2022 |
Ahmed Alhazami, Ph.D., |
Ph.D. |
TJ OConnor |
Preserving Users’ Privacy in IoT Systems Through Network-based Access Control |
2022 |
Stian Olsen |
M.S. |
TJ OConnor |
|
2022 |
Carl Mann |
B.S. |
TJ OConnor |
|
2022 |
Tiffanie Petersen |
B.S. |
TJ OConnor |
|
2022 |
Isaiah Thomas |
B.S |
TJ OConnor |
|
2022 |
Paloma Vela Achu |
M.S. |
Michael King |
Cross-Gender and 1-to-N Face Recognition Error Analysis of Gender Misclassified Images |
2021 |
Jonathan Dejesus Torres |
M.S |
Michael King |
|
2021 |
Brandon Ledford, M.S. |
M.S. |
Michael King |
An Assessment of Image-Cloaking Techniques Against Automated Face Recognition for Biometric Privacy |
2021 |
Innocente Gbekevi |
M.S. |
Michael King |
|
2021 |
Dan Campos |
M.S. |
TJ OConnor |
Ground Truth: Towards Labeling On-Demand IoT Traffic |
2021 |
Krishnapriya Kokkatal Sugathan |
Ph.D |
Michael King |
Characterizing the Demographic Effects Relative to Race, Gender, and Skin Tone on the Accuracy of Deep Convolutional Neural Network Based Face Recognition Systems |
2021 |
Aishwarya Adikesaval |
M.S. |
Michael King |
|
2020 |
Kay Michel |
Ph.D |
Michael King |
A Bio-inspired Classification System for Cyber-Physical-Human Identity Resolution |
2020 |
Blake Janes |
B.S. |
TJ OConnor |
|
2020 |
Rosalin Dash |
M.S. |
Michael King |
Biometric Face Skintone Data Augmentation Using A Generative Adversarial Network |
2020 |
Dmitri Piquero |
M.S. |
Michael King |
|
2020 |
Kleanthis Zisis Tegos |
M.S. |
Thomas Eskridge |
Real-Time Action Classification using Intermediate Skeletal Pose Estimation |
2019 |
Giordano Benitez Torres |
M.S. |
Michael King |
|
2019 |
Katarina Borovina |
M.S. |
Michael King |
|
2018 |
Basman M H Alhafidh |
Ph.D. |
William Allen |
Design and Simulation of an Intelligent Self-Adaptive System for a Smart Home |
2018 |
Fitzroy Nembhard |
Ph.D. |
Marco Carvalho |
A Recommender System for Improving Program Security Through Source Code Mining and Knowledge Extraction |
2018 |
Mohammed J. Aljebreen |
Ph.D. |
William Allen |
Towards Intelligent Intrusion Detection Systems for Cloud Computing |
2018 |
Prasad Garapti |
M.S. |
Michael King |
Development of Portable Embedded Face Recognition Prototype |
2018 |
Atefeh Mahdavi |
M.S. |
Marco Carvalho |
Distributed Coordination for Autonomous Guided Vehicles in Multi-agent Systems with Shared Resources |
2018 |
Daljeet K Kaushal |
M.S. |
Thomas Eskridge |
A development environment to integrate big data with deep learning |
2018 |
Dhanish Mehta |
M.S. |
Marco Carvalho |
On the Automation of Cyber Experimentation |
2018 |
Tyler C Culp |
M.S. |
Thomas Eskridge |
Infrastructure-based Access Policy Enforcement using Software-Defined Networks |
2018 |
Vineet H Palan |
M.S. |
Marco Carvalho |
A Novel Approach to Containerize Existing Applications |
2017 |
Jigarkumar J Rathod |
M.S. |
Marco Carvalho |
Effects of Virtualization in Database Benchmarking |
2017 |
Nima Aghli |
M.S. |
Marco Carvalho |
A Reinforcement Learning Approach to Autonomous Speed Control in Robotic Systems |
2017 |
Samir Mammadov |
M.S. |
Marco Carvalho |
High Fidelity Adaptive Cyber Emulation |
2017 |
Tapas Joshi |
M.S. |
Marco Carvalho |
A Mixed-Reality Approach for Cyber-situation Awareness |
2016 |
Bereket M Hambebo |
Ph.D. |
Marco Carvalho |
Distributed Spectrum Management for OFDMA Cellular Networks |
2016 |
Mazin H Al-Shuaili |
Ph.D. |
Marco Carvalho |
Personal Identity Matching |
2016 |
Nasser S Alamri |
Ph.D. |
William Allen |
Improving File-Type Classification by Enhancing Feature Selection |
2016 |
Rushil Patel |
M.S. |
Marco Carvalho |
A Container-based Approach to Cyber Resilience |
2015 |
Yasser Hausawi |
Ph.D. |
William Allen |
Towards a Usable-Security Engineering Framework for Enhancing Software Development |
2015 |
Evan L Stoner |
M.S. |
Marco Carvalho |
A Foundation for Cyber Experimentation |
2013 |
Ahmed Al-hamadani |
M.S. |
William Allen |
Mitigating the Effects of Selfish Behavior in Mobile Ad Hoc Networks Using Reputation-Aware Routing |
2010 |
Abdulaziz Alkussayer |
Ph.D. |
William Allen |
Towards a Secure Software Development Framework Based on an Integrated Engineering Process |
2009 |
Samuel Oswald |
M.S. |
William Allen |
A State-Machine-Based Attack Description Language for the Evaluation of Intrusion Detection Systems |
2005 |
Helayne Ray |
Ph.D. |
William Allen |
A Complexity Metric for Binary Reverse Engineering |
2005 |
Tauhida Parveen |
M.S. |
William Allen |
Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls |
2004 |
Chin Dou |
M.S. |
William Allen |
A Model-based Approach to Security Testing of Network Protocol Implementations |