| PROJECT TITLE |
TECHNOLOGIES |
STUDENT(S) |
| Using modern NLP algorithms to extract patterns and insights from phishing landing webpages and help develop more efficient identification strategies. |
Python, TypeScript, NLP, spaCy |
Julien Blanchard |
| Evaluating LLM-assisted vs traditional smart contract vulnerability workflows |
Python, Solidity, Slither, Mythril, Foundry, Docker, GitHub Models, GitHub Actions, and YAML-configured experiment pipelines. |
Hrvoje Vujcec |
| Detecting Data Exfiltration from BYOD and IoT Devices in Enterprise Networks Using Supervised Learning on Network Flow Metadata |
Network Flow Metadata(NetFlow), Python, scikit-learn |
Kai Chong Chio |
| How can Cyber Threat Intelligence Address 'Harvest Now, Decrypt Later' Risk in Financial Services? |
MISP, OpenCTI, Anomali |
Declan Clune |
| Design and Evaluation of a Maturity Model for Automated Phishing Incident Response in Corporate Digital Channels |
|
Eduard Fernando Cuadros |
| Assessing the Applicability and Limitations of Real-Time Vulnerability Detection in APIs |
|
Ayoola Dogo |
| The Psychological Factors Behind Phishing Attacks |
Phishing Quiz - Google, Microsoft Forms, Excel, Qualtrics |
Mark Doyle |
| The use of AI in Ethical Hacking:A Comparative Study of Ethical Boundaries in LLMs & AI Agents based on OWASP Top 10 |
|
Karen Farrell |
| Evalutaing the ability of AI to act as an abstraction layer in the creation of threat detection rules using quantative experimentation |
Wazuh, Opensearch, LLM, Atomic Red Team, Python |
Oisin Hickey |
| DESIGN AND EVALUATION OF A LIGHTWEIGHT ADAPTIVE ENCRYPTION FRAMEWORK FOR ESP32-BASED IOT CYBER-PHYSICAL SYSTEMS |
|
Mateusz Jakusz |
| Explainable AI for Concept Drift Detection in Intrusion Detection Systems |
Python, Scikit-learn, PyTorch, SHAP, Integrated Gradients |
Karim Khidr |
| Is home based IoT Prevalence an untapped hacking attack surface? A threat modelling study. |
MITRE ATT&CK |
Stephen Leahy |
| Regulating Third-Party Cyber Risk in Financial Services: Practitioner Perspectives on DORA in the UK and US Regulatory Context |
The survey instrument was designed and distributed using Qualtrics allowing structured questionnaire development, response validation, randomised selections and controlled data collection.Data collected was exported to Microsoft Excel for cleaning, categorisation, and descriptive statistical analysis.Regulatory analysis is supported through review of publicly available documentation relating to the Digital Operational Resilience Act (DORA), together with relevant UK and US financial regulatory publications. |
Elaine Mc Connell |
| Is the Cost of Performing Vulnerability Scanning a Step Too Far for On-Premises SMEs? |
|
Sailaja Mohanty |
| Security Vulnerabilities in Infrastructure as Code: ACritical Analysis of Detection and Prevention Mechanisms in Terraform and AWS CDK |
|
Juber Nunes |
| Evaluating the Effectiveness ofAutomated Security Scanning Tools in CI/CDPipelines |
|
Angad Singh |
| Has Mandatory Cybersecurity Training Improved Field IT Practices in Multinational Datacenters, and Can Scenario-Based Training Enhance It Further? |
|
Martin Smyth |
| AI-Enhanced Fraud as a Service: Expansion Mechanisms and DefensiveCountermeasures |
Kali,DeepPavlov,Perplexity,GPT-5.2,Gemimni 3 pro, Grok 4.1, Claude Sonnet 4.6, DeepPavlov |
Gavin Soady |
| Securing the Future of Finance: Integrating ISO 27001 and FAIR into Real-World Asset Tokenisation for Enhanced Operational Resilience |
Next.js, NestJS, Solidity, Foundry |
Paul Willock |
| Performance, Usability, and Deployment Trade-offs Between Kyber and RSA: An Analysis of Post-Quantum and Classical Cryptographic Mechanisms in Practical Systems |
PQC Kyber, Python,AWS sagework, OpenSSL TLS, Standard RSA |
Muhammad Bilal Zahid |
| Assessing WordPress Plugin Security: Common Vulnerabilities, Security-Readiness Measurement, and a Prototype Vulnerability Detection Tool. Subject to change. |
WSL, Python, WordPress, Ngrok |
Lubaba Betso |
| Sharenting in Ireland: An Empirical Study of Parental Awareness and Children's Digital Risk |
|
Denise Gibbons |
| Assessing the Anonymity Paradox: An Evaluation of Browser Fingerprint Uniqueness Across Privacy Configurations |
|
Daniel Boyce |
| An Exploratory Study of the Feasibility of Adapting the UK Cyber Essentials Plus Scheme for Irish SMEs |
|
Arulmurugan Kalaiarasan |
| How do Cognitive Biases and Stress-Related Decision-Making Influence the Effectiveness of Cybersecurity Incident Response Across Diverse Human Responder Roles |
|
Michael Buston |
| THE MEASUREMENT OF THE COMPLETENESS OF MOBILE APPLICATION PRIVACY POLICIES IN THE GOOGLE PLAYSTORE USING A MANUAL RANDOM SAMPLING APPROACH |
|
Luke Raeside |
| DETECTION OF DDOS ATTACK TYPES IN CLOUD COMPUTING USING MACHINE LEARNING |
|
Asmaa Salaheldeen Salih Edress |
| From Legacy HMI over RDP to Thin Client Manager in Pharmaceutical OT: Risks, Network Segregation, Access Control, and Day-to-Day Support |
|
Rafal Rybarski |
| AUTOMATING IoT THREAT: A FRAMEWORK FOR RAPID DETECTION AND INCIDENT RESPONSE. |
|
Chioma Okoye |
| Evaluating Open-Source XDR and SOAR for APT Detection and Response in Hybrid Cloud |
|
Joe O Shea |
| EVALUATING AI/ML TECHNIQUES TO REDUCE FALSE-POSITIVES IN SIEM PLATFORMS FOR RESOURCE-CONSTRAINED ENVIRONMENTS WITHOUT IMPACTING DETECTION ACCURACY AND OPERATING PERFORMANCE |
|
Amit Bora |
| EXPLORING FACEBOOK'S ROLE IN CYBERCRIMES: PLATFORM FEATURES, TRUST SIGNALS AND REGULATORY GAPS IN IRELAND |
|
Julio Cesar Santana |
| AUTOMATING MALWARE DETECTION: A DATA-DRIVEN APPROACH TO GENERATING HIGH-FIDELITY YARA AND SIGMA RULES FOR EMERGING THREATS |
|
David Antonio Martin Escar |
| A QUANTITATIVE FRAMEWORK FOR ASSESSING THE TRUSTWORTHINESS OF CYBER THREAT INTELLIGENCE FEEDS |
|
Olajuwon Bello |
| Evaluation of current threat vectors posed by prompt injection against contemporary Large Language Models (LLMs), while considering damage of attacks, and effective mitigation strategies |
|
Christopher Boylan |
| Assessment of preparation levels for NIS2 implementation within SME businesses in Ireland |
|
Michael Grace |
| A CVE-Driven Study Of OTA Firmware Vulnerabilities In IoT Devices |
|
Thohiru Omoloye |
| Performance and Operability of Post Quantum Cryptography Algorithms on Resource Constrained End Point Devices |
|
Liam Halliden |