|
A Scalable Cybersecurity Model for Academic Makerspaces
William Faircloth, Old Dominion University
|
|
A Transition Framework for Hybrid TLS in Enterprise-Level Systems
William Hadd, Christopher Newport University
|
|
Behavioral Detection Methods for Automated MCP Server Vulnerability Assessment
Christian Coleman, Old Dominion University
|
|
Deconstructing Tycoon 2FA: A Static Analysis Approach to Threat Intelligence and Automated Defense
Daniel A. Austin Jr, Virginia Community Colleges
|
|
Detecting Generative-AI-Enabled Polymorphic Malware: A Semantic-Behavior Approach
Allyson M. Morris, William & Mary
|
|
Game Hacking & Anti-Cheat Analysis
Quang Hoang, William & Mary
|
|
Insider Threat: A Case Study of the Maroochy Water Services Attack
Samuel Rector, Tidewater Community College
|
|
Mass Layoffs and its Potential Security Risk
Riley M. McDonough, Christopher Newport University
|
|
Rogue Access Points and Their Impact on Networks
Sami Belmokhtar, Virginia Peninsula Community College
|
|
Supply Chain Attacks Through Open Source Software: A Comprehensive Analysis of NPM, PyPI, and Docker Hub Vulnerabilities
Thomas A. Pham, Old Dominion University
|
|
The Legal and Ethical Impacts of Cybersecurity Practices on Privacy and Digital Rights
Ibrahim Fejzulla, Christopher Newport University
|
|
Viability of Widely Used Encryption Schemes in Drone Transmission
Emanuel Yasir Nelson, Old Dominion University
|