0% found this document useful (0 votes)
91 views4 pages

Project Titles

The document lists 60 project titles from 2011 related to networking and security. Many of the projects focused on improving security aspects of wireless networks, including key management, encryption, and intrusion detection. Other topics included distributed systems, peer-to-peer networks, sensor networks, and mobile payment security. The projects aimed to address challenges like congestion, energy efficiency, interference, and information leakage through techniques like encryption, routing protocols, synchronization, and traffic analysis.

Uploaded by

Vasanth Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views4 pages

Project Titles

The document lists 60 project titles from 2011 related to networking and security. Many of the projects focused on improving security aspects of wireless networks, including key management, encryption, and intrusion detection. Other topics included distributed systems, peer-to-peer networks, sensor networks, and mobile payment security. The projects aimed to address challenges like congestion, energy efficiency, interference, and information leakage through techniques like encryption, routing protocols, synchronization, and traffic analysis.

Uploaded by

Vasanth Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

PROJECT TITLES -2011

1.Secure Communication For Internet Payment In Heterogeneous Networks

2 Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With
Any cast

3Design of network based software

4 A Secure Key Management Model for Wireless Mesh Networks

5 An Advanced Hybrid Peer-to-Peer Botnet

6 A Survey on the Encryption of Converge cast Traffic with In-Network


Processing

7 In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm

8 An Approach for Automated Network-Wide Security Analysis

9 Predictive Network Anomaly Detection and Visualization

10 Research on Security of Mobile Payment Model Based on Trusted Third Party

11 Reversible Image Watermarking Using Interpolation Technique

12 Flexible Frameworks for Actionable Knowledge Discovery

13 Personalizing Web Directories with the Aid of Web Usage Data

14 Graph-based Recommendation on Social Networks

15 Bridging Domains Using World Wide Knowledge For Transfer Learning

16 Constrained Skyline Query Processing against Distributed Data Sites

17 Data Leakage Detection

18 Asking Generalized Queries to Domain Experts to Improve Learning

19 Channel Assignment for Multihop Cellular Networks: Minimum Delay


20 Cost Analysis of Short Message Retransmissions

21.A Coverage Inference Protocol for Wireless Sensor Networks

22 Maximizing Rewards in Wireless Networks with Energy and Timing


Constraints for Periodic Data Streams

23 Sharing Enriched Multimedia Experiences across Heterogeneous Network


Infrastructures

24 A Bayesian Approach to Automated Creation of Tactile Facial Images

25 Joint Compression/Watermarking Scheme Using Majority-Parity Guidance


and Halftoning-Based Block Truncation Coding

26 A Logarithmic Quantization Index Modulation for Perceptually Better Data


Hiding

27 Robust Web Image/Video Super-Resolution

28 Sparse Bayesian Learning of Filters for Efficient Image Expansion

29 Dynamic Data Reallocation in Hybrid Disk Arrays

30 Fast and Message-Efficient Global Snapshot Algorithms for Large-Scale


Distributed Systems

31 Applications of Wireless Sensor Networks in the Oil, Gas and Resources


Industries

32 New Approach to Quantification of Privacy on Social Network Sites

33 SJN Improving Graduate Employability by Using Social Networking Systems


34 Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual
Authentication and Key Exchange in Mobile Communications

35 Secure Data Objects Replication in Data Grid

36 Inference Control to User Side: Architecture and Protocol

37 An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature


38 A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame
Theory

39 A New Cluster Based Routing Protocol for VANET

40 Layered Approach Using Conditional Random Fields for Intrusion Detection

41.Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection


Systems

42. Correlation-Based Traffic Analysis Attacks on Anonymity Networks

43 Privacy in VoIP Networks: Flow Analysis Attacks and Defense

44 Vulnerability Discovery with Attack Injection

45 Distribution of relations in parallel database based on PC clusters

46 Performance analysis and evaluation of random walk algorithms on wireless


networks

47 Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear


Pairing Functions

48 Toward Automated Anomaly Identification in Large-Scale Systems

49 A Dynamic Performance-Based Flow Control Method for High-Speed Data


Transfer

50 Chunk Distribution in Mesh-Based Large-Scale P2P Streaming Systems: A


Fluid Approach

51 Accuracy Performance Analysis between War Driving and War Walking in


Metropolitan WiFi Localization.

52 A Biased Random Walk Routing Protocol for Wireless Sensor Networks: the
Lukewarm Potato Protocol.

53 Economy of Spectrum Access in Time Varying Multi-Channel Networks.

54 SDMC08 Power Law and Exponential Decay of Inter Contact Times between
Mobile Devices.
55. A Stable On-line Algorithm for Energy Efficient Multi-user Scheduling.

56 Interference Management and Rate Adaptation in OFDM-Based UWB


Networks.

57 Uncertainty Modeling and Reduction in MANETs

58 Threshold-Based Media Streaming Optimization for Heterogeneous Wireless


Networks.

59 Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor


Networks.

60 Emergent Slot Synchronization in Wireless Networks

You might also like