MASTERS IN CYBER SECURITY, PRIVACY AND TRUST - 2026

PROJECT TITLE TECHNOLOGIES STUDENT(S)
Using modern NLP algorithms to extract patterns and insights from phishing landing webpages and help develop more efficient identification strategies. Python, TypeScript, NLP, spaCy Julien Blanchard
Evaluating LLM-assisted vs traditional smart contract vulnerability workflows Python, Solidity, Slither, Mythril, Foundry, Docker, GitHub Models, GitHub Actions, and YAML-configured experiment pipelines. Hrvoje Vujcec
Detecting Data Exfiltration from BYOD and IoT Devices in Enterprise Networks Using Supervised Learning on Network Flow Metadata Network Flow Metadata(NetFlow), Python, scikit-learn Kai Chong Chio
How can Cyber Threat Intelligence Address 'Harvest Now, Decrypt Later' Risk in Financial Services? MISP, OpenCTI, Anomali Declan Clune
Design and Evaluation of a Maturity Model for Automated Phishing Incident Response in Corporate Digital Channels Eduard Fernando Cuadros
Assessing the Applicability and Limitations of Real-Time Vulnerability Detection in APIs Ayoola Dogo
The Psychological Factors Behind Phishing Attacks Phishing Quiz - Google, Microsoft Forms, Excel, Qualtrics Mark Doyle
The use of AI in Ethical Hacking:A Comparative Study of Ethical Boundaries in LLMs & AI Agents based on OWASP Top 10 Karen Farrell
Evalutaing the ability of AI to act as an abstraction layer in the creation of threat detection rules using quantative experimentation Wazuh, Opensearch, LLM, Atomic Red Team, Python Oisin Hickey
DESIGN AND EVALUATION OF A LIGHTWEIGHT ADAPTIVE ENCRYPTION FRAMEWORK FOR ESP32-BASED IOT CYBER-PHYSICAL SYSTEMS Mateusz Jakusz
Explainable AI for Concept Drift Detection in Intrusion Detection Systems Python, Scikit-learn, PyTorch, SHAP, Integrated Gradients Karim Khidr
Is home based IoT Prevalence an untapped hacking attack surface? A threat modelling study. MITRE ATT&CK Stephen Leahy
Regulating Third-Party Cyber Risk in Financial Services: Practitioner Perspectives on DORA in the UK and US Regulatory Context The survey instrument was designed and distributed using Qualtrics allowing structured questionnaire development, response validation, randomised selections and controlled data collection.Data collected was exported to Microsoft Excel for cleaning, categorisation, and descriptive statistical analysis.Regulatory analysis is supported through review of publicly available documentation relating to the Digital Operational Resilience Act (DORA), together with relevant UK and US financial regulatory publications. Elaine Mc Connell
Is the Cost of Performing Vulnerability Scanning a Step Too Far for On-Premises SMEs? Sailaja Mohanty
Security Vulnerabilities in Infrastructure as Code: ACritical Analysis of Detection and Prevention Mechanisms in Terraform and AWS CDK Juber Nunes
Evaluating the Effectiveness ofAutomated Security Scanning Tools in CI/CDPipelines Angad Singh
Has Mandatory Cybersecurity Training Improved Field IT Practices in Multinational Datacenters, and Can Scenario-Based Training Enhance It Further? Martin Smyth
AI-Enhanced Fraud as a Service: Expansion Mechanisms and DefensiveCountermeasures Kali,DeepPavlov,Perplexity,GPT-5.2,Gemimni 3 pro, Grok 4.1, Claude Sonnet 4.6, DeepPavlov Gavin Soady
Securing the Future of Finance: Integrating ISO 27001 and FAIR into Real-World Asset Tokenisation for Enhanced Operational Resilience Next.js, NestJS, Solidity, Foundry Paul Willock
Performance, Usability, and Deployment Trade-offs Between Kyber and RSA: An Analysis of Post-Quantum and Classical Cryptographic Mechanisms in Practical Systems PQC Kyber, Python,AWS sagework, OpenSSL TLS, Standard RSA Muhammad Bilal Zahid
Assessing WordPress Plugin Security: Common Vulnerabilities, Security-Readiness Measurement, and a Prototype Vulnerability Detection Tool. Subject to change. WSL, Python, WordPress, Ngrok Lubaba Betso
Sharenting in Ireland: An Empirical Study of Parental Awareness and Children's Digital Risk Denise Gibbons
Assessing the Anonymity Paradox: An Evaluation of Browser Fingerprint Uniqueness Across Privacy Configurations Daniel Boyce
An Exploratory Study of the Feasibility of Adapting the UK Cyber Essentials Plus Scheme for Irish SMEs Arulmurugan Kalaiarasan
How do Cognitive Biases and Stress-Related Decision-Making Influence the Effectiveness of Cybersecurity Incident Response Across Diverse Human Responder Roles Michael Buston
THE MEASUREMENT OF THE COMPLETENESS OF MOBILE APPLICATION PRIVACY POLICIES IN THE GOOGLE PLAYSTORE USING A MANUAL RANDOM SAMPLING APPROACH Luke Raeside
DETECTION OF DDOS ATTACK TYPES IN CLOUD COMPUTING USING MACHINE LEARNING Asmaa Salaheldeen Salih Edress
From Legacy HMI over RDP to Thin Client Manager in Pharmaceutical OT: Risks, Network Segregation, Access Control, and Day-to-Day Support Rafal Rybarski
AUTOMATING IoT THREAT: A FRAMEWORK FOR RAPID DETECTION AND INCIDENT RESPONSE. Chioma Okoye
Evaluating Open-Source XDR and SOAR for APT Detection and Response in Hybrid Cloud Joe O Shea
EVALUATING AI/ML TECHNIQUES TO REDUCE FALSE-POSITIVES IN SIEM PLATFORMS FOR RESOURCE-CONSTRAINED ENVIRONMENTS WITHOUT IMPACTING DETECTION ACCURACY AND OPERATING PERFORMANCE Amit Bora
EXPLORING FACEBOOK'S ROLE IN CYBERCRIMES: PLATFORM FEATURES, TRUST SIGNALS AND REGULATORY GAPS IN IRELAND Julio Cesar Santana
AUTOMATING MALWARE DETECTION: A DATA-DRIVEN APPROACH TO GENERATING HIGH-FIDELITY YARA AND SIGMA RULES FOR EMERGING THREATS David Antonio Martin Escar
A QUANTITATIVE FRAMEWORK FOR ASSESSING THE TRUSTWORTHINESS OF CYBER THREAT INTELLIGENCE FEEDS Olajuwon Bello
Evaluation of current threat vectors posed by prompt injection against contemporary Large Language Models (LLMs), while considering damage of attacks, and effective mitigation strategies Christopher Boylan
Assessment of preparation levels for NIS2 implementation within SME businesses in Ireland Michael Grace
A CVE-Driven Study Of OTA Firmware Vulnerabilities In IoT Devices Thohiru Omoloye
Performance and Operability of Post Quantum Cryptography Algorithms on Resource Constrained End Point Devices Liam Halliden