Current Students: Click here to submit your submit your masters thesis. If you have questions about your submission please contact the repository administrators.
Theses from 2024
Practical static binary instrumentation attacks against binary stylometry, Justin Lee Carpenter
Theses from 2023
Enabling security analysis and education of the Ethereum platform: A network traffic dissection tool, Joshua Mason Kemp
Theses from 2022
Two studies on binary program stylometry: A white-box analysis and a deep learning analysis on some crypto ransomware, Alexander Mitchell
Theses from 2021
Heuristically secure threshold lattice-based cryptography schemes, James D. Dalton
RedAI: A machine learning approach to cyber threat intelligence, Luke Noel
Theses from 2020
Mitigating real-time relay phishing attacks against mobile push notification based two-factor authentication systems, Casey Silver
A multi-input deep learning model for C/C++ source code attribution, Richard J. Tindell II
Improving a wireless localization system via machine learning techniques and security protocols, Zachary Yorio
Theses/Dissertations from 2019
Intrusion-tolerant Order-preserving Encryption, John Huson
Theses/Dissertations from 2018
Security attacks on RECKLESS-APPs: "Remote car keyless applications" for new semi autonomous vehicles, Mohamed El-Tawab
Theses/Dissertations from 2016
Improving the security of wireless sensor networks, Mauricio Tellez Nava
Theses/Dissertations from 2015
Analysis of real-world passwords for social media sites, Mark J. Quinn
Theses/Dissertations from 2014
Automated snort signature generation, Brandon Rice
Theses/Dissertations from 2013
Electronic voting: Methods and protocols, Christopher Andrew Collord
Class control: An adaptable and self configuring classroom control system, Thomas Grimes
Data carving parser generation, Benjamin Nathaniel Kelley
Fingerprint fuzzy vault: Security analysis and a new scheme, Patrick J.B. Perry
Theses/Dissertations from 2012
Forensic analysis of linux physical memory: Extraction and resumption of running processes., Ernest D. Mougoue
Identity management in a public IaaS Cloud, William T. Skinner III
Methodology and automated metadata extraction from multiple volume shadow copies, Henri Michael van Goethem
Theses/Dissertations from 2011
Impediment sensitive-role based access control, Joseph Frederick Blumberg
Theses/Dissertations from 2010
Security analysis of a fingerprint-secured USB drive, Benjamin David Rodes
Improving the measurement of system time on remote hosts, Michael Christopher Smith