Skip to main content
Toggle navigation
Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures
Indian Institute of Technology, Kanpur
Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures
Main navigation
Home
Solutions
Anomaly Based Intrusion Detection System
Cyber Security Audit
Honeypot
Industrial Training
Integrated Malware Analysis Tool
Blockchain
SCADA CTF
Formal Verification
Security Event and Management Solutions
About Us
Mission
Annual Report
Collaboration
Contact Us
Gallery
research
Publications
Fundings
Advisory
Events
Technical Session
Seminars
Thesis Defenses
ConferencesandWorkshop
WOSCA
CSAW
CSAW'18 Agenda
SPACE
Apply
Internship
Training
Job
Resources
Books
Technical Report
Thesis
Apply now
Brochure
News
2019-11-08
IIT Madras wins Embedded Security Challenge in CSAW 2019
2019-07-23
Prof. Sandeep K. Shukla has been inducted into the editorial board of the Journal of British Blockchain Association (JBBA)
Weblink
2019-05-23
Cyber Security Chief Lt Gen Rajesh Pant visited C3i Center
Read All
Seminars & Events
Saturday, December 21, 2019 - 11:00
Prof. Sandeep Shukla will be the keynote speaker at International Conference on Secure Knowledge Management in Artificial Intelligence era (SKIM 2019)
Bits Pilani, Goa Campus.
Thursday, August 22, 2019 - 12:00
Fake Content, Manipulated Accounts, Chatbots, and Kill Files on Social Media
Ponnurangam Kumaraguru
KD 101
Monday, September 9, 2019 - 13:00
" Network Simulators and Emulators " ACM Distinguished speaker Gururaj H L
Gururaj H L , ACM Distinguished speaker
RM 101, CSE Department
Read All
jkhk
Short introduction to C3I Center's Research
Prof. Sandeep Shukla will be the keynote speaker at International Conference on Secure Knowledge Management in Artificial Intelligence era (SKIM 2019)
Evading API Call Sequence Based Malware Classifiers
IIT Madras wins Embedded Security Challenge in CSAW 2019
IIT Madras wins Embedded Security Challenge in CSAW 2019
Shivbihari Pandey
LFSR based Versatile Divider Architectures for BCH and RS Error Correction Encoders
Log based Dynamic Intrusion Detection of Web Applications
Feature Engineering & Analysis Towards Temporally Robust Detection of Android Malware
Context Aware Honeypot for Cross-Site Scripting attacks using Machine Learning Techniques
ANOMALY DETECTION IN THE ETHEREUM NETWORK
Pagination
Current page
1
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Page
8
Page
9
…
Next page
Next ›
Last page
Last »
Copyright © 2019. All rights reserved
This site is under Maintenance