Research Projects

The research projects will be team-based projects, many of which will be collaborative efforts between UAlbany and FIU students. For students that are currently doing research or have a particular research agenda, individual projects will be allowed. Research deliverables will be due prior to the completion of your cyber badge and include:

Check Out Our Social Media Pages to Stay Up-to-Date with VICOR Research:

  • 4–6-page (excluding references) single-space report for individual projects
  • 8–10-page (excluding references) single-space report for group projects
  • Presentation at the research showcase in May and/or publication at an academic research conference or academic journal.

Research Projects by Year

Cohort 1 (2023) – Showcase Program and Agenda
Anomaly Detection of Embedded Systems Utilizing Kernel Structures by Andy Carvajal, Edward Grisham, Aron Jones, Kevin Perez, and Jason Masters
Security Challenges of Mobile Edge Computing and IoT Devices by Samantha Carollo, Michael Danquah, and Janna Shearer
Cybersecurity of Space Infrastructure by Brianna Bace and Rian Davis
Improving Ethics Surrounding Collegiate-Level Hacking Education: Comprehensive Implementation Plan & Affiliation with Peer-Led Initiatives by Shannon Morgan
Internet of Battlefield Things by Amaechi Anyene and Dyonne Lindsay
Cyber Threat Modeling for Water and Wastewater Systems: Contextualizing STRIDE and DREAD with the Current Cyber Threat Landscape by Rian Davis
Implications of AI in Cyberbiosecurity by Alex Kalena
Active Defense  by Samantha Mayers, Nikolas Golyatdinov-Novikov, Nora Howell, and Marshal Williams
A Survey on Network Traffic Anomaly Detection: Applications and Challenges by Desiree Glynn, Franyel Castillo, and Raul Jarquin
Gray-Zone Operations in the Post-Fact World: The Use of Deepfakes in PRC Disinformation Campaigns by Tony Ventura
Virtualization and Validation of Emulated STM-32 Blue Pill using QEMU Open-Source Framework by William Ocampo and Diana Gutierrez
Cohort 2 (2024) – Showcase Program and Agenda
Privacy Preserving Route Comparison with Homomorphic Encryption by Allan Luedeman, Nicholas Baum
Analysis of Space Infrastructure Dependencies and Their Cascading Impacts by Ethan Fowler, Matthew Niemczyk, Sebastian Hernandez, Trenton Hanan
Exploring Cybersecurity Concerns of Drone-to-Drone Communications by David Balzora, Edward Grisham, Aron Jones, Jacky He, Shoshanna Kusa
Generative AI in Cybersecurity: Opportunities, Risks, and Impacts by Noelle Capodieci, Chris Sanchez-Adames, Joseph Harris
Cyber Threat Actor Psychological Profiling Utilizing Active Defense Mechanisms by Shannon Morgan, Richard Kohler, Nikolas Novikov, Adam Louis
Investigating the Effectiveness of Collegiate Cybersecurity Competitions Developing Practical Skills and Student Success by Liam Mengler
Anonymous: Privacy and Confidentiality Concerns and Solutions in Autonomous Vehicles by Aneeha Sahar, Daniel Peck, Sharie Rhea, Tayquan Sneed, Karina Hernandez
Fortifying Security and Stability: The Case for a Federal Cyber Insurance Backstop by Brianna Bace
A Framework for Automated Data Loss Prevention Against Insider Threats in Sensitive Environment by Jason Masters, Sean Caruso, Connor Bowden
Integration and Evaluation of Post-quantum TLS within 5G User Registration Function by John Evanchik, Luisa Cartagena