..
Case Study Resources
Topics
- Intrusion Detection
- Malware Detection
- Spam Detection
- Encryption
- Web Security
- Vulnerability Analysis
- Access Control Mechanism using blockchains
Instructions
- Take good papers from sources such as
- IEEE
- Springer
- ACM Computing
- Don’t take papers from conference as the page limit imposed usually makes the content brief
- Presentation is advised to be in \( \LaTeX \)
- Atleast the contents of the paper need to be implemented
Review 0 (23/03/2023)
PPT contents
- Introduction
- Problem Statement
- System architecture (Block Diagram)
- Algorithms
- Description of Dataset
- Sample Output
- References