Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for financial gain. The resulting loss of revenue and reputation can have deleterious effects on governments and businesses alike. Signature recognition and anomaly detection are the most common security detection techniques in use today. These techniques provide a strong defense. However, they fall short of detecting complicated or sophisticated attacks. Recent literature suggests using security analytics to differentiate between normal and malicious user activities. The goal of this research is to develop a repeatable process to detect cyber attacks that is fast, accurate, comprehensive, and scalable. A model was developed and evaluated using se...
With the rate at which malware spreads in the modern age, it is extremely important that cyber secur...
Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the ...
This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a sma...
When a cyber security event occurs, a person has to answer the following questions: what events are ...
Before cyber-crime can happen, attackers must research the targeted organization to collect vital in...
When designing and implementing a new system, one of the most common misuse cases a system administr...
This project examines the protection methods suggested by hackers to guard against online victimizat...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
The Cyber Innovation Lab brings with it the understanding and collection of the threats, vulnerabili...
This culminating experience project conducted a Systematic Literature Review of ransomware in the he...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it h...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
With the rate at which malware spreads in the modern age, it is extremely important that cyber secur...
Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the ...
This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a sma...
When a cyber security event occurs, a person has to answer the following questions: what events are ...
Before cyber-crime can happen, attackers must research the targeted organization to collect vital in...
When designing and implementing a new system, one of the most common misuse cases a system administr...
This project examines the protection methods suggested by hackers to guard against online victimizat...
The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deter...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
The Cyber Innovation Lab brings with it the understanding and collection of the threats, vulnerabili...
This culminating experience project conducted a Systematic Literature Review of ransomware in the he...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it h...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
With the rate at which malware spreads in the modern age, it is extremely important that cyber secur...
Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the ...
This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a sma...