These projects have been researched and compiled into a list to make it easy for students to choose their desired project topic for final year presentation. They also have the shortcoming that they need to be updated frequently to possess the latest malware definitions.
This makes them inherently prone to missing novel attacks. Misuse detection IDSs however overcome this problem by maintaining a ground truth of normal application behaviour and reporting deviations as anomalies. This project will build on existing research in this area. This project will use an anomaly detection platform being developed by the Cyber Security Analytics Group to consider relative detection performance using different feature sets, and different anomalies of interest, in the face of varying attacks.
This research would be experimental in nature and conducted with a view to exploring the minimal sets that would result in detection of a particular threat.
Further reflection would then be given to how generalisable this result might be and what we might determine about the critical datasets required for this kind of control to be effective. Eyetracking allows researchers to identify where observers look on a monitor.
A challenge in analysing eyetracker output however is identifying patterns of viewing behaviour from the raw eyetracker logs over time and what they mean in a research context, particularly as no semantic information about the pixel being viewed is considered. In practice, this means that we know where someone is looking, but nothing about what it means to look at that pixel or the order of pixels.
From a research perspective, being able to tag areas of interest, and what those areas mean, or conduct other statistical analysis on viewing patterns would be of significant use to analysing results, particularly if these results could be automated.
The purpose of this project is to conduct an eyetracker experiment, and design and implement useful methods to analyse eyetracker data. We will be able to provide training for the student, so they are able to use the eyetracking tools themselves.
Other eyetracking projects also possible, depending on interest and inspiration. Skills: Programming, Statistics. This project would utilise the process algebra CSP and associated model checker FDR to explore various types of threat and how they might successfully compromise a distributed ledger. This type of modelling would indicate possible attacks on a distributed ledger, and could guide subsequent review of actual designs and testing strategies for implementations.
The modelling approach would be based on the crypto-protocol analysis techniques already developed for this modelling and analysis environment, and would seek to replicate the approach for a distributed ledger system. Requirements: In order to succeed in this project students would need to have a working knowledge of the machine readable semantics of CSP and also the model checker FDR.
An appreciation of threat models and capability will need to be developed. They evaluate the success of activities in which an organisation or system engages. Often success is measured in terms of whether an activity has been able to complete and able to repeat e.
Well-chosen KPIs allows us to reflect upon performance of an organisation, and possibly identify potential future degradation issues in systems. In this project, students are tasked to investigate how KPIs can be used to measure and improve cyber-resilience in an organisation. Particularly, we are interested in investigating how the performance of an organisation, particularly with respects to security as well as mission performance.
After identifying which aspects of an organisation or the mission are prone to error, it may be beneficial to propose solutions for how these issues can be addressed. For instance, the project may be network-security focused, mission-processes focused or otherwise. Current penetration testing is typically utilised for discovering how organisations might be vulnerable to external hacks, and testing methods are driven by using techniques determined to be similar to approaches used by hackers.
The result being a report highlighting various exploitable weak-points and how they might result in unauthorised access should a malign entity attempt to gain access to a system. Recent research within the cybersecurity analytics group has been studying the relationship between these kinds of attack surfaces and the kinds of harm that an organisation might be exposed to. An interesting question would be whether an orientation around intent, or harm, might result in a different test strategy?
Would a different focus be given to the kinds of attack vectors explored in a test if a particular harm is aimed at? This mini-project would aim to explore these and other questions by designing penetration test strategies based on a set of particular harms, and then seek to consider potential differences with current penetration practices by consultation with the professional community. Requirements: Students will need to have a working understanding of penetration testing techniques.
However, this can clearly be refined by moving to an understanding of those tasks live or active at the time of an attack propagating across a system. If this can be calculated, then an accurate model of where risk may manifest and the harm that may result can be constructed.
This project would explore the potential for such a model through practical experimentation and development of software monitors to be placed on a network aimed at inferring the tasks and users that are active based from network traffic.
If time allows then host-based sensors might also be explored such as on an application server to further refine the understanding of which users and live on which applications etc. Requirements: Students must be able to construct software prototypes and have a working knowledge of network architectures and computer systems.
Procedural methods in computer graphics help us develop content for virtual environments geometry and materials using formal grammars. Common approaches include fractals and l-systems. Examples of content may include the creation of cities, planets or buildings.
