• Our Promise
  • Our Achievements
  • Our Mission
  • Proposal Writing
  • System Development
  • Paper Writing
  • Paper Publish
  • Synopsis Writing
  • Thesis Writing
  • Assignments
  • Survey Paper
  • Conference Paper
  • Journal Paper
  • Empirical Paper
  • Journal Support
  • TRENDING 9 CYBER SECURITY THESIS IDEAS

Cybersecurity itself contains the sense of securing the network, files, or programs from unverified, illegal entry of external and internal individuals. While operating the virtual environment, it is important to ensure the privacy of data . The need for the cybersecurity domain is increasing as the cyber threat does. So we assure you that there won’t be a lack of scope in the chosen domain, and there won’t be any complication in your thesis when we are here to provide you cyber security thesis ideas .

The cybersecurity area covers vast subthemes like cybersecurity simulations, cybersecurity implanted models, and the programming languages for cybersecurity , etc. In fact, reducing cybersecurity threats in an organization and users by data and resource protection is the ultimate goal of cybersecurity projects. Let’s have a look at the best thesis ideas in cybersecurity .

Cyber Security Thesis Ideas

“The purpose of the article is to provide you the cyber security thesis ideas . Also, we attempt to give you a top to bottom familiarity in the relevant field as much as possible. We cover the idea of the cyber threats , the applications or the software to implement the attack and its features, trending cybersecurity tools, etc.

  • Testing network activity
  • Network managing device
  • Checking network activity
  • Managing developer training
  • Signing digital codes
  • Assessing code penetration
  • Improving security
  • Verifying data resource, inventory, proprietorship, classification
  • Threat detection, reporting, ranking and remediation
  • Associates with cyber security vendors
  • Applying cyber security models
  • Methods and strategies
  • Threat testing
  • Retrieving and Backup controls
  • Managing identity and access
  • Informatory visualization of cyber incident data
  • Swapping cryptographic key
  • Simulate CS incident
  • Practicing data sharing codes
  • Non-disclosure agreement
  • Protecting sharing devices
  • Testing third-party protection
  • Protection of web security
  • Controls phishing
  • Blocking scripts
  • Anti-Spyware and Antivirus conformation
  • Secure workspace from malwares

“Selecting the field of cybersecurity for the thesis is a scholarly choice, but selecting us to work with your thesis will be an intellectual choice!!”

Thus, cybersecurity divides the methods as APTs exploration, Gathering data, and Analyzing Data . They use the Wireshark tool, which collects the raw data. Apart from its ultimate goal, the technical purpose of cybersecurity as follows,

Purpose of cybersecurity

  • Method of threat management
  • Resource management
  • Preservation
  • Measures, process and securing data
  • Availability control
  • Identification methods
  • Continual observation of security
  • Incidents and irregularities
  • Developments
  • Modifications
  • Investigation
  • Infrastructures
  • Planning responses
  • Schedule for recovery

What is Ransomware Attack in Cyber Security?

It is one of the general cyber risks that affect various applications. Mostly, ransomware initiates the effect of getting the device’s access . Encryptions of the device or distinct files depend on the type of ransomware. The feature of this attack demands a ransom to decrypt the affected files, and it prevents the user from accessing personal files.

What are main types of ransomware?

  • Ransomware encryption: In this type, a return payment demanding message to decrypt the file’s encrypted symmetric keys will be displayed in return for the needed private asymmetric key.
  • Screen Lockers: This type of ransomware would display an official look-a-like message to prevent the users to use their device screen or logging in.
  • Scareware : this type of malware is motivated to manipulate the users to buy malicious software by creating nervousness on its used social engineering techniques.

There is a risk of cybersecurity in an organization/network/system when it lacks to update the relevant mechanisms, security procedures, and security measures . Hence, the best performance of security mechanisms to prevent unverified access to networks, devices, data, and programs . Yet there are some limitations for cybersecurity as listed below:

Limitations of cybersecurity

  • Fails in detecting the behavior of post attacks
  • Removal of delicate information to a remote location failure
  • Unsuccessful in detecting illegal sensitive data access
  • Lacking of detection in adversarial network access
  • Fails to process the finding of the resource by an attacker

While conducting research proposal in cybersecurity or being interested in being knowledgeable with the cyber security thesis ideas , you must know the above limitations in cybersecurity. In addition to the above lists, cybersecurity sets its layers on the basis of its performance, threat assessment, etc. So let’s have a look at the important cybersecurity layers.

What are the four important layers in cyber security?

