2020 Capstone Projects
Analyzing Video for Intel Assessments | Folder | Video | Presentation |
Red Teaming USNA CAC Readers | Folder | Video | Presentation |
Appeasement in Cyberspace | Folder | Video | Presentation |
Automobile Fingerprinting and Identification | Folder | Video | Presentation |
Decentralized Web Application for Blockchain Data Logging | Folder | Video | Presentation |
Electronic Voting | Folder | Video | Presentation |
Exploitation of ADS-B | Folder | Video | Presentation |
Factors that Impact a Software Developer | Folder | Video | Presentation |
Intentionally Fingerprintable Websites Within TOR | Folder | Video | Presentation |
IoT Risk Perception Among Military Families | Folder | Video | Presentation |
Measuring Illusory Superiority Bias In Resilience to Phishing | Folder | Video | Presentation |
Mobile Orienteering Platform | Folder | Video | Presentation |
Navy Trash Becomes Enemy Treasure | Folder | Video | Presentation |
Non Lethal Drone Countermeasures | Folder | Video | Presentation |
Pluggable Transports in TOR | Folder | Video | Presentation |
Red Teaming a TAK Server | Folder | Video | Presentation |
Security Risk of Using Huawei Technology | Folder | Video | Presentation |
Set Drones to Stun: Using Unmanned Aerial Systems to Disrupt Active Shooters | Folder | Video | Presentation |
Special Agent Alexa: Unintentional Recording and Eavesdropping Vulnerabilities and Applications of Amazon Echo Devices | Folder | Video | Presentation |
Tweet Authorship Attribution | Folder | Audio | Presentation |
