PROJECT TITLE | TECHNOLOGIES | STUDENT(S) |
Mitigating false positives: a comparative analysis of dynamic application security testing using supervised, unsupervised and deep learning approaches | | Abbotts, Amie |
Assessing WordPress Plugin Security: A Metric-Driven Approach | | Betso, Lubaba |
Parental monitoring apps: exploring privacy, security and ethical decision making. | | Gibbons, Denise |
OpenAI or Open-Source: A Cybersecurity Face-off of Proprietary vs. Open-Source Large Language Models (LLMs) | | Healy, Shane |
Integrating AI-Driven Anomaly Detection into ICT Frameworks: Enhancing Data Security and GDPR Compliance for Multinational Corporations in Ireland | | Jeerakun, Deekshant |
Identity and Access Management: Evaluating Blockchain-based Single Sign-on Systems in a Corporate Environment | | Kako, Olajuwon |
Designing a Framework and Implementation Strategy for Enhanced Cybersecurity Preparedness for Small and Medium-sized Enterprises (SMEs) in Ireland | | Makanjuola, Olakunle |
Evaluating CRYSTALS-Kyber: A Comprehensive Analysis of Post-Quantum Cryptography, Industry Readiness, and "Store Now, Decrypt Later" Threats. | | Mc Donnell, Alan |
Protecting Children in the Digital World: How Informed Are Irish Parents? | | Moreira, Adonis Tarcio |
Enterprise adoption challenges of biometrics authentication and authorization in Ireland | | Nistor, Marius Cristian |
Benchmarking the Future of Security: Performance Analysis of Post-Quantum Algorithms versus their Cryptographic Predecessors | | O Dowd, John |
Assessing the Relationship Between Digital Footprints and Identity Theft on Social Networks in Ireland | | O Ladele, Olayera |
A Comparative Analysis of the use of facial recognition technology by foreign state entities to evaluate the implication of use by the Irish state. | | O Neill, Owen |
Implementing Zero Trust Micro segmentation for Robust Security in Cloud Environment. | | Onifade, Olanrewaju |
What are the impacts of user-managed encryption on the security and confidentiality of data stored in cloud services? | | Quintal, Carlos |
Comparative Efficacy in AI-Driven Threat Intelligence | | Sanni, Iramofu |
Which systems architecture offers the best defence against penetration attacks: on-premise, on-cloud, or hybrid? | | Santana, Ronaldo |