Pattern-of-life Analysis and Deviations for Bluetooth and Bluetooth Low Energy Devices |
Folder |
Presentation |
Automated Static Binary Analysis with Multi-Label Classification |
Folder |
Presentation |
Vulnerability Analysis of Modern Satellite Design (awaiting feedback from customer) |
Folder |
Presentation |
Variable IOT Interaction Tool |
Folder |
Presentation |
USNA ICS Cybersecurity (not linked per customer) |
Folder |
Presentation |
Twitter’s Effect on the US Stock Market and Illegal Price Manipulation of Cryptocurrency |
Folder |
Presentation |
Tracking Pyongyang |
Folder |
Presentation |
The Visualization of Ransomware |
Folder |
Presentation |
The Rise of Ransomware: Utilizing Emerging Capabilities to Accomplish Known Endstates |
Folder |
Presentation |
The Impact of Relative Authority On Phishing Emails |
Folder |
Presentation |
Social Engineering Template Analysis |
Folder |
Presentation |
Side-Channel Analysis Applications in Zero-Trust Cybersecurity |
Folder |
Presentation |
Red Team Handbook for Chinese Cyber Operations |
Folder |
Presentation |
Pattern-of-life Analysis and Deviations for Bluetooth and Bluetooth Low Energy Devices |
Folder |
Presentation |
Near Field Communication (NFC) Vulnerabilities |
Folder |
Presentation |
Mapping the Military's Cyber Pipelines |
Folder |
Presentation |
Mapping the Cyber Training Pipeline |
Folder |
Presentation |
Liaison of Public-Private Partnerships - Financial (LPPP-F) Model |
Folder |
Presentation |
Implementing Augmented Reality in the Modern Battlefield |
Folder |
Presentation |
Domestic Terrorist Outlinking from Twitter |
Folder |
Presentation |
Cybersecurity Awareness Among Midshipmen at the United States Naval Academy |
Folder |
Presentation |
Cyber Warfare Training Platform |
Folder |
Presentation |
Cyber Network Awareness |
Folder |
Presentation |
Comparing Twitter Sentiment and COVID-19 Vaccination |
Folder |
Presentation |
Can Race and Socioeconomic Status Make you More Vulnerable to Social Engineering Attacks? |
Folder |
Presentation |
Automated Static Binary Analysis with Multi-Label Classification |
Folder |
Presentation |
Application of Blockchain Technology for Electronic Voting |
Folder |
Presentation |
Analysis of the Cyber Operations Major at USNA |
Folder |
Presentation |
Alexa, Execute the Dolphin Attack |
Folder |
Presentation |
A Comprehensive Guide on Establishing a NATO Cybersecurity Standard |
Folder |
Presentation |