Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula Oct 2015

Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula

All Capstone Projects

This project is aimed at developing an online search Portal for the Placement Department of the college. The system is an online application that can be accessed throughout the organization and outside as well with proper login provided. This system can be used as an Online Job Portal for the Placement Department of the college to manage the student information with regards to placement. Students logging should be able to upload their information in the form of a CV. Visitors/Company representatives logging in may also access/search any information put up by Students.


Android Attack Protection Application, Jahnavi Keerthipati, Vikas Reddy Tammanagari, Harinath Reddy Vangeti Oct 2015

Android Attack Protection Application, Jahnavi Keerthipati, Vikas Reddy Tammanagari, Harinath Reddy Vangeti

All Capstone Projects

Developed an android attack protection application. It is designed for people who are under attack. They would press a button on their phone and it will gather their current location and start recording a 5 second video with audio. This application will then automatically send the location and video straight to the person selected.


Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha Oct 2015

Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha

All Capstone Projects

Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious Real-Time URL detection system for …


Steganography, Naresh Emmadi, Varun Kumar Kattekolu, Sudhakar Shamul Oct 2015

Steganography, Naresh Emmadi, Varun Kumar Kattekolu, Sudhakar Shamul

All Capstone Projects

Multi Layer Security (MLS) is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an …


Ios Device Forensics, Lauren Drish Oct 2014

Ios Device Forensics, Lauren Drish

All Capstone Projects

Many people today have an iPhone, iPad or iPod. Not many would realize that valuable information is stored on these devices. When a crime occurs, an iOS Device could hold key information to help solve said crime that criminals are not aware are present on the device. This can include GPS information as well as application history on the device itself.

The project I wish to do and complete is to create a class where students can learn the about iOS Forensics. Student will be able to learn the basics of an iDevice, as well as how to work with …


A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell Jul 2012

A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell

All Capstone Projects

This project reviews security issues with mobile devices and offers possible solutions from Internet sources. (supplied by OPUS staff)