..

Case Study Resources

Topics

  • Intrusion Detection
  • Malware Detection
  • Spam Detection
  • Encryption
  • Web Security
  • Vulnerability Analysis
  • Access Control Mechanism using blockchains

Instructions

  • Take good papers from sources such as
    • IEEE
    • Springer
    • ACM Computing
  • Don’t take papers from conference as the page limit imposed usually makes the content brief
  • Presentation is advised to be in \( \LaTeX \)
  • Atleast the contents of the paper need to be implemented

Review 0 (23/03/2023)

PPT contents

  • Introduction
  • Problem Statement
  • System architecture (Block Diagram)
  • Algorithms
  • Description of Dataset
  • Sample Output
  • References