deepta
Member
- Member since
- Apr 29, 2012
- Last active
- Oct 14, 2015
- Total activities
- 0
Activity feed
Recent contributions
-
#Threads
Thesis ideas for MTech in Information Security
Can anyone suggest some thesis ideas that relates digital forensics and malware analysis? (Something that combines malware detection in a digital forensic...
-
#Threads
Control Flow-based malware variant detection
can anyone please tell me how a program's corresponding control flow graph is converted to k-subgraph feature. Actually I want to know...
-
#Threads
c556577f-a93d-44a4-ad9a-056054952be8
Gollapinni Karthik SharmaIt Its really a large topic. So narrow you selection and people here can help you out once you make...
-
#Threads
Forensic Analysis in Android phones - Thesis Topics
Please suggest some thesis topics on Forensic Analysis in Android phones.
-
#Threads
Decompilation and deobfuscation of java byte code
How is java bytecode decompiled and deobfuscated for malware analysis?
-
#Threads
The Sleuth Kit
Can anyone give me the complete working and architecture of TSK(The Sleuth Kit) which is a forensic tool.
-
#Threads
9f16b1d5-5449-4dff-aa81-dde4f5841b21
avi2in that case, you can use client's machine keys itselfBut can you give me a clear idea about it.
-
#Threads
ddcedbbc-3bb8-4d90-8216-ca8b6fd87cc3
avi2why not a random number?But how is it possible that both private and public key be random numbers. They must have a...
-
#Threads
Forensics data analysis
Can anyone suggest thesis topics for M-Tech on forensics data analysis??
-
#Threads
Web based voting system
Hello I had been through a paper on Web based voting system which suggests a method to cast vote online and then...
-
#Threads
e0c1fee6-8ac3-4f38-b719-d3b894da35fa
Can anyone suggest some good thesis topics in the area 'Cyber forensics'?
-
#Threads
WEB BASED VOTING SYSTEM
Hello I had been through a paper on Web based voting system which suggests a method to cast vote online and then...
-
#Threads
64fbd56f-da87-4caf-83e8-2fc279666aaf
rahul69The actual working can be seen only with hands on experience on that software, the abstract working is explained well in the...
-
#Threads
Two factor authentication using mobile phones
I'm doing main project on 'Two factor authentication using mobile phones'.As two factor authentication is an existing system can anyone suggest some...
-
#Threads
950f0c38-237a-4abc-97f4-b85b0f32dcf7
rahul69What exactly did u meant by "practical implementation details"? Do u want the code of PATROV SIMULATION ENGINE implementation, or something else....
-
#Threads
174fc237-9737-4b6f-9701-c9ea5cddc629
Not exactly the code of Partov simulation engine.I would like to know how the simulation engine would actually work for a given...
-
#Threads
PARTOV SIMULATION ENGINE
Can anyone give practical implementation details of PARTOV SIMULATION ENGINE discussed in the IEEE paper titiled "Improving a Computer Networks Course Using...
-
#Threads
46b84eb1-55c3-4b1c-a34a-58a580613694
Its in python..........