Search
Skip to Search Results- 2Rogers, Leonard (Supervisor)
- 1Antaryami, Aradhna
- 1Ashish
- 1Bhairvi Singh
- 1Ganganagari, Praharsh Reddy
- 1Hansen Zhang
-
2023-04-01
With the rapid development of Connected and Autonomous Vehicles (CAVs), critical challenges appear as well. Cybersecurity in CAVs is one of the most significant issues in the upcoming decades. This is a capstone project report for the MINT program essentially aims to solve Control Area Network...
-
2023-04-01
I want to thank my mentor, Mr.Jonathon Baddock, for providing me with guidance & support throughout the project, which helped me to complete my project on time. Also, I would like to express my appreciation to my colleagues, who provided me with valuable insights throughout the project. I owe my...
-
2021-09-29
Cybersecurity is a very popular and crucial term in the Information Technology field. It is a way of protecting data, documents, networks and other information from any kind of intrude. Access to data can be of two types: authorized and unauthorized. Authorized access is the type of access in...
-
2021-10-04
The main objective of this project is to study, analyse and define some of the best practices to prevent zero-day and polymorphic attacks. Zero-day refers to the vulnerability or an attack that has zero days between the time the vulnerability is discovered and the first attack. The operating...
-
Fall 2021
Powered by advancements of information and Internet technologies, there has been a rapid development in network based applications in recent years. Meanwhile, it is recognized that more attentions need to be paid to the issue of cybersecurity. The security of the network environment plays a vital...
-
2019-03-08
This project studies the various techniques used in memory injection attack and how to detect/avoid them using various network security monitoring (NSM) tools. Among various available techniques of memory injection, Reflective DLL injection has been studied in detail. The above objective has been...
-
2023-04-01
The security of surgical robotics systems needs to be ensured given the growing usage of technology in healthcare. Cybersecurity risks can potentially compromise the surgical robotics systems' availability, confidentiality, and integrity, with severe repercussions for patients and medical...
-
2023-04-01
The Blockchain is the decentralized and distributed chain of blocks that contains information, which was designed to timestamp the digital data so that it cannot be tampered. Since its inception in 2008 by Satoshi Nakamoto, Blockchain technology has drawn the attention of several financial and...
-
Security Analysis of Attacks in SDN Based Smart Grids Network using Machine Learning and Deep Learning Techniques
Download2023-04-01
Cybersecurity is becoming increasingly critical as the world continues to advance in technology. As a result, cybercriminals are finding new and sophisticated ways to launch cyber attacks on organizations, which can have severe consequences. In recent years, Artificial Intelligence (AI), Machine...