Part of the Information Security Commons

Works in Information Security

2022

Analyzing the Robustness of Prevalent Social Engineering Defense Mechanisms, Bhupendra Acharya
University of New Orleans Theses and Dissertations

PDF

2021

Convolutional Neural Networks for Deflate Data Encoding Classification of High Entropy File Fragments, Nehal Ameen
University of New Orleans Theses and Dissertations

PDF

Sounds of Silence: A Study of Stability and Diversity of Web Audio Fingerprints, Shekhar Chalise
University of New Orleans Theses and Dissertations

PDF

2019

A Domain Specific Language for Digital Forensics and Incident Response Analysis, Christopher D. Stelly
University of New Orleans Theses and Dissertations

PDF

2018

Leveraging Relocations in ELF-binaries for Linux Kernel Version Identification, Manish Bhatt
University of New Orleans Theses and Dissertations

PDF

Assessment Of Two Pedagogical Tools For Cybersecurity Education, Pranita Deshpande
University of New Orleans Theses and Dissertations

PDF

MAnanA: A Generalized Heuristic Scoring Approach for Concept Map Analysis as Applied to Cybersecurity Education, Sharon Elizabeth Blake Gatto
University of New Orleans Theses and Dissertations

PDF

Semantic-aware Stealthy Control Logic Infection Attack, Sushma kalle
University of New Orleans Theses and Dissertations

PDF

2017

Forensic Analysis of G Suite Collaborative Protocols, Shane McCulley
University of New Orleans Theses and Dissertations

PDF

Lightweight Environment for Cyber Security Education, Vivek Oliparambil Shanmughan
University of New Orleans Theses and Dissertations

PDF

Automatic Forensic Analysis of PCCC Network Traffic Log, Saranyan Senthivel
University of New Orleans Theses and Dissertations

PDF

Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications, Aisha Ibrahim Ali-Gombe
University of New Orleans Theses and Dissertations

PDF

Development of Peer Instruction Material for a Cybersecurity Curriculum, William Johnson
University of New Orleans Theses and Dissertations

PDF

Towards Real-Time Volatile Memory Forensics: Frameworks, Methods, and Analysis, Joseph T. Sylve
University of New Orleans Theses and Dissertations

PDF

2016

Practical Application of Fast Disk Analysis for Selective Data Acquisition, sergey gorbov
University of New Orleans Theses and Dissertations

PDF

Detecting Objective-C Malware through Memory Forensics, Andrew Case
University of New Orleans Theses and Dissertations

PDF

2015

Extracting Windows event logs using memory forensics, Matthew Veca
University of New Orleans Theses and Dissertations

PDF

API-Based Acquisition of Evidence from Cloud Storage Providers, Andres E. Barreto
University of New Orleans Theses and Dissertations

PDF

Towards Effective Vulnerability Analysis of Application Code in a Cloud-computing Environment, Irfan Ahmed
Computer Science - Grants and Contracts

SaTC-EDU: EAGER: Peer Instruction for Cybersecurity Education, Golden G. Richard III, Irfan Ahmed, Vassil R. Roussev
Computer Science - Grants and Contracts

Integrating Cognitive and Computer Science to Improve Cyber Security: Selective Attention and Personality Traits for the Detection and Prevention of Risk, Golden G. Richard III
Computer Science - Grants and Contracts

Rapid Forensic Acquisition of Large Media with Sifting Collectors, Golden G. Richard III, Jonathan Grier
Computer Science - Grants and Contracts

High Tech, Immersive IA Training for High School Teachers (Part II), Golden G. Richard III
Computer Science - Grants and Contracts

2014

EDU: Lightweight Environment for Network Security Education, Golden G. Richard III, Vassil R. Roussev, Irfan Ahmed
Computer Science - Grants and Contracts

Feature selection and clustering for malicious and benign software characterization, Dalbir Kaur R. Chhabra
University of New Orleans Theses and Dissertations

PDF

Botnet Detection in Cloud-computing Environments, Irfan Ahmed
Computer Science - Grants and Contracts

High Tech, Immersive IA Training for High School Teachers (Part I), Golden G. Richard III
Computer Science - Grants and Contracts

TWC: Medium: Collaborative: Towards a Binary-Centric Framework for Cyber Forensics in Enterprise Environments, Golden G. Richard III
Computer Science - Grants and Contracts

2013

Categorization of Large Corpora of Malicious Software, Deekshit Kura
University of New Orleans Theses and Dissertations

PDF

Integrating Cognitive and Computer Science to Improve Cyber Security: Selective Attention and Personality Traits for the Detection and Prevention of Risk, Golden G. Richard III
Computer Science - Grants and Contracts

2012

High-Performance Infrastructure for Information Assurance Research and Education, Golden G. Richard III, Vassil R. Roussev, Jaime Nino
Computer Science - Grants and Contracts

2010

Information Assurance Scholarships and Research, Golden G. Richard III, Vassil R. Roussev, Jaime Nino, Daniel Bilar
Computer Science - Grants and Contracts

TC-Small-Virtual Machine Introspection-based Live Forensics for Detection of Malicious Software, Golden G. Richard III
Computer Science - Grants and Contracts

Platform Independent Secure Mobile Computing, Golden G. Richard III
Computer Science - Grants and Contracts