  • Layer 4: Layer of Cyber Performance
  • Layer 3: Layer of Threat Assessment
  • Layer 2: Layer of Cyber Environment
  • Layer 1: Layer of Ecosystem

In the above, the layer of the ecosystem and the arrangement based on the layer of the working environment and the management layer is to develop and improve the set of cybersecurity tools . There are also models to implement cybersecurity research projects. For your better understanding, we classified its types as follows,

What are the types of cybersecurity Models?

  • Level of Application includes the requirement of changes in version of software, memory mapping, and source code.
  • Level of Network includes the network topology related information like traffic clouding and IP bouncing.
  • Level of Host includes the host asset changes in configuration changes like OS etc.

Thus the functional levels of the cybersecurity models are based on its host, network, applications that include supporting cybersecurity in various ways. There are some important cybersecurity models for performing the protection, threat identification and analysis, and network traffic usages as listed below.

Significant principles of Cyber Security Model

  • Apt classifying to differentiate threats from usual behavior
  • Significance of presenting effective situations
  • Necessity of real network traffic usage
  • Particularize and identify the relationships of identified attacks
  • Categorizing the detection ability based on logical threats
  • Detect sensor detectable tools that decomposed from logical threats

What are the steps of cyber security model?

  • To classify or forecasting the unknown information
  • Assessing and preparing the performance of the model
  • Select the Machine Learning algorithm, which is relevant
  • Selecting predictions based on feature engineering

The above steps and principles of the cybersecurity models are primarily based on the process of security, detection, responding, and recovering the data . Skilled models are also used in the cybersecurity field to identify the threats, choose the machine learning algorithm, and test the model’s performance. Apart from the uses of the model in cybersecurity, we provide you some important features of cyber threat detection.

Important Features of Cyber Threats Detection

  • Interval of packets sent, traffic flow ratio, protocol type, service type, bytes sent, average received size, flow direction, source/destination IP address, type of physical media, source/destination port addresses
  • Asset live report, type of requested DNS data, commanding answer, separate domain names, amount of queries on both the domain by name and time, IP addresses
  • Code stylometry, sandbox / AV proposals, PE file features, function length, CPU registers, Raised Exceptions, Windows registry, byte sequences, strings, opcodes APIs/System calls, availability of memory and file system

The function of cybersecurity doesn’t depend only on protecting the network. It also involves maintaining the proper functions of the cybersecurity models. Thus there’s a wide range of scope in the cybersecurity domain, as we mentioned earlier for cyber security thesis ideas . Here our research team has come up with some research domains of cybersecurity.

Research Areas of Cyber Security Thesis Ideas

  • Protecting the range of application: to sharing messages safely, this domain enables security structures in applications
  • Domain Security for Service Based Architecture (SBA): For interfaces based on the services, it compromises security structures for registering network essentials, detection, network and verification.
  • Protecting Configurability and Reflectivity: this includes the structures to notify about the active functions of security.
  • Protecting User Domain: it includes the security structures that allow the user to access user equipment
  • Protecting Availability of Network: the background of this domain ranges from helping the network to User Equipment (UE). It also involves the protection features that give safe and verified access for the users to network access.
  • Protecting Network Domain: to allow the system nodules to exchange user plane information security   and signaling this domain provides a combination of security structures.

The above-given research domains are the chief perspectives of cybersecurity. Not only in providing the cyber security thesis ideas , but we would also like to help you in all aspects of your thesis. For that, we give our entire support at any level of your project, and our world-class certified engineers would take care of your thesis with their innovative brains.

In the cyber security thesis alone, we have nearly 100 happy customers . Our technical team offers you practical explanations to make you understand your topic and the cyber security thesis . Thus you can overcome your thesis fear. We provide you on-time delivery service, so you can come to us at any level of your thesis completion. In this way, we are responsible for providing you the general subject viewpoint that should be mentioned in the thesis.

What described in the thesis chapters?

  • A general approach and outlining the category of the research, whether it is quantitative, experimental or qualitative.
  • Techniques used for data collection and proposed design i.e. methods (theory or statistical) used to examine the gathered information of the research.
  • Facts on the events of research like when, with whom or where does the research happening?
  • Resources and devices you used for research
  • Describing the difficulties you overwhelmed while conducting the research
  • Defending and assessing the research techniques
  • Declaring the appropriate research outcome with inferential and descriptive info precisely
  • Describe in a nutshell on the support of hypothesis and how the outcome is relevant to the research question
  • For the better understanding of the readers on your outcomes, you can include tables or figures.
  • Providing clear record on the outcomes that appropriates/inappropriate the research queries and explain the reason behind inappropriate outcomes.

