Triad of Disruption: Defeating Democracies Online Read more about Triad of Disruption: Defeating Democracies Online
SubParse: Malware Artifact and Correlation Framework Read more about SubParse: Malware Artifact and Correlation Framework
Automobile Vulnerability Assessment Using Ghidra Read more about Automobile Vulnerability Assessment Using Ghidra
Workerounds - Categorizing Service Worker Attacks and Mitigations Read more about Workerounds - Categorizing Service Worker Attacks and Mitigations
Spoofing AI Image Processing Techniques for Lane Detection Read more about Spoofing AI Image Processing Techniques for Lane Detection
An Examination of Edtech Tool Privacy Policies Read more about An Examination of Edtech Tool Privacy Policies
Reducing The Threat Foot Print By Enemy Emulation Read more about Reducing The Threat Foot Print By Enemy Emulation
A Framework for Identifying Malware Threat Distribution on the Dark Web Read more about A Framework for Identifying Malware Threat Distribution on the Dark Web
Healthcare Cybersecurity Pathways: Technology Badges, Certificates, and Degrees Read more about Healthcare Cybersecurity Pathways: Technology Badges, Certificates, and Degrees