|
A Case Study of the CRASHOVERRIDE Malware, Its Effects and Possible Countermeasures
Samuel Rector, Tidewater Community College
|
|
A Design Science Approach to Investigating Decentralized Identity Technology
Janelle Krupicka, William & Mary
|
|
Analyzing the Role of Cybersecurity in Correctional Facilities
Jaysia I. LeeHeung, Old Dominion University
|
|
Data Profits vs. Privacy Rights: Ethical Concerns in Data Commerce
Amiah Armstrong, Old Dominion University
|
|
High-Resolution and Quality Settings with Latent Consistency Models
Steven Chen, Old Dominion University
Junrui Zhang, Old Dominion University
Rui Ning, Old Dominion University
|
|
Investigating Vulnerabilities in the Bluetooth Host Layer in Linux
Jack DiBari, Old Dominion University
|
|
Predictive AI Applications for SAR Cases in the US Coast Guard
Joshua Nelson, Old Dominion University
|
|
Profiling Cybercriminals: Behavioral Analysis and Motivations Behind Cybercrime Activities
A'shya Latrice Reynolds, Old Dominion University
|
|
The Ethical and Legal Implications of IoT Data in Business Organizations
Kennedy Bellamy, Old Dominion University
|
|
The Role of OSINT in Criminal Investigations: Leveraging Open-Source Data to Combat Cybercrime and Organized Criminal Activities
Azariah Vaughan, Norfolk State University
|
|
The Security of Deep Neural Networks
Jalaya Allen, Norfolk State University
|
|
The Vulnerabilities of Artificial Intelligence Models and Potential Defenses
Felix Iov, William & Mary
|
|
What Students Have to Say on Data Privacy for Educational Technology
Stephanie Choi, William & Mary
|