Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Android 2019-2020
Real Time Projects
Cloud Computing
Image Processing
Networking
Network Security
Mobile Computing
Data Mining
Parallel Distributed
Matlab
NS2 Projects
Application Projects
MCA Projects
Wireless Communication
Communication
VLSI
Robotics
Automation
GSM & GPS
Diploma Projects
MBA Projects
IEEE Projects 2011
IEEE Projects 2019-2020
IEEE Projects 2015
  • Home
  • IEEE Projects 2019-2020
IEEE Networking Projects 2019-2020

 

         
     
         
     
         
     
         
     
         
     
         

SNO NETWORKING 2019-2020 PLATFORM

OK9NS01

A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information

PDF/DOC

OK9NS02

A Secure Exception Mode for Fault-Attack-Resistant Processing

PDF/DOC

OK9NS03

AccConF An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge

PDF/DOC

OK9NS04

Adding Support for Automatic Enforcement of Security Policies in NFV Networks

PDF/DOC

OK9NS05

Advancing the State-of-the-Art in Hardware Trojans Detection

PDF/DOC

OK9NS06

Atlas Application Confidentiality in Compromised Embedded Systems

PDF/DOC

OK9NS07

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

PDF/DOC

OK9NS08

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

PDF/DOC

OK9NS09

Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things

PDF/DOC

OK9NS10

Cryptographic Solutions for Credibility and Liability Issues of Genomic Data

PDF/DOC

OK9NS11

Decay-Based DRAM PUFs in Commodity Devices

PDF/DOC

OK9NS12

Defending Against Web Application Attacks Approaches, Challenges and Implications

PDF/DOC

OK9NS13

Defending Against Web Application Attacks Approaches, Challenges and Implications

PDF/DOC

OK9NS14

Design and Implementation of the Ascend Secure Processor

PDF/DOC

OK9NS15

Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming

PDF/DOC

OK9NS16

Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation

PDF/DOC

OK9NS17

Emerging Attacks and Solutions for Secure Hardware in the Internet of Things

PDF/DOC

OK9NS18

Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System

PDF/DOC

OK9NS19

Evolving Bipartite Authentication Graph Partitions

PDF/DOC

OK9NS20

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

PDF/DOC

OK9NS21

Fast Data Plane Testing for Software-Defined Networks With RuleChecker

PDF/DOC

OK9NS22

FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data

PDF/DOC

OK9NS23

Fault-Tolerant Adaptive Routing in Dragonfly Networks

PDF/DOC

OK9NS24

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

PDF/DOC

OK9NS25

GaitLock Protect Virtual and Augmented Reality Headsets Using Gait

PDF/DOC

OK9NS26

G-SIR An Insider Attack Resilient Geo-Social Access Control Framework

PDF/DOC

 

OK9NS27

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

PDF/DOC

OK9NS28

High Rate Robust Codes with Low Implementation Complexity

PDF/DOC

OK9NS29

Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3

PDF/DOC

OK9NS30

KI-Mon ARM A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object

PDF/DOC

OK9NS31

Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection

PDF/DOC

OK9NS32

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things

PDF/DOC

OK9NS33

Optimal Spot-Checking for Collusion Tolerance in Computer Grids

PDF/DOC

OK9NS34

Optimizing Gradual SDN Upgrades in ISP Networks

PDF/DOC

OK9NS35

PersonaIA A Lightweight Implicit Authentication System based on Customized User Behavior Selection

PDF/DOC

OK9NS36

Privacy-Aware Caching in Information-Centric Networking

PDF/DOC

OK9NS37

Privacy-Preserving Aggregate Queries for Optimal Location Selection

PDF/DOC

OK9NS38

Privacy-Preserving Multi-Keyword Top-k k Similarity Search Over Encrypted Data

PDF/DOC

OK9NS39

Refinement-Based Specification and Security Analysis of Separation Kernels

PDF/DOC

OK9NS40

SADI A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks

PDF/DOC

OK9NS41

SADI A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks

PDF/DOC

OK9NS42

Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets

PDF/DOC

OK9NS43

Stochastic Model Checking for Predicting Component Failures and Service Availability

PDF/DOC