Follow

Theses/Dissertations from 2025

PDF

Analyzing the Effectiveness of Information Security Compliance on Cloud Based Small and Medium Enterprises (SMEs), Kasie Kelvin Awagu

PDF

Impact of Data Characteristics on the effectiveness of multi-stage transfer learning using MRI medical images, Ganga Prasad Basyal

PDF

A Risk Evaluation Framework and Comprehensive Security Compliance Assessment Solution for Space Information Networks (SIN), Bernard Afaare Dawaare

PDF

Spatiotemporal Deep Learning for Land Cover and Impervious Surface Mapping with Satellite Imagery, Rylie Fleckenstein

PDF

The Effect of Compilation on the Identification of Obfuscated Malware, Eli T. Fulkerson

PDF

Research Aiming to Understand Baseline Cybersecurity Awareness for Senior Citizens and Their Training Needs, Malik A. Gladden

PDF

Automating Mobile Malware Evasion: An Opcode N-Gram Based Approach to Generate Machine Learning Powered Adversarial Examples, Kenji Harada

PDF

Switching Wearable Fitness Devices: Exploring Factors in Switching, Stephen Hendrix

PDF

How Technology Can Be Used to Reduce the Equity Gap in Healthcare for Underserved Communities, Richard Manprisio

PDF

A Deep Learning Approach to Vulnerability Detection in Lifted Code Using Transformer-Based Embeddings, Gary McCully

PDF

Differential Privacy for Microdata Streams: Adversarial Approaches, Sean McElroy

PDF

CGFuzzerArt: A Directed Graybox Fuzzer for Vulnerability Discovery, Zishan Merza

PDF

The Impact of Organizational Culture on Artificial Intelligence (AI) and Organizational Performance: A Mixed Methods Approach, Wlifred C. Mutale

PDF

Malware Classification Using Weighted Control Flow Graphs, Tjada Nelson

PDF

Measuring the Effectiveness of AppLocker Against Banking Trojans (A Multi-year Study), Robert Riskin

PDF

A Mixed Methods Comparative Analysis of Organizational Incident Response to SolarWinds and Log4Shell, Matthew Ryan

PDF

Bridging Cognitive Psychology and Natural Language Processing: A Bias-Detection Framework for Large Language Models, Stephen Surles

PDF

Employee and Employer Perceptions Regarding Cybersecurity Education During The Hiring Process, Jordan VanHoy

PDF

Principles For the Design of Visual Progress Bars to Improve Motivation in Online Learning, Tania Shotts Williams

PDF

Performance Measurement of BGP Extended with De-Facto Network Identification, Shawn Zwach

Theses/Dissertations from 2024

PDF

Enhancing Smart Home Security Through Risk-Based Access Control (RBAC): “Closing the Gap”, Ahmad Abusini

PDF

Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention, Samuel T. Aiello

PDF

A Comprehensive Framework Empowering Organizations to Effectively Minimize the Risk of Big Data De-anonymization Attack, Olufemi A. Asabi

PDF

Understanding Provider Perspectives: Catalysts and Challenges of Intelligent Clinical Decision Support Systems, Andrew Behrens

PDF

RUFF: Resource Usage Fuzzing Framework, Gavin Black

PDF

Exploring an AI Chatbot to Close School Counselor Information Gaps: A Design Science Approach, Kalee Crandall

PDF

The Role of Privacy in the Intention to Disclose Personal Driving Data Using Internet-of-Vehicle Technology in Consumer Automobiles, Steven Bradley Fowler

PDF

Automatic Heap Primitive Detection for Exploit Development, Rachel Glockenmeier

PDF

Effectiveness of Transfer Learning with Light-weight Architecture for Covid-19 Imaging, Rajesh Godasu

PDF

Impact of Organizational Changes on BI Critical Success Factors, Badr Harfoush

PDF

Mirage: A VBA Macro Emulator for Behavioral Analysis Powered by Machine Learning, Corey Mathew Hartman

