Current Students: Click here to submit your submit your masters thesis. If you have questions about your submission please contact the repository administrators.

Follow

Theses from 2024

PDF

Practical static binary instrumentation attacks against binary stylometry, Justin Lee Carpenter

Theses from 2023

PDF

Enabling security analysis and education of the Ethereum platform: A network traffic dissection tool, Joshua Mason Kemp

Theses from 2022

PDF

Two studies on binary program stylometry: A white-box analysis and a deep learning analysis on some crypto ransomware, Alexander Mitchell

Theses from 2021

PDF

Heuristically secure threshold lattice-based cryptography schemes, James D. Dalton

PDF

RedAI: A machine learning approach to cyber threat intelligence, Luke Noel

Theses from 2020

PDF

Mitigating real-time relay phishing attacks against mobile push notification based two-factor authentication systems, Casey Silver

PDF

A multi-input deep learning model for C/C++ source code attribution, Richard J. Tindell II

PDF

Improving a wireless localization system via machine learning techniques and security protocols, Zachary Yorio

Theses/Dissertations from 2019

PDF

Intrusion-tolerant Order-preserving Encryption, John Huson

Theses/Dissertations from 2018

PDF

Security attacks on RECKLESS-APPs: "Remote car keyless applications" for new semi autonomous vehicles, Mohamed El-Tawab

Theses/Dissertations from 2016

PDF

Improving the security of wireless sensor networks, Mauricio Tellez Nava

Theses/Dissertations from 2015

PDF

Analysis of real-world passwords for social media sites, Mark J. Quinn

Theses/Dissertations from 2014

PDF

Automated snort signature generation, Brandon Rice

Theses/Dissertations from 2013

PDF

Electronic voting: Methods and protocols, Christopher Andrew Collord

PDF

Class control: An adaptable and self configuring classroom control system, Thomas Grimes

PDF

Data carving parser generation, Benjamin Nathaniel Kelley

PDF

Fingerprint fuzzy vault: Security analysis and a new scheme, Patrick J.B. Perry

Theses/Dissertations from 2012

PDF

Forensic analysis of linux physical memory: Extraction and resumption of running processes., Ernest D. Mougoue

PDF

Identity management in a public IaaS Cloud, William T. Skinner III

PDF

Methodology and automated metadata extraction from multiple volume shadow copies, Henri Michael van Goethem

Theses/Dissertations from 2011

PDF

Impediment sensitive-role based access control, Joseph Frederick Blumberg

Theses/Dissertations from 2010

PDF

Security analysis of a fingerprint-secured USB drive, Benjamin David Rodes

PDF

Improving the measurement of system time on remote hosts, Michael Christopher Smith