|
Cybersecurity Maturity Model Certification (CMMC) Compliance for DoD Contractors
PDF
Sierra Burnett, Old Dominion University
|
|
Cybersecurity: Building a Better Defense with a Great Offense
PDF
David M. Cooke, Old Dominion University
|
|
How Secure Are Android and Apple’s Operating Systems and Based Applications Against Cyber Attacks and Cyber Crime
PDF
Marlowe Cosby Jr., Old Dominion University
|
|
Developing an International Framework for Addressing Non-State Actors in Cyberspace
PDF
Joanna C. Di Scipio, William & Mary
|
|
GDPR, PIPL & LGPD: Privacy Regulations & Policies Across the Globe
PDF
Raymond H. Geistel, Old Dominion University
|
|
Leverage Psychological Factors Associated with Lapses in Cybersecurity in Organizational Management
PDF
Chad Holm, Old Dominion University
|
|
Protection of Patient Privacy on Mobile Device Machine Learning
PDF
Matthew Nguyen, Old Dominion University
|
|
Best Cybersecurity Practices for Companies, Post Van Buren
PDF
Mary Riley, Old Dominion University
|
|
Self-Supervised Perceptual Ad-Blocker
PDF
Killian Robinson, Old Dominion University
|
|
Effects of Cloud Computing in the Workforce
PDF
Kevin Rossi Acosta, Old Dominion University
|
|
An Analysis of Significant Cyber Incidents and the Impact on the Past, Present, and Future
PDF
Seth E. Smith, Old Dominion University
|
|
Tackling AI Bias with GANs
PDF
Noam Stanislawski, William & Mary
|
|
Internet of Things: Cybersecurity in Small Businesses
PDF
Zobair Wali, Old Dominion University
|
|
Analytical Approach to Biometric Security and How It Affects Privacy
PDF
Torré A. Williams, Old Dominion University
|
|
On the Usage and Vulnerabilities of API Systems
PDF
Conner D. Yu, William & Mary
|