MASTERS IN CYBER SECURITY, PRIVACY AND TRUST

PROJECT TITLE TECHNOLOGIES STUDENT(S)
Mitigating false positives: a comparative analysis of dynamic application security testing using supervised, unsupervised and deep learning approaches Abbotts, Amie
Assessing WordPress Plugin Security: A Metric-Driven Approach Betso, Lubaba
Parental monitoring apps: exploring privacy, security and ethical decision making. Gibbons, Denise
OpenAI or Open-Source: A Cybersecurity Face-off of Proprietary vs. Open-Source Large Language Models (LLMs) Healy, Shane
Integrating AI-Driven Anomaly Detection into ICT Frameworks: Enhancing Data Security and GDPR Compliance for Multinational Corporations in Ireland Jeerakun, Deekshant
Identity and Access Management: Evaluating Blockchain-based Single Sign-on Systems in a Corporate Environment Kako, Olajuwon
Designing a Framework and Implementation Strategy for Enhanced Cybersecurity Preparedness for Small and Medium-sized Enterprises (SMEs) in Ireland Makanjuola, Olakunle
Evaluating CRYSTALS-Kyber: A Comprehensive Analysis of Post-Quantum Cryptography, Industry Readiness, and "Store Now, Decrypt Later" Threats. Mc Donnell, Alan
Protecting Children in the Digital World: How Informed Are Irish Parents? Moreira, Adonis Tarcio
Enterprise adoption challenges of biometrics authentication and authorization in Ireland Nistor, Marius Cristian
Benchmarking the Future of Security: Performance Analysis of Post-Quantum Algorithms versus their Cryptographic Predecessors O Dowd, John
Assessing the Relationship Between Digital Footprints and Identity Theft on Social Networks in Ireland O Ladele, Olayera
A Comparative Analysis of the use of facial recognition technology by foreign state entities to evaluate the implication of use by the Irish state. O Neill, Owen
Implementing Zero Trust Micro segmentation for Robust Security in Cloud Environment. Onifade, Olanrewaju
What are the impacts of user-managed encryption on the security and confidentiality of data stored in cloud services? Quintal, Carlos
Comparative Efficacy in AI-Driven Threat Intelligence Sanni, Iramofu
Which systems architecture offers the best defence against penetration attacks: on-premise, on-cloud, or hybrid? Santana, Ronaldo