PDF

Leveraging the Zigbee Pattern of Life to Identify Devices, Kurt Jarvis

PDF

Forensic Iconography for Image Forgery Detection, Chad R. Johnson

PDF

Identifying Critical Factors That Impact Learning Analytics Adoption by Higher Education Faculty, Michael Knupp

PDF

An Exploration of Machine Learning Security, Carson Kendall Grandi Koball

PDF

Securing Modbus via Proxied Approach, Kyle Korman

PDF

Fine-Grained Address Space Layout Randomization Through Non-Contiguous Per-Function Memory Segment Assignment, Andrew Kramer

PDF

A Model of Authentication for Augmented and Virtual Realities, Christopher Kreider

PDF

ABCD: A Risk Management Framework for SCADA Systems, Thuy Lam

PDF

Bone Surface Modification Dataset Synthesis for Computer Vision Models Using LoRA Tuned Latent Diffusion Models, Jason Mixon

PDF

Automated Dynamic Policy Generation for Access Control in the Internet of Things, Kaushik Nagarajan Muthusamy Ragothaman

PDF

UAV Drone Security of Control for Increased Safety-of-flight, Daniel R. Nash

PDF

A Cross-Architecture Framework for Anti-Debugging Techniques, Austin Norby

PDF

Divergent Detection: A Comprehensive Study of DGAS Using FNNS for Original, Noise-Modified, and Linear Recursive Sequences(LRS), Anthony Rizi

PDF

Factors Influencing Blockchain Implementation in Supply Chain Management: An Exploratory Study, Aravindh Sekar

PDF

Weed Detection Using Lightweight Deep Learning Models with Transfer Learning and Hyperparameter Optimization, Ali Shaheen

PDF

Implementing a Zero Trust Architecture For ICS/SCADA Systems, Raven Sims

PDF

Defending the security of the mind: A mail survey of thought-reform literacy in South Dakota, Dustin Rozario Steinhagen

PDF

An NLP-Based Knowledge Extraction Approach for IT Tech-Support/Helpdesk Transcripts, Gary Yu Zhao

Theses/Dissertations from 2023

PDF

Design Principles For App-Based Healthcare Interventions: A Mixed Method Approach, Loknath Sai Ambati

PDF

Defining A Cyber Operations Performance Framework Via Computational Modeling, Briant Becote

PDF

Detection Of VulnerabilitIies in 5G Femtocell Firmware Using Static Analysis Tools, Charles H. Begian

PDF

Malware Pattern of Life Analysis, Mar Castro

PDF

A Performance-Explainability-Fairness Framework For Benchmarking ML Models, Shuvro Chakrobartty

PDF

Native American Community Digital Divide: Student Insights, Chad R. Fenner

PDF

Exploring the Interoperability for Information Exchange Between Acute and Post-Acute Care Settings, Madhu Gottumukkala

PDF

A Study of Stem and Non-Stem College Students’ Smart TV Attitudes (The Trade-Off Between Functionality and Security/Privacy), Nadia Halabi

PDF

BAMBI: Bluetooth Access Management & Beacon Identification, Anthony Jairam

PDF

Convolutional Autoencoder Neural Network Design Evaluation for an Anomaly Detection Subsystem in Autonomous Spacecraft Computer Vision Systems, Jonathan F. Lancelot

PDF

A Novel Approach To A Second Channel Authentication Method Utilizing Alphanumerical Data Transfer Through Audio Waves, Mark Lawrence

PDF

Endpoint Defense as Code (EDAC): Configurable Contextual Analysis of Process Behaviors From Kernel/User Event Tracing, Trevor M. Lewis

PDF

Token Based Authentication and Authorization with Zero-Knowledge Proofs for Enhancing Web API Security and Privacy, Michael Lodder

PDF

A Self-Regulated Learning Approach to Educational Recommender Design, Alicia McNett

PDF

E-Democratic Government Success Framework for United States’ Municipalities, Glenn Papp Jr

PDF

SUTMS - Unified Threat Management Framework for Home Networks, Asif Siddiqui

PDF

Bypassing Modern CPU Protections With Function-Oriented Programming, Logan Stratton

