1. MOTIVATIONS AND ENABLERS PRESENT IN DECEPTION OPERATIONS: HISTORICAL CASE STUDY EXAMPLE - OPERATION FORTITUDE Open Access Author: Eberhardt, Gabrielle Patricia Title: MOTIVATIONS AND ENABLERS PRESENT IN DECEPTION OPERATIONS: HISTORICAL CASE STUDY EXAMPLE - OPERATION FORTITUDE Area of Honors: Security and Risk Analysis Keywords: deceptionentitiesmotivationsbiasesenablersOperation FORTITUDEexploitawarevulnerable File: Download GETHESIS2018.pdf Thesis Supervisors: Jacob Lehner Graham, Thesis SupervisorDinghao Wu, Thesis Honors Advisor
2. Data Fusion of Security Logs to Measure Critical Security Controls to Increase Situation Awareness Open Access Author: Kennedy, Matthew Title: Data Fusion of Security Logs to Measure Critical Security Controls to Increase Situation Awareness Area of Honors: Security and Risk Analysis Keywords: metricssecurity metricsdata fusionsituation awarenessjdlsecurity logscybersecurity File: Download Final_Kennedy_SHC_2018.pdf Thesis Supervisors: Nicklaus A Giacobe, Thesis SupervisorDinghao Wu, Thesis Honors Advisor
3. Polymorphic Homework and Laboratory System: An Instructional Tool for Combating Cheating Open Access Author: Kohler, Ryan J Title: Polymorphic Homework and Laboratory System: An Instructional Tool for Combating Cheating Area of Honors: Security and Risk Analysis Keywords: CybersecurityEducationCheatingSituation AwarenessChallenge-Based LearningPolymorphism File: Download kohler.r-SHC_Thesis.pdf Thesis Supervisors: Nicklaus A Giacobe, Thesis SupervisorDinghao Wu, Thesis Honors Advisor
4. Understanding the Reproducibility of Crowd-reported Security Vulnerabilities Open Access Author: Cuevas Villalba, Alejandro Ed Title: Understanding the Reproducibility of Crowd-reported Security Vulnerabilities Area of Honors: Security and Risk Analysis Keywords: vulnerabilitycvedatasetreproducibilityuser-studyreport File: Download alejandro_cuevas-thesis.pdf Thesis Supervisors: Peng Liu, Thesis SupervisorDinghao Wu, Thesis Honors Advisor