In this project the student will develop an application to use create content procedurally. The student is free to approach the challenge as they see fit, but would be expected to design, implement and assess the methods they develop. These projects tend to have a strong focus designing and implementing existing procedural methods, but also includes a portion of creativity.
The project can be based on reality - e. Past students for instance have built tools to generate cities based on real world examples and non-existent city landscapes, another example include building of procedural planets, including asteroids and earth-like planetary bodies.
Resilience in the face of cyber-attack is considered a key requirement for organisations. Prior work within the cybersecurity analytics group has been developing a resilience model for organisations, but there remains a commonly agreed set of metrics that organisations can use to determine just how resilient they are at a given point in time and continuously. This mini-project would seek to propose a set of metrics, and if time allows tools for applying them although the latter may well better suit a following DPhil.
It will be necessary to consider how the metrics might vary according to, or take account of, different threat environments. It may also be interesting to consider if there are refinements of the resilience requirements that apply to different types of organisations. Data analytics approaches will need to be considered, in order to apply the metrics, and students might consider the use of visualisation to help with this. The resulting metrics will be validated in consultation with security professionals and organisations possessing resilience related experience.
In the context of the mini-project this is most likely achievable via a small number of interviews, with a more detailed validation and iterative design approach being supported by a longitudinal study working with 2 or 3 organisations which might adopt and test the metrics.
Joint with Sadie Creese Smartphone security: one concrete idea is the development of a policy language to allow the authors of apps to describe their behaviour, designed to be precise about the expected access to peripherals and networks and the purpose thereof data required and usage ; uses skills in formal specification, understanding of app behaviour by studying open-source apps , possibly leading to prototyping a software tool to perform run-time checking that the claimed restrictions are adhered to.
Suitable for good 3rd or 4th year undergraduates, or MSc, Concurrency, Concurrent Programming, Computer Security all possibly an advantage. Other projects within this domain possible, according to interest and inspiration. There are many tools available for detecting and monitoring cyber-attacks based on network traffic and these are accompanied by a wide variety of tools designed to make alerts tangible to security analysts. By comparison, the impact of these attacks on an organisational level has received little attention.
An aspect that could be enhanced further is the addition of a tool facilitating management and updating of our understanding of business processes, but also how those processes are dependent on a network infrastructure. This tool could facilitate the mapping between company strategies, activities needed to accomplish company goals and map these down to the network and people assets.
At the top of the hierarchy lies the board, responsible for strategic decisions. These decision are interpreted in the managerial level and could be captured and analysed with business objective diagrams. These diagrams in return could be refined further to derive business processes and organisational charts, ensuring that decision made in the top level will be enforced in the lower levels. The combination of business processes and organisation charts could eventually provide the network infrastructure.
For this project we suggest a student could develop novel algorithms for mapping of business processes to network infrastructures in an automated way given the updated business process files.
That said, the student is encouraged to approach this challenge as they see fit, but would be expected to design, implement and assess any methods they develop. Other projects on business process modelling also possible, depending on interest and inspiration. This project would seek to study the general form of distributed ledgers to identify weak points that might make implementations open to compromise and attack, and to develop corresponding threat models. A number of different approaches might be considered, for example: formal modelling of protocols used to establish agreement or resolve conflicts; design of test suites using attack-graphs and then validation in a laboratory setting.
Jotun Hein has been in Oxford since and has supervised many students from Computer Science. His main interest is computational biology and combinatorial optimization problems in this area, especially from phylogenetics, biosequence analysis, population genetics, grammars and the origin of life. Some idea for projects can be obtained by browsing these pages:. The parallel programming language occam is essentially an implementable sublanguage of CSP.
The aim of this project is to produce a small portable implementation of a subset of occam; the proposed technique is to implement a virtual machine based on the inmos transputer, and a compiler which targets that language.
One of the aims of the project is to implement an extension to occam which permits recursion; more ambitious projects might implement a distributed implementation with several communicating copies of the virtual machine. Other possibilities are to produce separate virtual machines, optimised for displaying a simulation, or for efficiency of implementation, or translating the virtual machine code into native code for a real machine.
