Follow

Theses/Dissertations from 2019

PDF

Knowing your bitcoin customer: A survey of bitcoin money laundering services and technical solutions for anti-money laundering compliance, Jesse Bryan Crawford

PDF

A case study involving creating and detecting steganographic images shared on social media sites, Lindsey Kathryn Trotter

Theses/Dissertations from 2018

PDF

A rotational moving target defense solution for web servers, Steffanie Bisinger

PDF

Virtual ICS test bed, Roxanne Brooks

PDF

Security awareness training in a corporate setting, Nichole Dugan

Theses/Dissertations from 2017

PDF

Markov Chain analysis of packet sequence for intrusion detection, Chad Bockholt

PDF

ISEConf: A management tool for the ISEAGE Environment to allow users to create a custom mock internet for testbed research, Jeffrey Lincoln Neel

PDF

Detecting drones using machine learning, Waylon Dustin Scheller

PDF

Leveraging bluetooth as a second factor in two-factor authentication, Cimone Le Wright-Hamor

Theses/Dissertations from 2016

PDF

A user driven cloud based multisystem malware detection system, Brian Steven Cain

PDF

Device fingerprinting identification and authentication: A two-fold use in multi-factor access control schemes, Paul Eugene Manning

PDF

Risk Management Framework 2.0, Brent F. Richey

PDF

Application of active device authentication mechanisms in the human-machine interface of SCADA networks, Matthew Jeffrey Schlue

PDF

Hackerville: A laboratory environment for security literacy, John Gerrit Van Roekel

PDF

On quantum computation capabilities in an information assurance context, Garrett Ridge Yord

Theses/Dissertations from 2015

PDF

3G UMTS man in the middle attacks and policy reform considerations, Jennifer Lynn Adesso

Theses/Dissertations from 2014

PDF

ADAPT: an anonymous, distributed, and active probing-based technique for detecting malicious fast-flux domains, Tsolmon Otgonbold

Theses/Dissertations from 2008

PDF

Intercept System to Edit, Control, and Analyze Packets (ISECAP), Grant Rogers Brinkmeyer

PDF

IseHarvest: TCP packet data re-assembler framework for network traffic content, Stephen Michael Eilers

PDF

Reference models for network trace anonymization, Shantanu Gattani

PDF

Cryptic Backup: a framework for automated compression, encryption, and backup of data, Christopher David Hoff

PDF

CONDENSER: A custom tool for capturing and summarizing network traffic for AVALANCHE and ISEAGE, Jason Charles Maughan

PDF

Visualization for network forensic analyses: extending the Forensic Log Investigator (FLI), Paul Michael Miller

PDF

A formal approach toward authenticated authorization without identification, Lucas D. Witt

Theses/Dissertations from 2007

PDF

Automation in digital photo management, Benjamin Arthur Brady

PDF

Restricting wireless network access within the classroom, Andrew Daniel Buschbom

PDF

The relative influence of information assurance mechanisms on content integrity in peer-to-peer networks: a field study, Steven Michael Collins

PDF

A novel approach to finding frequency patterns in noisy network traffic, Charles Anthony Hall

PDF

Security Integrated Messaging: a protocol for secure electronic mail, Andrew Todd Hoernecke

PDF

Customization and automation in the future of digital forensics: live OS forensics with FENIX (forensic examiner unix), Sean David Howard

PDF

DeepFreeze: a management interface for ISEAGE, Nathan Lyle Karstens

PDF

Detection of encrypted streams for egress monitoring, Paras Malhotra

PDF

Forensic Log Investigator (FLI): a log analysis and visualization tool, Thieu Van Tran Pham

PDF

An algebraic hash function based on SL2, Andrew Richard Regenscheid

PDF

The intrusion collector and emulator, Matthew Kyle Wilden

Theses/Dissertations from 2006

PDF

Online self reported information: Facebook, a hiring tool for businesses , Jason Decker

PDF

Advanced Packet Obfuscation and Control program (Apoc), Adam Lee Hahn

PDF

Intrusion detection systems in wireless ad-hoc networks: detecting worm attacks, Jacob Russell Lynch

PDF

Investigation of magnetic and magnetoelastic properties of novel materials involving cobalt ferrite and terbium silicon germanium systems, Andrew Phillip Ring

PDF

Using the singular value decomposition for image steganography , Daniel Wengerhoff

Theses/Dissertations from 2005

PDF

A basic framework and overview of a network-based RAID-like distributed back-up system : NetRAID, Christopher Allan Colvin

PDF

A basic framework and overview of a network-based RAID-like distributed back-up system: NetRAID, Christopher Allan Colvin

PDF

An evaluation of the Klimov-Shamir keystream generator, Timothy D. Dewey

PDF

Roaming user-based distributed firewalls, Andrew William Luse

PDF

Affecting IP traceback with recent Internet topology maps, Olawale Abiodun Martins

PDF

The smart growth preferences of members of the suburban development network in southeastern Dallas County, Iowa, John Paul McCurdy

PDF

Exploring three-dimensional visualization of intrusion detection system alerts and network statistics, Adam Ronald Oline

PDF

A modular architecture for security tools (MAST), Pascal Openshaw

PDF

Hiding out in plaintext: covert messaging with bitwise summations, Michael Charles Perkins

PDF

PIRANHA: an engine for a methodology of detecting covert communication via image-based steganography, Christopher Shaun Pilson

PDF

PeerCredential: a support reputation-based trust framework for peer-to-peer applications, William Donald Sears

Theses/Dissertations from 2004

PDF

A framework for network covert channel detection, Josiah Alexander Bradford Dykstra

PDF

Information sovereignty, Benjamin Peter Hagen

PDF

Mobile agents for intrusion detection in wireless ad-hoc networks, Ryan Dean Hammond

PDF

The Patriot Act: A security update for vulnerabilities, Lynette Hornung Kobes

PDF

Application of rough sets technique in resource selection problem, Qiang Meng

PDF

The design and development of SNIP: Simple Network Imitator Program, Brett Philip Myers

PDF

A method for classifying attack implementations based upon its primary objective, Luke Edward Ryon

Theses/Dissertations from 2003

PDF

Dynamic methodologies and the future of information assurance, Brian Patrick Bunnell

PDF

A systematic security analysis of the AODV protocol, Benjamin Robert Jones

PDF

Virtual money, virtual control?: electronic money, electronic cash and governance, Kathleen S. Lovett

PDF

A collusion attack on digital video watermarks based on the replacement strategy, Jonathan Malm

PDF

Wireless security for secure facilities, DeAntrious Mitchell

PDF

Assessment of HIPAA compliance: a comparison study of current implementations, Kurtis Alan Ness

Theses/Dissertations from 2002

PDF

Vulnerabilities of computer systems: a test of the VERDICT computer security taxonomy and its application to mobile ad hoc networks, Fouad A. Al-Kohlany

PDF

Enhancing wireless network security IEEE 802.1x, Haider Waheeb Qleibo