Theses/Dissertations from 2024
Enhancing Smart Home Security Through Risk-Based Access Control (RBAC): “Closing the Gap”, Ahmad Abusini
A Comprehensive Framework Empowering Organizations to Effectively Minimize the Risk of Big Data De-anonymization Attack, Olufemi A. Asabi
Understanding Provider Perspectives: Catalysts and Challenges of Intelligent Clinical Decision Support Systems, Andrew Behrens
Effectiveness of Transfer Learning with Light-weight Architecture for Covid-19 Imaging, Rajesh Godasu
Leveraging the Zigbee Pattern of Life to Identify Devices, Kurt Jarvis
Forensic Iconography for Image Forgery Detection, Chad R. Johnson
Identifying Critical Factors That Impact Learning Analytics Adoption by Higher Education Faculty, Michael Knupp
Fine-Grained Address Space Layout Randomization Through Non-Contiguous Per-Function Memory Segment Assignment, Andrew Kramer
A Model of Authentication for Augmented and Virtual Realities, Christopher Kreider
ABCD: A Risk Management Framework for SCADA Systems, Thuy Lam
Automated Dynamic Policy Generation for Access Control in the Internet of Things, Kaushik Nagarajan Muthusamy Ragothaman
UAV Drone Security of Control for Increased Safety-of-flight, Daniel R. Nash
A Cross-Architecture Framework for Anti-Debugging Techniques, Austin Norby
Weed Detection Using Lightweight Deep Learning Models with Transfer Learning and Hyperparameter Optimization, Ali Shaheen
Implementing a Zero Trust Architecture For ICS/SCADA Systems, Raven Sims
Defending the security of the mind: A mail survey of thought-reform literacy in South Dakota, Dustin Rozario Steinhagen
An NLP-Based Knowledge Extraction Approach for IT Tech-Support/Helpdesk Transcripts, Gary Yu Zhao
Theses/Dissertations from 2023
Design Principles For App-Based Healthcare Interventions: A Mixed Method Approach, Loknath Sai Ambati
Defining A Cyber Operations Performance Framework Via Computational Modeling, Briant Becote
Detection Of VulnerabilitIies in 5G Femtocell Firmware Using Static Analysis Tools, Charles H. Begian
Malware Pattern of Life Analysis, Mar Castro
A Performance-Explainability-Fairness Framework For Benchmarking ML Models, Shuvro Chakrobartty
Native American Community Digital Divide: Student Insights, Chad R. Fenner
Exploring the Interoperability for Information Exchange Between Acute and Post-Acute Care Settings, Madhu Gottumukkala
A Study of Stem and Non-Stem College Students’ Smart TV Attitudes (The Trade-Off Between Functionality and Security/Privacy), Nadia Halabi
BAMBI: Bluetooth Access Management & Beacon Identification, Anthony Jairam
A Novel Approach To A Second Channel Authentication Method Utilizing Alphanumerical Data Transfer Through Audio Waves, Mark Lawrence
Endpoint Defense as Code (EDAC): Configurable Contextual Analysis of Process Behaviors From Kernel/User Event Tracing, Trevor M. Lewis
Token Based Authentication and Authorization with Zero-Knowledge Proofs for Enhancing Web API Security and Privacy, Michael Lodder
A Self-Regulated Learning Approach to Educational Recommender Design, Alicia McNett
E-Democratic Government Success Framework for United States’ Municipalities, Glenn Papp Jr
SUTMS - Unified Threat Management Framework for Home Networks, Asif Siddiqui
Bypassing Modern CPU Protections With Function-Oriented Programming, Logan Stratton
Towards Long-Term Impact of Deep Learning Systems in Medical Imaging, Kruttika Sutrave
Static Binary Rewriting for ROP Gadget Removal, Hans Verhoeven
Alumni Perceptions of Cybersecurity Employment Preparation Using the NICE Framework, Tobi West
Measuring the Performance Cost of Manual System Call Detections Via Process Instrumentation Callback (PIC), Jacob Williams
Theses/Dissertations from 2022
Two Project on Information Systems Capabilities and Organizational Performance, Giridhar Reddy Bojja
Leaderboard Design Principles Influencing User Engagement in an Online Discussion, Brian S. Bovee
A Metric For Machine Learning Vulnerability to Adversarial Examples, Matt Bradley
An Application of Machine Learning to Analysis of Packed Mac Malware, Kimo Bumanglag
Improving Adversarial Attacks Against MalConv, Justin Burr
Knowledge Management in Higher Education: Effectiveness, Success factors, and Organisational Performance, Armel Djangone
Aligning Recovery Objectives With Organizational Capabilities, Jude C. Ejiobi
Privacy Assessment Breakthrough: A Design Science Approach to Creating a Unified Methodology, Lisa McKee
Privacy and Security Concerns Associated with MHealth Technologies: A Social Media Mining Perspective, Damion Mitchell
Towards an Efficient Multi-Cloud Observability Framework of Containerized Microservices in Kubernetes Platform, Haytham Mohamed
A Dark Web Pharma Framework for A More Efficient Investigation of Dark Web COVID-19 Vaccine Products., Francisca Afua Opoku-Boateng