The idea is to produce a simulator for a traditional logic breadboard. The user should be able to construct a logic circuit by drawing components from a library of standard gates and latches and so on, and connecting them together in allowable ways.
It should then be possible to simulate the behaviour of the circuit, to control its inputs in various ways, and to display its outputs and the values of internal signals in various ways. The simulator should be able to enforce design rules such as those about not connecting standard outputs together, or limiting fan-out but should also cope with partially completed circuits; it might be able to implement circuits described in terms of replicated sub-circuits; it should also be able to some sort of standard netlist.
It might be that this would make a project for two undergraduates: one implementing the interface, the other implementing a simulator that runs the logic. This is a project in the specification of hardware, which I expect to make use of functional programming. There is a great deal of knowledge about ways that are good by various measures of implementing standard arithmetic operations in hardware.
However, most presentations of these circuits are at a very low level, involving examples, diagrams, and many subscripts, for example these descriptions. The aim of this project is to describe circuits like this in a higher-level way by using the higher order functions of functional programming to represent the structure of the circuit.
It should certainly be possible to execute instances of the descriptions as simulations of circuits by plugging in simulations of the component gates , but the same descriptions might well be used to generate circuit netlists for particular instances of the circuit, and even to produce the diagrams. The aim is to take some mathematics that would be within the grasp of a mathematically-inclined sixth-former and turn it into some attention-grabbing web pages.
Ideally this reveals a connection with computing science. I imagine that this project necessarily involves some sort of animation, and I have visions of Open University television maths lectures. The programming need not be the most important part of this project, though, because some of the work is in choosing a topic and designing problems and puzzles and the like around it. Python for Everyone will introduce you to a popular language and will quickly move to practical programming tasks - using web APIs and databases.
This will give you a taste of what many professional developers do. Fundamentals of Computing will also start by introducing you to Python. It then moves on to give an introduction to academic Computer Science topics, like sorting and recursion.
This will give you a taste of what the following courses will be like. Topics covered : simple programs simple data structures. This course will introduce you to the world of computer science. Students who have been introduced to programming, either from the courses above or through study elsewhere, should take this course for a flavor of the material to come. If you finish the course wanting more, Computer Science is likely for you!
Topics covered : computation imperative programming basic data structures and algorithms and more. Understanding theory is important, but you will also be expected to create programs.
There are a number of tools that are widely used to make that process easier. Learn them now to ease your future work writing programs. Topics covered : terminals and shell scripting vim command line environments version control and more. Topics covered : functional programming design for testing program requirements common design patterns unit testing object-oriented design Java static typing dynamic typing ML-family languages via Standard ML Lisp-family languages via Racket Ruby and more.
The First Edition is available for free online and includes problem sets and solutions. Students are encouraged to do these assignments. Students must choose one of the following topics : calculus, linear algebra, logic, or probability. In addition to their math elective, students must complete the following course on discrete mathematics.
Topics covered : discrete mathematics mathematical proofs basic statistics O-notation discrete probability and more. Topics covered : procedural programming manual memory management boolean algebra gate logic memory computer architecture assembly machine language virtual machines high-level languages compilers operating systems network protocols and more.
Topics covered : divide and conquer sorting and searching randomized algorithms graph search shortest paths data structures greedy algorithms minimum spanning trees dynamic programming NP-completeness and more. Note: These courses are provisionally recommended. There is an open Request For Comment on security course selection.
Contributors are encouraged to compare the various courses in the RFC and offer feedback. We train the students on different technologies, Deliver the project on time and provide report and PPT materials.
Like this: Like Loading Looking for more source code? I have a lot of interest in coding software. We are submitting small projects this year too, please do you help me do that sir …….. I wish to make many software projects in my next year.
Please help me do something they make Current year Your all ideas are mostly welcomed….. Thank You sir …. They want to maintain the accountant salary and students personal and payment details centrally. Student can pay their fees Online by using this portal. Online classifieds are the need of the hour as a user can become both buyer and seller on the click of a button.
More over since it is published online, any person can see it sitting anywhere in the world. All it takes is basic computer knowledge to browse this site. The game was developed using Unity and Maya and was build for PC.
This search engine project is created by a computer science student to challenge how search results are returned. Importance is placed on how web pages are ranked by a quick and efficient algorithm. All hands on deck is how we are calling this project.