PDF

Towards Long-Term Impact of Deep Learning Systems in Medical Imaging, Kruttika Sutrave

PDF

Static Binary Rewriting for ROP Gadget Removal, Hans Verhoeven

PDF

CyberEducation-By-Design™: Developing A Framework for Cybersecurity Education at Secondary Education Institutions in Arizona, Paul Wagner

PDF

Alumni Perceptions of Cybersecurity Employment Preparation Using the NICE Framework, Tobi West

PDF

Measuring the Performance Cost of Manual System Call Detections Via Process Instrumentation Callback (PIC), Jacob Williams

Theses/Dissertations from 2022

PDF

Two Project on Information Systems Capabilities and Organizational Performance, Giridhar Reddy Bojja

PDF

Leaderboard Design Principles Influencing User Engagement in an Online Discussion, Brian S. Bovee

PDF

A Metric For Machine Learning Vulnerability to Adversarial Examples, Matt Bradley

PDF

An Application of Machine Learning to Analysis of Packed Mac Malware, Kimo Bumanglag

PDF

Improving Adversarial Attacks Against MalConv, Justin Burr

PDF

Knowledge Management in Higher Education: Effectiveness, Success factors, and Organisational Performance, Armel Djangone

PDF

Aligning Recovery Objectives With Organizational Capabilities, Jude C. Ejiobi

PDF

Privacy Assessment Breakthrough: A Design Science Approach to Creating a Unified Methodology, Lisa McKee

PDF

Privacy and Security Concerns Associated with MHealth Technologies: A Social Media Mining Perspective, Damion Mitchell

PDF

Towards an Efficient Multi-Cloud Observability Framework of Containerized Microservices in Kubernetes Platform, Haytham Mohamed

PDF

A Dark Web Pharma Framework for A More Efficient Investigation of Dark Web COVID-19 Vaccine Products., Francisca Afua Opoku-Boateng

PDF

Multi-dimensional Security Integrity Analysis of Broad Market Internet-connected Cameras, Mark A. Stanislav

PDF

A False Sense of Security - Organizations Need a Paradigm Shift on Protecting Themselves against APTs, Srinivasulu R. Vuggumudi

PDF

Fake News Detection on the Web: A Deep Learning Based Approach, Piyush Vyas

Theses/Dissertations from 2021

PDF

JRevealPEG: A Semi-Blind JPEG Steganalysis Tool Targeting Current Open-Source Embedding Programs, Charles A. Badami

PDF

IPCFA: A Methodology for Acquiring Forensically-Sound Digital Evidence in the Realm of IAAS Public Cloud Deployments, Hosam Badreldin

PDF

Analysis of Theoretical and Applied Machine Learning Models for Network Intrusion Detection, Jonah Baron

PDF

A Consent Framework for the Internet of Things in the GDPR Era, Gerald Chikukwa

PDF

Exploring High-Power Distance Among Other Variables in Information Security Policy Compliance, Erasmus Ekpo Etim

PDF

Traversing NAT: A Problem, Tyler Flaagan

PDF

Analyzing the Effectiveness of Legal Regulations and Social Consequences for Securing Data, Howard B. Goodman

PDF

Efficacy of Incident Response Certification in the Workforce, Samuel Jarocki

PDF

The Role of Privacy Within the Realm of Healthcare Wearables' Acceptance and Use, Thomas Jernejcic

PDF

Analysis of System Performance Metrics Towards the Detection of Cryptojacking in IOT Devices, Richard Matthews

PDF

Cybersecurity Education for Non-Technical Learners, Matthew McNulty

PDF

Towards Identity Relationship Management For Internet of Things, Mohammad Muntasir Nur

PDF

Transfer-Learned Pruned Deep Convolutional Neural Networks for Efficient Plant Classification in Resource-Constrained Environments, Martinson Ofori

PDF

Block the Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

Theses/Dissertations from 2020

PDF

Ednem: A Malware Detection Framework Based on Static and Dynamic Analysis, Jumani Blango