Research Papers as well as ppt for them
Team | Title of paper | PPT |
1 | Daniel J Mathew, Eldhose Peter | All your iFRAMEs point to us | ppt |
2 | Neeraj, Sidhartha Gupta | Abusing Social Networks for Automated User Profiling | ppt |
3 | Gaurav, Vineet | Persuasive Cued Click-Points | ppt |
4 | Anuj Kalia, Shashank Gupta | Detecting Forged TCP Reset Packets | ppt |
5 | Jagmeet Bali, Agastya Nanda | Using Cloud Storage as Attack Vector and Online Slack Space | ppt |
6 | Siddharth Bora, Salik Jamal Warsi | Visual Cryptography | ppt |
7 | Ravee, Rahul | Clickjacking: Attacks and Defenses | ppt |
8 | Alankrit, Nikita Gupta | Detecting Spammers on Social Networks | ppt |
9 | Faisal, Vigya | Detecting Spammers on Social Networks | ppt |
10 | Abhishek Gangwal, Rohan Sharma | Leaking Browser History | ppt |
11 | Jatin Kumar, Ankush Jindal | Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems | ppt |
12 | Parth, Abhinn | A combinatorial approach to detecting buffer overflow vulnerabilities | ppt |
13 | Shehbaz Jaffer, Anshuj Garg | How unique is your web browser | ppt |
14 | Ashutosh, Chandra Prakash | SybilInfer: Detecting Sybil Nodes using Social Networks | ppt |
15 | Rahul, Aswin | Design and Evaluation of a Real-Time URL Spam Filtering Service | ppt |
16 | Siddhant, Deepak | Privacy-Preserving Social Plug-ins | ppt |
17 | Rajat, Parikshit | Aurasium: Practical Policy Enforcement for Android Applications | ppt |
18 | Björn Holm, Pasi Saarinen | Pwning Random Number Generators | ppt |
19 | Jwala N Rao, Deepika M | Defense against Rubber hose attacks | ppt |
20 | Kritarth, Arunim samat | Dissent: Accountable Anonymous Group Messaging | ppt |
21 | Manav, Jagjeet | These Aren’t the Droids You’re Looking For | ppt |
22 | Abhinav, Hitesh | Protecting Browsers from Cross-Origin CSS Attacks | ppt |
No comments:
Post a Comment