Algorithm design is really important and creative methods from better search results or web crawling is welcomed from all amateur programmers, students , web developers, software developers and computer science students from around the globe.
To do this they hold competitions around the world called botball where students program autonomous land robots to perform various sets of tasks. KIPR, now wants to expand and leave the ground by integrating flying robots the AR Drone into the tasks for added interest, fun, and challenge for students. The program reads in a.
This project was created by me and 3 other students at Central Washington University as our class project in the spring of This Shed Planning and Work Distribution System project have got the scope to develop in other departments of Electrical and Mechanical Shed, like Spares department where information regarding the available spares can be stored in a computer database for faster information retrieval.
Also, there is scope to automate the process of issuing tenders to the unavailable parts of the Electrical and Mechanical Shed through online which is currently being done manually.
We can further enhance the work notification system that has been implemented in the current project through color coding by generating alert boxes in addition to the color coding. The class diagram of the electric loco shed shows the major classes, their attributes and the operations of each class. The operation of each class has the effective utilization of the attributes. The above diagram shows the behavior of other users.Software engineering involves designing, development and maintenance of various application based softwares. Software engineering projects can be implemented on several tools such as Java, Dot net, Linux, Oracle, and so on. Software project free software projects for computer science students accounts for creating various business-based free software projects for computer science students meeting security challenges and free software projects for computer science students activities in collaboration with free software projects for computer science students authorized corporations within short span of time. In addition to CSE engineering projects, this article also includes some of the information technology projects for the professional IT students. All of these software projects in the above english to urdu converter software free download are the latest titled projects that are widely implemented by the researchers and professionals, and thus represent software engineering projects for IT and Computer Science students. I really like what you guys tend to be up too. Such clever work and coverage! I am a final year of the computer engineering student. I want to do something new and unique as my final year project. Hello sirI am T. E CSE student. I have to do java based project, so i am requesting you to suggest me any topic. I read the publication with great interest. Thank you. Also I want to say that I use the best programs thanks to the web resource I like free software projects for computer science students the software is absolutely free. I am a 3rd year IT student who is looking to make a mini project and a research paper on few of the topics you mentioned here. I have prepared a list of topics for both research paper and mini-project, so please help me so that I can move further. Excellent website. latest project for computer science students free download. iLab Project The iLab Example for the course "Software Engineering". This sourceforge project is. Also explore free latest information on CSE Research Topics and Thesis Dissertation Latest Project list for Computer Engineering Students Categories: hospital Management System The first and only clinic management software / system. computer science Project topics with source code made for Computer Science Skills Possessed By A Computer Science Education Student for Self Of A Collaborative Software As A Service Based Office Management. Projects. Free BTech BE Projects | MTech ME Projects | Msc MCA Projects. Menu Projects listed here consists of cse mini and major project with source code in java,. Posted on September 25, The percentage is calculated by taking the reference from the no. of students. Software Requirements: Windows OS. Explore Final Year Projects for CSE Students Free Download, Computer Science Implementation of Software Management and Maintenance. Thank you. Also I want to say that I use the best programs thanks to the web resource I like that the software is absolutely free. Reply. The projects listed here are mostly advanced CSE Mini Projects and Major projects developed We Try to give Best Source Code for student that help develop better Projects. More >> Simple Java Projects with Source Code Free Download. Java, onoroff.biz, Dotnet, PhD. MTech computer science research application projects, Source Code Free Download, final year project for Computer Science and CSE IT Information Technology Engineering College Students. Customer Complaint Report Software · DEMOS Online Quiz · Design And. Access our collection of top software engineering project ideas compiled for engineering students and electronics enthusiasts. The are simple projects which students can easy do and learn from it. science required to develop computer hardware and software. Your list is amazing. A guide will be alloted to every batch and remote support too available for out station students and M-Tech students persuing there final year. I wish to make many software projects in my next year. We are submitting small projects this year too, please do you help me do that sir …….. Face Recognition by the Computer. The Project is based on the concept of managing dairy products and… Continue Reading. Innovative Project Solutions. Hi Tarun. Programming Languages. Temperature logger suggested implementation: Raspberry Pi, temperature sensor, web app. Such clever work and coverage!