| PROJECT TITLE |
TECHNOLOGIES |
STUDENT(S) |
| Using modern NLP algorithms to extract patterns and insights from phishing landing webpages and help develop more efficient identification strategies. |
Python, TypeScript, NLP, spaCy |
Julien Blanchard |
| Evaluating LLM-assisted vs traditional smart contract vulnerability workflows |
Python, Solidity, Slither, Mythril, Foundry, Docker, GitHub Models, GitHub Actions, and YAML-configured experiment pipelines. |
Hrvoje Vujcec |
| Detecting Data Exfiltration from BYOD and IoT Devices in Enterprise Networks Using Supervised Learning on Network Flow Metadata |
Network Flow Metadata(NetFlow), Python, scikit-learn |
Kai Chong Chio |
| How can Cyber Threat Intelligence Address 'Harvest Now, Decrypt Later' Risk in Financial Services? |
MISP, OpenCTI, Anomali |
Declan Clune |
| Design and Evaluation of a Maturity Model for Automated Phishing Incident Response in Corporate Digital Channels |
|
Eduard Fernando Cuadros |
| Assessing the Applicability and Limitations of Real-Time Vulnerability Detection in APIs |
|
Ayoola Dogo |
| The Psychological Factors Behind Phishing Attacks |
Phishing Quiz - Google, Microsoft Forms, Excel, Qualtrics |
Mark Doyle |
| The use of AI in Ethical Hacking:A Comparative Study of Ethical Boundaries in LLMs & AI Agents based on OWASP Top 10 |
|
Karen Farrell |
| Evalutaing the ability of AI to act as an abstraction layer in the creation of threat detection rules using quantative experimentation |
Wazuh, Opensearch, LLM, Atomic Red Team, Python |
Oisin Hickey |
| DESIGN AND EVALUATION OF A LIGHTWEIGHT ADAPTIVE ENCRYPTION FRAMEWORK FOR ESP32-BASED IOT CYBER-PHYSICAL SYSTEMS |
|
Mateusz Jakusz |
| Explainable AI for Concept Drift Detection in Intrusion Detection Systems |
Python, Scikit-learn, PyTorch, SHAP, Integrated Gradients |
Karim Khidr |
| Is home based IoT Prevalence an untapped hacking attack surface? A threat modelling study. |
MITRE ATT&CK |
Stephen Leahy |
| Regulating Third-Party Cyber Risk in Financial Services: Practitioner Perspectives on DORA in the UK and US Regulatory Context |
Qualitative and quantitative research implemented using Qualtrics |
Elaine Mc Connell |
| Is the Cost of Performing Vulnerability Scanning a Step Too Far for On-Premises SMEs? |
|
Sailaja Mohanty |
| Security Vulnerabilities in Infrastructure as Code: ACritical Analysis of Detection and Prevention Mechanisms in Terraform and AWS CDK |
|
Juber Nunes |
| Evaluating the Effectiveness of Automated Security Scanning Tools in CI/CD Pipelines |
Jenkins, Snyk, OWASP Zap, sonarqube |
Angad Singh |
| Has Mandatory Cybersecurity Training Improved Field IT Practices in Multinational Datacenters, and Can Scenario-Based Training Enhance It Further? |
|
Martin Smyth |
| AI-Enhanced Fraud as a Service: Expansion Mechanisms and Defensive Countermeasures |
Kali,DeepPavlov,Perplexity,GPT-5.2,Gemimni 3 pro, Grok 4.1, Claude Sonnet 4.6, DeepPavlov |
Gavin Soady |
| Securing the Future of Finance: Integrating ISO 27001 and FAIR into Real-World Asset Tokenisation for Enhanced Operational Resilience |
Next.js, NestJS, Solidity, Foundry |
Paul Willock |
| Performance, Usability, and Deployment Trade-offs Between Kyber and RSA: An Analysis of Post-Quantum and Classical Cryptographic Mechanisms in Practical Systems |
PQC Kyber, Python,AWS sagework, OpenSSL TLS, Standard RSA |
Muhammad Bilal Zahid |
| Assessing WordPress Plugin Security: Common Vulnerabilities, Security-Readiness Measurement, and a Prototype Vulnerability Detection Tool. Subject to change. |
WSL, Python, WordPress, Ngrok |
Lubaba Betso |
| Sharenting in Ireland: An Empirical Study of Parental Awareness and Children's Digital Risk |
|
Denise Gibbons |
| Assessing the Anonymity Paradox: An Evaluation of Browser Fingerprint Uniqueness Across Privacy Configurations |
|
Daniel Boyce |
| An Exploratory Study of the Feasibility of Adapting the UK Cyber Essentials Plus Scheme for Irish SMEs |
|
Arulmurugan Kalaiarasan |
| How do Cognitive Biases and Stress-Related Decision-Making Influence the Effectiveness of Cybersecurity Incident Response Across Diverse Human Responder Roles |
|
Michael Buston |
| THE MEASUREMENT OF THE COMPLETENESS OF MOBILE APPLICATION PRIVACY POLICIES IN THE GOOGLE PLAYSTORE USING A MANUAL RANDOM SAMPLING APPROACH |
|
Luke Raeside |
| DETECTION OF DDOS ATTACK TYPES IN CLOUD COMPUTING USING MACHINE LEARNING |
|
Asmaa Salaheldeen Salih Edress |
| From Legacy HMI over RDP to Thin Client Manager in Pharmaceutical OT: Risks, Network Segregation, Access Control, and Day-to-Day Support |
|
Rafal Rybarski |
| AUTOMATING IoT THREAT: A FRAMEWORK FOR RAPID DETECTION AND INCIDENT RESPONSE. |
|
Chioma Okoye |
| Evaluating Open-Source XDR and SOAR for APT Detection and Response in Hybrid Cloud |
|
Joe O Shea |
| EVALUATING AI/ML TECHNIQUES TO REDUCE FALSE-POSITIVES IN SIEM PLATFORMS FOR RESOURCE-CONSTRAINED ENVIRONMENTS WITHOUT IMPACTING DETECTION ACCURACY AND OPERATING PERFORMANCE |
|
Amit Bora |
| EXPLORING FACEBOOK'S ROLE IN CYBERCRIMES: PLATFORM FEATURES, TRUST SIGNALS AND REGULATORY GAPS IN IRELAND |
|
Julio Cesar Santana |
| AUTOMATING MALWARE DETECTION: A DATA-DRIVEN APPROACH TO GENERATING HIGH-FIDELITY SIGMA RULES FOR EMERGING THREATS |
Sigma, Wazuh, Flare, Sysinternals/Sysmon, REMnux |
David Antonio Martin Escar |
| A QUANTITATIVE FRAMEWORK FOR ASSESSING THE TRUSTWORTHINESS OF CYBER THREAT INTELLIGENCE FEEDS |
|
Olajuwon Bello |
| Evaluation of current threat vectors posed by prompt injection against contemporary Large Language Models (LLMs), while considering damage of attacks, and effective mitigation strategies |
|
Christopher Boylan |
| Assessment of preparation levels for NIS2 implementation within SME businesses in Ireland |
|
Michael Grace |
| A CVE-Driven Study Of OTA Firmware Vulnerabilities In IoT Devices |
|
Thohiru Omoloye |
| Performance and Operability of Post Quantum Cryptography Algorithms on Resource Constrained End Point Devices |
|
Liam Halliden |