Along with the thesis ideas that should be discussed inside the thesis chapters, a thesis generally has the power to decide your academic future. The effectiveness of every thesis is a debatable subject when you follow any profession related to your academic field. Our technical team’s practical explanation will help you understand the concept better to explain with others, and it is notable that we provide you confidential service

We assure you expected thesis results, and we are happy to extend our support and guidance for your research in other cyber security thesis ideas if you are interested. We provide you low-cost service, and we won’t let any chances for the cashback demands. We have years of reputation in project service, homework, and assignment writing.

So clutch this opportunity to work with us!!

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

Grad Coach

Research Topics & Ideas: Cybersecurity

50 Topic Ideas To Kickstart Your Research

Research topics and ideas about cybersecurity

If you’re just starting out exploring cybersecurity-related topics for your dissertation, thesis or research project, you’ve come to the right place. In this post, we’ll help kickstart your research by providing a hearty list of cybersecurity-related research topics and ideas , including examples from recent studies.

PS – This is just the start…

We know it’s exciting to run through a list of research topics, but please keep in mind that this list is just a starting point . These topic ideas provided here are intentionally broad and generic , so keep in mind that you will need to develop them further. Nevertheless, they should inspire some ideas for your project.

To develop a suitable research topic, you’ll need to identify a clear and convincing research gap , and a viable plan to fill that gap. If this sounds foreign to you, check out our free research topic webinar that explores how to find and refine a high-quality research topic, from scratch. Alternatively, consider our 1-on-1 coaching service .

Research topic idea mega list

Cybersecurity-Related Research Topics

  • Developing machine learning algorithms for early detection of cybersecurity threats.
  • The use of artificial intelligence in optimizing network traffic for telecommunication companies.
  • Investigating the impact of quantum computing on existing encryption methods.
  • The application of blockchain technology in securing Internet of Things (IoT) devices.
  • Developing efficient data mining techniques for large-scale social media analytics.
  • The role of virtual reality in enhancing online education platforms.
  • Investigating the effectiveness of various algorithms in reducing energy consumption in data centers.
  • The impact of edge computing on the performance of mobile applications in remote areas.
  • The application of computer vision techniques in automated medical diagnostics.
  • Developing natural language processing tools for sentiment analysis in customer service.
  • The use of augmented reality for training in high-risk industries like oil and gas.
  • Investigating the challenges of integrating AI into legacy enterprise systems.
  • The role of IT in managing supply chain disruptions during global crises.
  • Developing adaptive cybersecurity strategies for small and medium-sized enterprises.
  • The impact of 5G technology on the development of smart city solutions.
  • The application of machine learning in personalized e-commerce recommendations.
  • Investigating the use of cloud computing in improving government service delivery.
  • The role of IT in enhancing sustainability in the manufacturing sector.
  • Developing advanced algorithms for autonomous vehicle navigation.
  • The application of biometrics in enhancing banking security systems.
  • Investigating the ethical implications of facial recognition technology.
  • The role of data analytics in optimizing healthcare delivery systems.
  • Developing IoT solutions for efficient energy management in smart homes.
  • The impact of mobile computing on the evolution of e-health services.
  • The application of IT in disaster response and management.

Research topic evaluator

Cybersecurity Research Ideas (Continued)

  • Assessing the security implications of quantum computing on modern encryption methods.
  • The role of artificial intelligence in detecting and preventing phishing attacks.
  • Blockchain technology in secure voting systems: opportunities and challenges.
  • Cybersecurity strategies for protecting smart grids from targeted attacks.
  • Developing a cyber incident response framework for small to medium-sized enterprises.
  • The effectiveness of behavioural biometrics in preventing identity theft.
  • Securing Internet of Things (IoT) devices in healthcare: risks and solutions.
  • Analysis of cyber warfare tactics and their implications on national security.
  • Exploring the ethical boundaries of offensive cybersecurity measures.
  • Machine learning algorithms for predicting and mitigating DDoS attacks.
  • Study of cryptocurrency-related cybercrimes: patterns and prevention strategies.
  • Evaluating the impact of GDPR on data breach response strategies in the EU.
  • Developing enhanced security protocols for mobile banking applications.
  • An examination of cyber espionage tactics and countermeasures.
  • The role of human error in cybersecurity breaches: a behavioural analysis.
  • Investigating the use of deep fakes in cyber fraud: detection and prevention.
  • Cloud computing security: managing risks in multi-tenant environments.
  • Next-generation firewalls: evaluating performance and security features.
  • The impact of 5G technology on cybersecurity strategies and policies.
  • Secure coding practices: reducing vulnerabilities in software development.
  • Assessing the role of cyber insurance in mitigating financial losses from cyber attacks.
  • Implementing zero trust architecture in corporate networks: challenges and benefits.
  • Ransomware attacks on critical infrastructure: case studies and defence strategies.
  • Using big data analytics for proactive cyber threat intelligence.
  • Evaluating the effectiveness of cybersecurity awareness training in organisations.

