PROJECT TITLE | TECHNOLOGIES | STUDENT(S) |
How can the use of deepfakes impact cyber security and what are the potential methods to detect and mitigate their harmful effects | Python | Alanas Jakonis |
Cybersecurity and Privacy in a Home WIFI network - A system to identify vulnerabilities and deploy defence mechanisms | Wireshark, Python, Machine Learning, Wifite, Hashcat | Joseph Hammel |
Ransomware is over thirty years old. Why is it still a major cybersecurity issue? | CryptoCurrency, Distributed Ledgers, Malware. | Chris Hayman |
Can a quantitative framework for medical device product security risk management be implemented using publicly available data sources? | Python | Barry Curran |
Investigation into new methods of securing services with SIEM | RFID reader, Active Directory, SIEM/SOAR, and Load Master | Mark Deegan |
Rendering Automated Attacks Infeasible on Classical Login Systems by Leveraging Composite Hashing, Endpoint Whitelisting, and Profile Picture Confirmation | Server-Side Web Development: Python, XAMPP, Apache, MySQL, Client-Side Web Development: JavaScript, HTML, Client-Side Web Development: JavaScript, HTML | Sorin Hadarau |
A study of breach attack simulation | Smart home devices, custom attack simulation tools | Jingyi Qin |