Analyzing the effectiveness of deep packet inspection (DPI) techniques in detecting and mitigating DNS tunnelling attacks pfSense, Snort IDS, GNS3, Wireshark, SecurityOnion Mosopefoluwa Adefuye
A comparative study of DLP strategies in email systems and their impact on SOC efficiency Email content filtering and contextual analysis, Data Discovery and classification, Artificial Intelligence and Machine Learning, Email policy enforcement, SIEM Edet Bassey
Mitigating OWASP T10 Risks for Kubernetes with a Cloud-Native Response Engine Kubernetes, Falco, Falco Talon Nigel Douglas
Investigating the Cybersecurity Posture of Higher Education Institutions in Ireland. An IT Professional Stakeholder Perspective NIST CSF, Cybersecurity professional interviews John Dunne
Implementing Geolocation Mapping of an attacker's PC using IP address and logs in SIEM Solutions: A Comparative Study between Azure Sentinel and Splunk. SIEM, Azure Sentinel and Splunk Bhupal Gurung
Children and Cybersecurity - Cyber Threats and Data Hacking in Smart Toys and Online Games Network Forensics, Network Sandboxing Etsuko Michelle Hegarty
The Danger of AI Virtual Assistants on Data Protection and Privacy in Today's Work Environment Python, Matplotlib, ChatGPT and GPT Store Yasdeo Jugessur
How to implement Threat Hunting in small to medium-sized enterprises Open-source SOC tools (Wazuh, Velociraptor) Rizo Jusufovic
Blockchain-based Attestation System for Secure and Efficient Document Authentication in the Academic Sector Node.js, Next.js, TypeScript, Web3, Ethereum, MetaMask, EAS-SD, GraphQL, Vercel Daniel Lazarczyk
Enhancing Compliance and Security in Agile Environments: A Tool Assisted DevSecOps Approach Python, Wazuh, MISP, Suricata, Zeek Jane Mac Donald
A multi-dimensional approach to cybersecurity vulnerabilities Python, Matplotlib,R, Jupyter Notebooks Benie Mambouana
The Human Element of Cybersecurity, investigating the impact of Social Media on Employee Security Awareness Training O365 tools Viva Engage / Teams and Google Training Tools Michael Mitchell
The Strategic Impact of Generative AI on Privacy and Trust in the Public Sector Python, pandas, analytics tools, graphing libraries, databases, LLMs and AI Dewaspati Shibnauth
Towards a reusable framework for converged IT and OT converged security operations centres Azure, Security Onion, pfSense Firewall, Snort IDS, Modbus, DNP3, OPC Shane Sweeney
Assessing the ease of implementing security features by software engineers in frequently used web frameworks Python, Java, NodeJS (Typescript), ReactJS, NextJS, Angular. Jakub Zurakowski