Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Physical Sciences and Mathematics
Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula
Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula
All Capstone Projects
This project is aimed at developing an online search Portal for the Placement Department of the college. The system is an online application that can be accessed throughout the organization and outside as well with proper login provided. This system can be used as an Online Job Portal for the Placement Department of the college to manage the student information with regards to placement. Students logging should be able to upload their information in the form of a CV. Visitors/Company representatives logging in may also access/search any information put up by Students.
Android Attack Protection Application, Jahnavi Keerthipati, Vikas Reddy Tammanagari, Harinath Reddy Vangeti
Android Attack Protection Application, Jahnavi Keerthipati, Vikas Reddy Tammanagari, Harinath Reddy Vangeti
All Capstone Projects
Developed an android attack protection application. It is designed for people who are under attack. They would press a button on their phone and it will gather their current location and start recording a 5 second video with audio. This application will then automatically send the location and video straight to the person selected.
Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha
Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha
All Capstone Projects
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious Real-Time URL detection system for …
Steganography, Naresh Emmadi, Varun Kumar Kattekolu, Sudhakar Shamul
Steganography, Naresh Emmadi, Varun Kumar Kattekolu, Sudhakar Shamul
All Capstone Projects
Multi Layer Security (MLS) is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an …
Ios Device Forensics, Lauren Drish
Ios Device Forensics, Lauren Drish
All Capstone Projects
Many people today have an iPhone, iPad or iPod. Not many would realize that valuable information is stored on these devices. When a crime occurs, an iOS Device could hold key information to help solve said crime that criminals are not aware are present on the device. This can include GPS information as well as application history on the device itself.
The project I wish to do and complete is to create a class where students can learn the about iOS Forensics. Student will be able to learn the basics of an iDevice, as well as how to work with …
A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell
A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell
All Capstone Projects
This project reviews security issues with mobile devices and offers possible solutions from Internet sources. (supplied by OPUS staff)