Recent Cybersecurity-Related Studies

While the ideas we’ve presented above are a decent starting point for finding a research topic, they are fairly generic and non-specific. So, it helps to look at actual studies in the cybersecurity space to see how this all comes together in practice.

Below, we’ve included a selection of recent studies to help refine your thinking. These are actual studies,  so they can provide some useful insight as to what a research topic looks like in practice.

  • Cyber Security Vulnerability Detection Using Natural Language Processing (Singh et al., 2022)
  • Security for Cloud-Native Systems with an AI-Ops Engine (Ck et al., 2022)
  • Overview of Cyber Security (Yadav, 2022)
  • Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview (Mijwil et al., 2023)
  • Cyber Security: Strategy to Security Challenges A Review (Nistane & Sharma, 2022)
  • A Review Paper on Cyber Security (K & Venkatesh, 2022)
  • The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review (Mijwil, 2023)
  • Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime (Mijwil et al., 2023)
  • ESTABLISHING CYBERSECURITY AWARENESS OF TECHNICAL SECURITY MEASURES THROUGH A SERIOUS GAME (Harding et al., 2022)
  • Efficiency Evaluation of Cyber Security Based on EBM-DEA Model (Nguyen et al., 2022)
  • An Overview of the Present and Future of User Authentication (Al Kabir & Elmedany, 2022)
  • Cybersecurity Enterprises Policies: A Comparative Study (Mishra et al., 2022)
  • The Rise of Ransomware: A Review of Attacks, Detection Techniques, and Future Challenges (Kamil et al., 2022)
  • On the scale of Cyberspace and Cybersecurity (Pathan, 2022)
  • Analysis of techniques and attacking pattern in cyber security approach (Sharma et al., 2022)
  • Impact of Artificial Intelligence on Information Security in Business (Alawadhi et al., 2022)
  • Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security (Sasikala & Sharma, 2022)
  • Optimization of Secure Coding Practices in SDLC as Part of Cybersecurity Framework (Jakimoski et al., 2022)
  • CySSS ’22: 1st International Workshop on Cybersecurity and Social Sciences (Chan-Tin & Kennison, 2022)

As you can see, these research topics are a lot more focused than the generic topic ideas we presented earlier. So, for you to develop a high-quality research topic, you’ll need to get specific and laser-focused on a specific context with specific variables of interest.  In the video below, we explore some other important things you’ll need to consider when crafting your research topic.

Get 1-On-1 Help

If you’re still unsure about how to find a quality research topic, check out our Research Topic Kickstarter service, which is the perfect starting point for developing a unique, well-justified research topic.

Research Topic Kickstarter - Need Help Finding A Research Topic?

You Might Also Like:

Topic Kickstarter: Research topics in education

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • Print Friendly

University of Nebraska Omaha logo

  • Director's Welcome
  • Faculty & Staff Directory
  • News & Events
  • Policies, Forms & Resources
  • Faculty Grievance Resources
  • Applied Computing and Informatics
  • Bachelors of Science in Bioinformatics
  • Masters of Science in Biomedical Informatics
  • Minor in BIOI
  • Forms & Resources
  • Bachelor of Science in Cybersecurity
  • Master of Science in Cybersecurity
  • Minor in CYBR
  • Graduate Certificate in CYBR
  • Masters of Science in IT Innovation
  • Student Involvement

MS in Cybersecurity Thesis

Target students.

The thesis option allows students to plan, execute, and report on an individual project that addresses a substantial problem covering both practical and scientific aspects. Through the thesis project, students demonstrate their understanding of and ability to apply the concepts, methods, and techniques covered in the MS in Cybersecurity core and elective courses. Students planning to pursue a PhD degree after completing the MS in Cybersecurity degree are particularly encouraged to pick the thesis option.

Thesis Scope and Content

The thesis must represent an independent effort to address a significant and well-scoped problem. The thesis should present a treatment of this problem that has both practical and academic merit. Although some thesis projects may have a more practical focus and others a more academic focus, both aspects should be covered.

The thesis must be much broader in scope than a one-semester class project. It should address a topic that supersedes the content of a single course. The thesis topic can be proposed by the student. Inspiration for possible topics comes from exposure to the materials covered in the core courses and the concentrations, from current articles in vocational and academic publications, and from ongoing research projects from graduate faculty.

