List for PhD
Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense
Chris Morrell, PhD, Electrical and Computer Engineering
May 2016
Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses
Matthew Dunlop, PhD, Electrical and Computer Engineering
May 2012
ETD | Full Text: PDF
Battery-Sensing Intrusion Protection System (B-SIPS)
Timothy Buennemeyer, PhD, Electrical and Computer Engineering
December 2008
Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols
David Raymond, PhD, Electrical and Computer Engineering
May 2008
Network Anomaly Detection with Incomplete Audit Data
Animesh Patcha, PhD, Electrical and Computer Engineering
May 2006
Thwarting Network Stealth Worms in Computer Networks through Biological Epidemiology
Kristopher Hall, PhD, Electrical and Computer Engineering
May 2006
Energy-efficient Wireless Sensor Network MAC Protocol
Michael Brownfield, PhD, Electrical and Computer Engineering
May 2006
A Framework for Deriving Verification and Validation Strategies to Assess Software Security
Anil Bazaz, PhD, Computer Science
May 2006
Battery-Based Intrusion Detection
Grant Jacoby, PhD, Electrical and Computer Engineering
May 2005
A Taxonomy of Computer Attacks with Applications to Wireless Networks
Daniel Lough, PhD, Electrical and Computer Engineering
May 2001
List for Masters
Strengthening MT6D Defenses with Darknet and Honeypot Capabilities
Dileep Basam, Master of Science, Electrical Engineering
December, 2015 ETD | Full Text: PDF
Micro-Moving Target IPv6 Defense for 6LoWPAN and the Internet
Matthew Sherburne, Master of Science, Electrical Engineering
April, 2015 ETD | Full Text: PDF
An Optimized Alert System Based on Geospatial Location Data
Kimberly Zeitz, Master of Science, Computer Science and Applications
May, 2014 EDT | Full Text: PDF
Evaluation of Moving Target Defense and Distributed Denial of Service Defenses
Peter DiMarco, Master of Science, Electrical and Computer Engineering
November 2013 ETD | Full Text: PDF
Evaluating Standard and Custom Applications in IPv6 Within a Simulation Framework
Brittany Clore, Master of Science, Electrical and Computer Engineering
July 2012 ETD | Full Text: PDF
Privacy and Security in IPv6 Addressing
Stephen Groat, Master of Science, Electrical and Computer Engineering
May 2011 ETD | Full Text: PDF
Securing Software Intellectual Property on Commodity and Legacy Embedded Systems
Michael Gora, Master of Engineering, Electrical and Computer Engineering
May 2010 ETD | Full Text: PDF
Assessing Security Vulnerabilities: An Application of Partial and End-Game Verification and Validation
Edward Frazier, Master of Science, Electrical and Computer Engineering
May 2010 ETD | Full Text: PDF
Bluetooth Threat Taxonomy
John Dunning, Master of Science, Computer Science
December 2010 ETD | Full Text: PDF
Multi-Vector Portable Intrusion Detection System
Benjamin Moyers, Master of Science, Computer Engineering
May 2009 ETD | Full Text: PDF
Security Requirements for the Prevention of Modern Software Vulnerabilities and a Process for Incorporation into Classic Software Development Lifecycles
Lee Clagett II, Master of Science, Computer Science
December 2009 ETD | Full Text: PDF
Optimizations of Battery-Based Intrusion Protection Systems
Theresa Nelson, Master of Science, Electrical and Computer Engineering
May 2008 ETD | Full Text: PDF
Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles
Timothy McNevin, Master of Science, Electrical and Computer Engineering
May 2005 ETD | Full Text: PDF
Using Plant Epidemiological Methods to Track Computer Network Worms
Rishikesh Pande, Master of Science, Computer Science
May 2004 ETD | Full Text: PDF