS11 OK3NS12 OK3NS13 OK3NS14 OK3NS15

OK3NS16 OK3NS17

NETWORK SECURITY 2021-2022 A Cyber-Insurance Scheme for Water Distribution Systems Considering Malicious Cyberattacks A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks APGS An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer Back to the Basics Seamless Integration of Side-Channel PreProcessing in Deep Neural Networks BOTTLENET Hiding Network Bottlenecks using SDN-based Topology Deception CALPA-NET Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images Copula-based Analysis of Physical Layer Security Performances over Correlated Rayleigh Fading Channels DeepChain Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive DeepSBD A Deep Neural Network Model With Attention Mechanism for SocialBot Detection Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction Detection of Fake and Fraudulent Faces via Neural Memory Networks DRL-FAS A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing ECF-MRS An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks End-to-End Domain Adaptive Attention Network for CrossDomain Person Re-Identification

DOWNLOAD PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC

PDF/DOC


OK3NS18 OK3NS19 OK3NS20 OK3NS21 OK3NS22 OK3NS23 OK3NS24

OK3NS25 OK3NS26 OK3NS27 OK3NS28 OK3NS29 OK3NS30 OK3NS31 OK3NS32 OK3NS33 OK3NS34 OK3NS35

Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network FiFTy Large-scale File Fragment Type Identification using Convolutional Neural Networks Flow Misleading Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel Hybrid Analog-Digital Precoder Design for Securing Cognitive Millimeter Wave Networks Identification of Malicious Injection Attacks in Dense Rating and Co-visitation Behaviors Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers Invisible Adversarial Attack against Deep Neural Networks An Adaptive Penalization Approach Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds Mobility-Assisted Covert Communication Over Wireless Ad Hoc Networks Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection oGBAC—A Group Based Access Control Framework for Information Sharing in Online Social Networks Physical Layer Security Aided Wireless Interference Networks in the Presence of Strong Eavesdropper Channels Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks PolyShard Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously Privacy-Preserving Localization for Underwater Sensor Networks via Deep Reinforcement Learning Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks

PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC

PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC


OK3NS36 OK3NS37 OK3NS38 OK3NS39

OK3NS40 OK3NS41 OK3NS42 OK3NS43 OK3NS44 OK3NS45 OK3NS46 OK3NS47 OK3NS48 OK3NS49 OK3NS50

Sampling Rate Distribution for Flow Monitoring and DDoS Detection in Datacenter SAP-SSE Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption Scaling Camouflage Content Disguising Attack Against Computer Vision Applications Searchable Symmetric Encryption with Forward Search Privacy Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs Secure Content Delivery in Two-Tier Cache-Enabled mmWave Heterogeneous Networks SegGuard Segmentation-based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing Shielding Collaborative Learning Mitigating Poisoning Attacks through Client-Side Detection SMAKA Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks Smart Evolution for Information Diffusion Over Social Networks Sonification to Support the Monitoring Tasks of Security Operations Centres SOS Standard-Compliant and Packet Loss Tolerant Security Framework for ADS-B Communications Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems VERIFL Communication-Efficient and Fast Verifiable Aggregation for Federated Learning VMGuard State-based Proactive Verification of Virtual Network Isolation with Application to NFV

PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC

PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC PDF/DOC


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.