Follow

Dissertations

PDF

A Deep Learning Approach to Vulnerability Detection in Lifted Code Using Transformer-Based Embeddings, Gary McCully

PDF

Differential Privacy for Microdata Streams: Adversarial Approaches, Sean McElroy

PDF

Privacy Assessment Breakthrough: A Design Science Approach to Creating a Unified Methodology, Lisa McKee

PDF

Matching Possible Mitigations to Cyber Threats: A Document-Driven Decision Support Systems Approach, Martha Wagner McNeil

PDF

A Self-Regulated Learning Approach to Educational Recommender Design, Alicia McNett

PDF

Digital Forensic Readiness: An Examination of Law Enforcement Agencies in the State of Maryland, James B. McNicholas III

PDF

Cybersecurity Education for Non-Technical Learners, Matthew McNulty

PDF

CGFuzzerArt: A Directed Graybox Fuzzer for Vulnerability Discovery, Zishan Merza

PDF

Privacy and Security Concerns Associated with MHealth Technologies: A Social Media Mining Perspective, Damion Mitchell

PDF

Bone Surface Modification Dataset Synthesis for Computer Vision Models Using LoRA Tuned Latent Diffusion Models, Jason Mixon

PDF

Towards an Efficient Multi-Cloud Observability Framework of Containerized Microservices in Kubernetes Platform, Haytham Mohamed

PDF

Design of a Patient-Centered and Clincially Integrated Patient Decision Aid, Sergey Motorny

PDF

IoT-HASS: A Framework For Protecting Smart Home Environment, Tarig Mudawi

PDF

Self-Efficacy in Information Security: A Mixed Methods Study of Deaf End-Users, Kyle Murbach

PDF

The Impact of Organizational Culture on Artificial Intelligence (AI) and Organizational Performance: A Mixed Methods Approach, Wlifred C. Mutale

PDF

Automated Dynamic Policy Generation for Access Control in the Internet of Things, Kaushik Nagarajan Muthusamy Ragothaman

PDF

A Virtual Machine Introspection Based Multi-Service, Multi-Architecture, High-Interaction Honeypot for IOT Devices, Cory A. Nance

PDF

UAV Drone Security of Control for Increased Safety-of-flight, Daniel R. Nash

PDF

Social Media Text Mining Framework for Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah

PDF

Malware Classification Using Weighted Control Flow Graphs, Tjada Nelson

PDF

Leveraging Content, Context, and Social Attributes to Detect Malicious Short URLs in Online Social Network, Raj Kumar Nepali

PDF

Distributed Multi-component Approach and System for Enhanced Security of Public Infrastructure as a Service (IAAS) Cloud Computing Environments, Jason Nikolai

PDF

A Cross-Architecture Framework for Anti-Debugging Techniques, Austin Norby

PDF

Towards Identity Relationship Management For Internet of Things, Mohammad Muntasir Nur

PDF

Information Security Awareness Programs in Congolese Organizations: Cultural Influence and Effective Use., Arnold Nzailu

PDF

Transfer-Learned Pruned Deep Convolutional Neural Networks for Efficient Plant Classification in Resource-Constrained Environments, Martinson Ofori

PDF

A Dark Web Pharma Framework for A More Efficient Investigation of Dark Web COVID-19 Vaccine Products., Francisca Afua Opoku-Boateng

PDF

E-Democratic Government Success Framework for United States’ Municipalities, Glenn Papp Jr

PDF

Block the Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

PDF

E-Government Security in Municipal Government: A Case Study of Municipalities in Orange County, California, Timothy J. Perez

PDF

Identifying Optimal IT Portfolios to Promote Healthcare Quality, Kenneth Pinaire

PDF

An Innovative Approach to Information Technology Risk Assessment for Small and Medium Sized Financial Institutions, Ashley Leonora Podhradsky

PDF

Structured Sensemaking of Videographic Information within Dataphoric Space, Michael J. Pritchard

PDF

BYOD-Insure: A Security Assessment Model for Enterprise BYOD, Melva Ratchford

PDF

Measuring the Effectiveness of AppLocker Against Banking Trojans (A Multi-year Study), Robert Riskin

PDF

Divergent Detection: A Comprehensive Study of DGAS Using FNNS for Original, Noise-Modified, and Linear Recursive Sequences(LRS), Anthony Rizi

PDF

The CybHER Program supported by CISSE Framework to Engage and Anchor Middle-school Girls in Cybersecurity, Pamela Rowland

PDF

A Mixed Methods Comparative Analysis of Organizational Incident Response to SolarWinds and Log4Shell, Matthew Ryan

PDF

Interactions in Visualizations to Support Knowledge Activation, Kari Sandouka

PDF

Factors Influencing Blockchain Implementation in Supply Chain Management: An Exploratory Study, Aravindh Sekar

PDF

Weed Detection Using Lightweight Deep Learning Models with Transfer Learning and Hyperparameter Optimization, Ali Shaheen

PDF

Users' Continuance Participation in Online Health Communities: Short-term vs. Long-term, Yanyan Shang

PDF

Database Environmental Change Impact Prediction for Human-driven Tuning in Real-time (DECIPHER), Monish Sharma

PDF

Design and Development of Data Fusion-based Approach to Minimize the False Alarm Rate in ICU, Sarin Shrestha

PDF

SUTMS - Unified Threat Management Framework for Home Networks, Asif Siddiqui

PDF

Implementing a Zero Trust Architecture For ICS/SCADA Systems, Raven Sims

PDF

Multi-dimensional Security Integrity Analysis of Broad Market Internet-connected Cameras, Mark A. Stanislav

PDF

Defending the security of the mind: A mail survey of thought-reform literacy in South Dakota, Dustin Rozario Steinhagen

