Research Projects
The research projects will be team-based projects, many of which will be collaborative efforts between UAlbany and FIU students. For students that are currently doing research or have a particular research agenda, individual projects will be allowed. Research deliverables will be due prior to the completion of your cyber badge and include:
- 4–6-page (excluding references) single-space report for individual projects
- 8–10-page (excluding references) single-space report for group projects
- Presentation at the research showcase in May and/or publication at an academic research conference or academic journal.
Research Projects by Year
| Cohort 1 (2023) – Showcase Program and Agenda |
|---|
| Anomaly Detection of Embedded Systems Utilizing Kernel Structures by Andy Carvajal, Edward Grisham, Aron Jones, Kevin Perez, and Jason Masters |
| Security Challenges of Mobile Edge Computing and IoT Devices by Samantha Carollo, Michael Danquah, and Janna Shearer |
| Cybersecurity of Space Infrastructure by Brianna Bace and Rian Davis |
| Improving Ethics Surrounding Collegiate-Level Hacking Education: Comprehensive Implementation Plan & Affiliation with Peer-Led Initiatives by Shannon Morgan |
| Internet of Battlefield Things by Amaechi Anyene and Dyonne Lindsay |
| Cyber Threat Modeling for Water and Wastewater Systems: Contextualizing STRIDE and DREAD with the Current Cyber Threat Landscape by Rian Davis |
| Implications of AI in Cyberbiosecurity by Alex Kalena |
| Active Defense by Samantha Mayers, Nikolas Golyatdinov-Novikov, Nora Howell, and Marshal Williams |
| A Survey on Network Traffic Anomaly Detection: Applications and Challenges by Desiree Glynn, Franyel Castillo, and Raul Jarquin |
| Gray-Zone Operations in the Post-Fact World: The Use of Deepfakes in PRC Disinformation Campaigns by Tony Ventura |
| Virtualization and Validation of Emulated STM-32 Blue Pill using QEMU Open-Source Framework by William Ocampo and Diana Gutierrez |
| Cohort 2 (2024) – Showcase Program and Agenda |
|---|
| Privacy Preserving Route Comparison with Homomorphic Encryption by Allan Luedeman, Nicholas Baum |
| Analysis of Space Infrastructure Dependencies and Their Cascading Impacts by Ethan Fowler, Matthew Niemczyk, Sebastian Hernandez, Trenton Hanan |
| Exploring Cybersecurity Concerns of Drone-to-Drone Communications by David Balzora, Edward Grisham, Aron Jones, Jacky He, Shoshanna Kusa |
| Generative AI in Cybersecurity: Opportunities, Risks, and Impacts by Noelle Capodieci, Chris Sanchez-Adames, Joseph Harris |
| Cyber Threat Actor Psychological Profiling Utilizing Active Defense Mechanisms by Shannon Morgan, Richard Kohler, Nikolas Novikov, Adam Louis |
| Investigating the Effectiveness of Collegiate Cybersecurity Competitions Developing Practical Skills and Student Success by Liam Mengler |
| Anonymous: Privacy and Confidentiality Concerns and Solutions in Autonomous Vehicles by Aneeha Sahar, Daniel Peck, Sharie Rhea, Tayquan Sneed, Karina Hernandez |
| Fortifying Security and Stability: The Case for a Federal Cyber Insurance Backstop by Brianna Bace |
| A Framework for Automated Data Loss Prevention Against Insider Threats in Sensitive Environment by Jason Masters, Sean Caruso, Connor Bowden |
| Integration and Evaluation of Post-quantum TLS within 5G User Registration Function by John Evanchik, Luisa Cartagena |