Public projects map
Browse by
Operating System
- Android 79 projects
- Linux 134 projects
- Mac 16 projects
- OS Independent 85 projects
- Others 15 projects
- Windows 143 projects
- Not specified 2614 projects
Projects in category
Project name | Short description | Categories | Creation Date |
---|---|---|---|
Gap analysis and identification | Gap analysis and identification of new projects on public schemes & projects. |
Not categorized
|
2016-11-16 11:42 |
Garbo | It is made as a part of open data gov hack phase 2. |
Not categorized
|
2018-04-15 18:08 |
Garuda | Garuda project and task management |
Not categorized
|
2023-05-23 11:47 |
Gauseva | Android app source code of Gauseva UP project |
Not categorized
|
2019-10-10 16:49 |
GAUTAM KUMAR GAUTAM | Respected sir, I Biggest request you i am Gautam kumar gautam. I need a job. i am Belong to a middle class family . |
Not categorized
|
2017-11-13 11:33 |
Gazetted Entitlement Management Software | GEMS for Ags Office |
Not categorized
|
2017-08-10 17:40 |
GCCS 2017 Web Potal | Repository for GCCS 2017 web portal | 2017-09-11 12:57 | |
GCCS-Aggies | Developed detection algorithm to detect cyber attacks on ICS, and presented proof of concept. |
Not categorized
|
2017-11-22 01:14 |
GCCS-anonymous | To increase reachabilty of digital awareness. |
Not categorized
|
2017-11-11 12:58 |
GCCS-ATM CARD HIJACKER | .test |
Not categorized
|
2017-11-10 17:04 |
GCCS-CARD TEST | ---- |
Not categorized
|
2017-11-11 12:18 |
GCCS-CHANDIGARH- | We address the frauds do by malicious person by pretending himself as an bank employee and threaten peoples to aces the account details along with OTP and do the illegal transactions. In all such frauds one thing is common that the device which verifies the OTP is different from the device which receives the OTP. Using this we deduce three solutions which prevents illegal transactions even after knowing of the OTP. | 2017-11-11 14:14 | |
GCCS-CHANDIGARH-SPIDER-P3 | For IoT security at physical level like hardware key is necessary insted of network or transfer layer security. | 2017-11-12 20:40 | |
GCCS-Delhi-RSJ-P1 | GCCS-Delhi-RSJ-P1 | 2017-11-11 08:34 | |
GCCS-Honeybee | A tool to lure Attackers in and gather information about their attacks and prevent them from gaining the insights about the actual system . | 2017-11-11 11:02 | |
GCCS-IITHyderabad | WHITE_HATS means a person who hacks into a computer network in order to test or evaluate its \\\\\\\\\\\\\\\"security systems\\\\\\\\\\\\\\\".we titled our project as white hats because our project is an android app which will save today\\\\\\\\\\\\\\\'s generation from cyber risks. | 2017-11-12 08:06 | |
GCCS-IITPATNA | hackathon | 2017-11-10 18:26 | |
GCCS-IITPatna-Team No.2-Problem No.10 | This is a cloud based web application that will be set in any Social Media to detect abusive languages and trolls from post, images and videos and report the trollers according to there content policy | 2017-11-11 23:41 | |
GCCS-NICK THE SPOOFER | We propose a solution to protect navigation infrastructure from spoofing using artificial intelligence. |
Not categorized
|
2017-11-11 12:36 |
GCCS-T-amitsin6h-Fake-News | Using simple and effective way for solving difficulties to identify fake news. |
Not categorized
|
2017-11-16 02:25 |