PDF

Faculty Perceptions of Open Educational Resources in Cyber Curriculum: A Pilot Study, Alan Stines

PDF

Bypassing Modern CPU Protections With Function-Oriented Programming, Logan Stratton

PDF

Binary Analysis Framework, Josh Stroschein

PDF

Bridging Cognitive Psychology and Natural Language Processing: A Bias-Detection Framework for Large Language Models, Stephen Surles

PDF

Towards Long-Term Impact of Deep Learning Systems in Medical Imaging, Kruttika Sutrave

PDF

Extracting Implicit Knowledge and Inter-relationships from Initial Public Offering (IPO) Prospectus for Pricing Prediction, Jie Tao

PDF

Advanced Data Analytics for Systematic Review Creation and Update, Prem Timsina

PDF

Improving Business Intelligence Design Process Using a Multi-perspective Inter-disciplinary Communication Approach, Michael Albert Tomasura

PDF

Employee and Employer Perceptions Regarding Cybersecurity Education During The Hiring Process, Jordan VanHoy

PDF

The Study of Crowdsourcing in Knowledge Management: The Role of Employees' Innovative Behavior on Job Performance, Vetrivadivel Vel

PDF

Static Binary Rewriting for ROP Gadget Removal, Hans Verhoeven

PDF

Talent Analytics: How Data Mining Can Improve Talent Assessment, Karen Vizecky

PDF

A False Sense of Security - Organizations Need a Paradigm Shift on Protecting Themselves against APTs, Srinivasulu R. Vuggumudi

PDF

Fake News Detection on the Web: A Deep Learning Based Approach, Piyush Vyas

PDF

CyberEducation-By-Design™: Developing A Framework for Cybersecurity Education at Secondary Education Institutions in Arizona, Paul Wagner

PDF

A Socio-technical Process Model for Improving the Requirements Analysis Phase of Socio-technical System, Abdullah Hamdi Saleh Wahbeh

PDF

Aligning IT Assets to Maximize Healthcare Organizational Performance, Paul Weist

PDF

Evaluating the Impacts of Detecting X.509 Covert Channels, Cody Welu

PDF

Alumni Perceptions of Cybersecurity Employment Preparation Using the NICE Framework, Tobi West

PDF

Factors Influencing Curriculum Adoption in 2- and 4-year Undergraduate Cybersecurity Programs, Todd A. Whittaker

PDF

Measuring the Performance Cost of Manual System Call Detections Via Process Instrumentation Callback (PIC), Jacob Williams

PDF

Social Networking and E-Learning: Determining Time and Satisfaction Derived Through Dual Use, Kevin Williams

PDF

Principles For the Design of Visual Progress Bars to Improve Motivation in Online Learning, Tania Shotts Williams

PDF

Evaluating the Impact of Electronic Health Records on Clinical Reasoning Performance Using Task-Technology Fit Theory, Matthew J. Wills

PDF

A Malware Analysis and Artifact Capture Tool, Dallas Wright

PDF

An Exploratory Analysis of the Impact of Internalization, Externalization, Socialization, and Exchange on Employee Learning, Adaptability, Job Satisfaction, and Intention to Stay, Zahid B. Zamir

PDF

An NLP-Based Knowledge Extraction Approach for IT Tech-Support/Helpdesk Transcripts, Gary Yu Zhao

PDF

Performance Measurement of BGP Extended with De-Facto Network Identification, Shawn Zwach

Honors

PDF

Honoring the Dead: Digitizing Abuse & Neglect at the Asylum for Insane Indians, Kennedi Ford

PDF

Investigating the kinetics of clay-catalyzed conversion of anthracene to prebiotically relevant 9,10-anthroquinone, Hope Juntunen

PDF

Math Anxiety in Education: Confident and Calming Classroom, Audrey Kosman

PDF

Simulations and Queueing Theory: The Effects of Randomly Bypassing Security, Emily Ortmann

PDF

Simulations and Queueing Theory: The Effects of Priority and VIP Thresholds, Laura Schuck

PDF

Assessment and verification of commercially available pressure cookers for laboratory sterilization, Vaille Alena Swenson

Theses

PDF

10g Grid Control for Enterprise Database Monitoring, Varghese Abraham

PDF

E-Classifieds, Srikanth Adabala

PDF

Implementation of RDBMS to National College of Information Technology Urbana, Ali Navid Akhtar

PDF

Customer Relationship Management for an Authorized Automobile Dealer, Hussein A. Al-Homery

PDF

Time Tracking System, Varun Ambati

PDF

RMP Capital Corp- an In-House IT Solution, Daren Ray Anderson

PDF

Citrix Solution for the Great Plains Corporate Accounting System for US Bioenergy Corporation, Nathan W. Anderson

PDF

Check Exception Automation (CEA) System, Aashima Arora

PDF

Automation of Graduate Program Plan of Study at DSU, Olusola Awonuga

PDF

Raising Information Security Awareness in Small Banks, Adekunle Richard Ayodele

PDF

Error Tracking System Using Remote Object, Omar F. Azad

PDF

Web-Based Order Placement System for Wholesale Distributor, Beth R. Azevedo

PDF

Issue Tracking System, Saravanan Babu

PDF

Dental Office XYZ Database, Emily Bartels

PDF

Njoy Co. Data Mart Project, Nadene J. Barthman

PDF

Intelligent Editor For Custom Scripting Language, Jonathan Bassett

PDF

New Age Health System Informational Website, Nathan R. Baumann

PDF

Understanding the Perspectives of Physicians and Healthcare Providers on I.T. Project Communications in a Critical Access Hospital, Andy Behrens