Research Projects
The research projects will be team-based projects, many of which will be collaborative efforts between UAlbany and FIU students. For students that are currently doing research or have a particular research agenda, individual projects will be allowed. Research deliverables will be due prior to the completion of your cyber badge and include:
Check Out Our Social Media Pages to Stay Up-to-Date with VICOR Research:
- 4–6-page (excluding references) single-space report for individual projects
- 8–10-page (excluding references) single-space report for group projects
- Presentation at the research showcase in May and/or publication at an academic research conference or academic journal.
Research Projects by Year
Cohort 1 (2023) – Showcase Program and Agenda |
---|
Anomaly Detection of Embedded Systems Utilizing Kernel Structures by Andy Carvajal, Edward Grisham, Aron Jones, Kevin Perez, and Jason Masters |
Security Challenges of Mobile Edge Computing and IoT Devices by Samantha Carollo, Michael Danquah, and Janna Shearer |
Cybersecurity of Space Infrastructure by Brianna Bace and Rian Davis |
Improving Ethics Surrounding Collegiate-Level Hacking Education: Comprehensive Implementation Plan & Affiliation with Peer-Led Initiatives by Shannon Morgan |
Internet of Battlefield Things by Amaechi Anyene and Dyonne Lindsay |
Cyber Threat Modeling for Water and Wastewater Systems: Contextualizing STRIDE and DREAD with the Current Cyber Threat Landscape by Rian Davis |
Implications of AI in Cyberbiosecurity by Alex Kalena |
Active Defense by Samantha Mayers, Nikolas Golyatdinov-Novikov, Nora Howell, and Marshal Williams |
A Survey on Network Traffic Anomaly Detection: Applications and Challenges by Desiree Glynn, Franyel Castillo, and Raul Jarquin |
Gray-Zone Operations in the Post-Fact World: The Use of Deepfakes in PRC Disinformation Campaigns by Tony Ventura |
Virtualization and Validation of Emulated STM-32 Blue Pill using QEMU Open-Source Framework by William Ocampo and Diana Gutierrez |
Cohort 2 (2024) – Showcase Program and Agenda |
---|
Privacy Preserving Route Comparison with Homomorphic Encryption by Allan Luedeman, Nicholas Baum |
Analysis of Space Infrastructure Dependencies and Their Cascading Impacts by Ethan Fowler, Matthew Niemczyk, Sebastian Hernandez, Trenton Hanan |
Exploring Cybersecurity Concerns of Drone-to-Drone Communications by David Balzora, Edward Grisham, Aron Jones, Jacky He, Shoshanna Kusa |
Generative AI in Cybersecurity: Opportunities, Risks, and Impacts by Noelle Capodieci, Chris Sanchez-Adames, Joseph Harris |
Cyber Threat Actor Psychological Profiling Utilizing Active Defense Mechanisms by Shannon Morgan, Richard Kohler, Nikolas Novikov, Adam Louis |
Investigating the Effectiveness of Collegiate Cybersecurity Competitions Developing Practical Skills and Student Success by Liam Mengler |
Anonymous: Privacy and Confidentiality Concerns and Solutions in Autonomous Vehicles by Aneeha Sahar, Daniel Peck, Sharie Rhea, Tayquan Sneed, Karina Hernandez |
Fortifying Security and Stability: The Case for a Federal Cyber Insurance Backstop by Brianna Bace |
A Framework for Automated Data Loss Prevention Against Insider Threats in Sensitive Environment by Jason Masters, Sean Caruso, Connor Bowden |
Integration and Evaluation of Post-quantum TLS within 5G User Registration Function by John Evanchik, Luisa Cartagena |