Public projects map

Projects in category

Project name Short description Categories Creation Date
GCCS_Cyber_Safe_Digital_Life_TSHYAM_P13 How to Use Safe Digital Life & How-to Investigation Fraud Banking Transaction, Social Site etc.
Not categorized
2017-11-11 11:10
GCCS_DELHI_ALOYSIUNGROUP_P06 RESOLVE TO CYBER RISK TO CHILD LIKE CYBER BULLING, CYBER PREDATOR, ETC. 2017-11-11 11:07
GCCS_Delhi_Dominator_p13 In my project we are developing the awareness through digital in among the people through this we are able to access more and more digital fully country 2017-11-11 11:42
GCCS_Delhi_P2 The purpose of the project is to create awareness about cyber crimes and provide 24X 7 help and help cyber victims to report the crime. 2017-11-16 00:48
GCCS_DELHI_RAKSHAK A Cyber Safety Gadget for kids with monitoring system and live video streaming 2017-11-11 00:33
GCCS_Delhi_SafeHouse_Mobile Security Seamless, multi device, cloud based, advanced cyber security for every internet user 2017-11-11 00:04
GCCS_Delhi_Secugenius-CSAO This app is one stop solution for all digital problems 2017-11-11 10:51
GCCS_Delhi_T1_P03 Project for IOT based Emergency Response Service. 2017-11-15 16:55
GCCS_Delhi_T1_P03 Project for IOT based Emergency Response Service. 2017-11-15 17:11
GCCS_Delhi_T1_P03 The main goal of this project is to design a robotic vehicle which detects the metal around it such as weapons and send an SMS to the Server . It also detect the motion and click the pic at that moment and send it to the server. 2017-11-15 18:33
GCCS_Delhi_T1_P12MobileSecurity Mobile phones have become an indispensable part our daily lives. Almost everyone owns a mobile phone. Thus there is an increase in use of android operating system .The users who are using this smart phones will be able to carry out their daily work such as paying bills, data sharing and news and many more. These applications will ask the users to allow certain permissions during installation and in turn will access to certain sensitive information such credit card details, logs of calls and location. Many users are unaware of this risk. The app that is installed is although from a genuine source and not a malware this is concerned about the security and privacy of the user. So, we will design a prototype that will analyze the risk related to android-based mobile application and will provide a risk score by considering several features into account. 2017-11-12 22:55
GCCS_DELHI_TECH WIZARDS_P13 It is an app created for GCCS Peace-a-thon to spread awareness about cyber security and provide help to cyber victims 2017-11-11 10:03
GCCS_DontWorry_IISC_11_DigitalFraud Integrated Recourse for Digital Fraud Victims
Not categorized
2017-11-09 19:06
GCCS_Encipher_IITB_P3 The C37.118 protocol channel is secured by implementing a new encrypted (SHA256, AES, RSA) layer between the channel. Client Server communication is used for send the encrypted data over the channel 2017-11-07 11:31
GCCS_Explicit Content Monitoring can be installed in any smart phone of 18below child. It monitors and examines all the activity of the user, if any explicit content (image, video…)is detected then it blocks the source and reports the same to the parent body(as instructed during installation).
Not categorized
2017-11-11 11:33
GCCS_Guwahati_roaming_IDS Intelligent Roaming Intrusion Detection System for the 6LowPAN based IoT 2017-11-10 19:31
GCCS_Guwahati_T1_P1 It is to reduce the possibility of GPS spoofing attack using time distributed strategy. 2017-11-10 17:18
GCCS_Guwahati_T2_P10 opinion mining of tweeter data for analysis about women trolling. 2017-11-10 16:58
GCCS_Guwahati_T2_P10 it is all about how women can be secured online.(opinion dataming) 2017-11-11 15:22
GCCS_Guwahati_T3_P9 Using Big Data, we will implement \\\'Sentiment Analysis\\\' to analyze the veracity of the trending news. 2017-11-10 17:36
880899 of 2715