Preventing Covid-19 from infecting your business' security |
Folder |
Video |
Presentation |
Evaluation of the cybersecurity maturity model certification |
Folder |
Video |
Presentation |
Application of Cyberspace Solarium Commission Recommendations |
Folder |
Video |
Presentation |
Data Breach Law |
Folder |
Video |
Presentation |
Cyber Crime Impact during a National Crisis |
Folder |
Video |
Presentation |
Symbiotic Autonomy Model (Project Guardian) |
Folder |
Video |
Presentation |
Lockheed Martin Cyber Kill Chain |
Folder |
Video |
Presentation |
Broadband Access in Public Education Systems |
Folder |
Video |
Presentation |
Data Visualization for Network Security (BARK) |
Folder |
Video |
Presentation |
Rapid and Remote Deauthentication Drone (R2D2) |
Folder |
Video |
Presentation |
Caught in the Geo Fence |
Folder |
Video |
Presentation |
Computer Vision Aided Drone Application for Unit Level Movements |
Folder |
Video |
Presentation |
Drone Application to Ultimate Tag |
Folder |
Video |
Presentation |
Analysis of Social Media Techniques Used To Manipulate 2020 Election |
Folder |
Video |
Presentation |
Machine learning vulnerability prioritization |
Folder |
Video |
Presentation |
Student Security Awareness |
Folder |
Video |
Presentation |
Between a Rock & a Hard Trace: COVID-19 Contact Tracing App Vulnerabilities |
Folder |
Video |
Presentation |
SPAM Scan Capstone: Flagging Deceptive Media |
Folder |
Video |
Presentation |
Supply Chain Analysis for a Customer |
Folder |
Video |
Presentation |
Developing an Application Safe from Vulnerabilities |
Folder |
Video |
Presentation |
Analysis Of SSD Firmware Using Reverse Engineering |
Folder |
Video |
Presentation |
Evading Facial Recognition |
Folder |
Video |
Presentation |
Human Factors in China's Undeclared War on the American Private Sector |
Folder |
Video |
Presentation |
Section 230 of the Communications Decency Act |
Folder |
Video |
Presentation |
BLACKLEOPARD: An Approach to Remote DMA |
Folder |
Video |
Presentation |
Combating Bia in Machine Learning Algorithms |
Folder |
Video |
Presentation |
Drone Silencer |
Folder |
Video |
Presentation |
Drone Applied Cardio E-Sports |
Folder |
Video |
Presentation |
Spoofing Contract Tracing Apps via Bluetooth |
Folder |
Video |
Presentation |
Tailgating and Social Engineering |
Folder |
Video |
Presentation |