Multi-dimensional Security Integrity Analysis of Broad Market Internet-connected Cameras, Mark A. Stanislav
A False Sense of Security - Organizations Need a Paradigm Shift on Protecting Themselves against APTs, Srinivasulu R. Vuggumudi
Fake News Detection on the Web: A Deep Learning Based Approach, Piyush Vyas
Theses/Dissertations from 2021
JRevealPEG: A Semi-Blind JPEG Steganalysis Tool Targeting Current Open-Source Embedding Programs, Charles A. Badami
IPCFA: A Methodology for Acquiring Forensically-Sound Digital Evidence in the Realm of IAAS Public Cloud Deployments, Hosam Badreldin
Analysis of Theoretical and Applied Machine Learning Models for Network Intrusion Detection, Jonah Baron
A Consent Framework for the Internet of Things in the GDPR Era, Gerald Chikukwa
Exploring High-Power Distance Among Other Variables in Information Security Policy Compliance, Erasmus Ekpo Etim
Traversing NAT: A Problem, Tyler Flaagan
Analyzing the Effectiveness of Legal Regulations and Social Consequences for Securing Data, Howard B. Goodman
Efficacy of Incident Response Certification in the Workforce, Samuel Jarocki
The Role of Privacy Within the Realm of Healthcare Wearables' Acceptance and Use, Thomas Jernejcic
Analysis of System Performance Metrics Towards the Detection of Cryptojacking in IOT Devices, Richard Matthews
Cybersecurity Education for Non-Technical Learners, Matthew McNulty
Towards Identity Relationship Management For Internet of Things, Mohammad Muntasir Nur
Transfer-Learned Pruned Deep Convolutional Neural Networks for Efficient Plant Classification in Resource-Constrained Environments, Martinson Ofori
Block the Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul
Theses/Dissertations from 2020
Ednem: A Malware Detection Framework Based on Static and Dynamic Analysis, Jumani Blango
The Effectiveness of Transfer Learning Systems on Medical Images, James Boit
Mobile Identity, Credential, and Access Management Framework, Peggy Renee Carnley
Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie
Design Principles Influencing Secondary School Counselors' Satisfaction of a Decision-Support System, Kodey S. Crandall
A Framework for Identifying Host-based Artifacts in Dark Web Investigations, Arica Kulm
Digital Forensic Readiness: An Examination of Law Enforcement Agencies in the State of Maryland, James B. McNicholas III
IoT-HASS: A Framework For Protecting Smart Home Environment, Tarig Mudawi
A Virtual Machine Introspection Based Multi-Service, Multi-Architecture, High-Interaction Honeypot for IOT Devices, Cory A. Nance
BYOD-Insure: A Security Assessment Model for Enterprise BYOD, Melva Ratchford
Interactions in Visualizations to Support Knowledge Activation, Kari Sandouka
Faculty Perceptions of Open Educational Resources in Cyber Curriculum: A Pilot Study, Alan Stines
Theses/Dissertations from 2019
Advanced Code-reuse Attacks: A Novel Framework for JOP, Bramwell J. Brizendine
Employee Acceptance of Employer Control Over Personal Devices, Kevin Callies
Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr.
Malgazer: An Automated Malware Classifier With Running Window Entropy and Machine Learning, Keith Jones
Matching Possible Mitigations to Cyber Threats: A Document-Driven Decision Support Systems Approach, Martha Wagner McNeil
Self-Efficacy in Information Security: A Mixed Methods Study of Deaf End-Users, Kyle Murbach
Social Media Text Mining Framework for Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah
Information Security Awareness Programs in Congolese Organizations: Cultural Influence and Effective Use., Arnold Nzailu
Structured Sensemaking of Videographic Information within Dataphoric Space, Michael J. Pritchard
Evaluating the Impacts of Detecting X.509 Covert Channels, Cody Welu
Factors Influencing Curriculum Adoption in 2- and 4-year Undergraduate Cybersecurity Programs, Todd A. Whittaker
A Malware Analysis and Artifact Capture Tool, Dallas Wright
Theses/Dissertations from 2018
Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman
Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman
Hybrid Recommender for Online Petitions with Social Network and Psycholinguistic Features, Ahmed Elnoshokaty
A Holistic Methodology for Profiling Ransomware Through Endpoint Detection, Stefani K. Hobratsch
A Capability-Centric Approach to Cyber Risk Assessment and Mitigation, Thomas H. Llansó
The CybHER Program supported by CISSE Framework to Engage and Anchor Middle-school Girls in Cybersecurity, Pamela Rowland
The Study of Crowdsourcing in Knowledge Management: The Role of Employees' Innovative Behavior on Job Performance, Vetrivadivel Vel
Theses/Dissertations from 2017
Discovering Design Principles for Health Behavioral Change Support Systems: A Text Mining Approach, Mohammad Aref Abdel-Rahman