Degree Requirements

33 semester hours

The student is responsible for finding a Graduate Faculty Member to approve the thesis topic and agrees to supervise the thesis. Next, the student prepares a thesis proposal.

While preparing the proposal, the thesis supervisor and student form a thesis committee. The committee must be composed of three Graduate Faculty Members. Non-graduate faculty members can participate as co-chair or member of the committee. Ex-officio members (e.g., representatives from the organization where the thesis project is executed) can be included on the committee. The composition of the committee has to be approved by the MS in Cybersecurity Graduate Program Committee and the Dean for Graduate Studies.

The student can enroll in thesis hours:

  • after successfully defending the thesis proposal to the thesis committee and delivering the signed thesis proposal form to their advisor, and
  • after successfully completing 18 hours on the Plan of Study

The 6 thesis hours are expected to be taken over two semesters. However, the student's thesis supervisor can petition the Graduate Program Committee to grant registration of all 6 hours in a single semester.

Thesis Defense

The student must defend the thesis during a public oral examination by the thesis committee in the last semester of enrollment. The thesis committee may decide to:

  • pass the student, or
  • pass the student, contingent upon specified revisions, or
  • fail the student.

Graduate Program Requirements for International Students

International students should register for thesis along with other coursework, when possible. If the international student has not finished his/her thesis after two semesters (excluding summers), he/she will need to meet with his/her thesis supervisor and submit a projected date of completion form for an International Student Advisor's approval. It is recommended that the international student register for credit each semester in which he/she is working on the thesis.

UNO Graduate College - Proposed Supervisory Committee Form UNO Graduate College - Thesis Proposal Approval Form

Thesis Guide

UNO Graduate College - Guide for Preparing Theses

Google Custom Search

Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.

Hinweise zum Einsatz der Google Suche

Technical University of Munich

  • Professorship of Cyber Trust
  • TUM School of Computation, Information and Technology
  • Technical University of Munich

Technical University of Munich

Teaching at the Professorship of Cyber Trust

Theses and student projects.

We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects.

Application

Please send your application to one of our chair members via email, including your motivation (i.e. why you are interested in our research), a short CV and your current Examination Report (TUMonline → Studies → Transcripts → Print Examination Report). Please do not hesitate to contact us for further information.

Open Student Projects

This list is not comprehensive. Please browse through our researchers' websites if you are looking for different topics you may be interested to work on.

Assigned Student Projects

Completed student projects.

For enquiries call:

+1-469-442-0620

banner-in1

60+ Latest Cyber Security Research Topics in 2024

Home Blog Security 60+ Latest Cyber Security Research Topics in 2024

Play icon

The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cybersecurity thesis topics helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security. 

This article aims to demonstrate the most current Cyber Security Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security topics for the project, latest research titles about cyber security.

Cyber Security Research Topics

List of Trending Cyber Security Research Topics in 2024

Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends.

A. Exciting Mobile Cyber Security Research Paper Topics

  • The significance of continuous user authentication on mobile gadgets. 
  • The efficacy of different mobile security approaches. 
  • Detecting mobile phone hacking. 
  • Assessing the threat of using portable devices to access banking services. 
  • Cybersecurity and mobile applications. 
  • The vulnerabilities in wireless mobile data exchange. 
  • The rise of mobile malware. 
  • The evolution of Android malware.
  • How to know you’ve been hacked on mobile. 
  • The impact of mobile gadgets on cybersecurity. 

B. Top Computer and Software Security Topics to Research

  • Learn algorithms for data encryption 
  • Concept of risk management security 
  • How to develop the best Internet security software 
  • What are Encrypting Viruses- How does it work? 
  • How does a Ransomware attack work? 
  • Scanning of malware on your PC 
  • Infiltrating a Mac OS X operating system 
  • What are the effects of RSA on network security ? 
  • How do encrypting viruses work?
  • DDoS attacks on IoT devices 

C. Trending Information Security Research Topics

  • Why should people avoid sharing their details on Facebook? 
  • What is the importance of unified user profiles? 
  • Discuss Cookies and Privacy  
  • White hat and black hat hackers 
  • What are the most secure methods for ensuring data integrity? 
  • Talk about the implications of Wi-Fi hacking apps on mobile phones 
  • Analyze the data breaches in 2024
  • Discuss digital piracy in 2024
  • critical cyber-attack concepts 
  • Social engineering and its importance 

D. Current Network Security Research Topics

  • Data storage centralization
  • Identify Malicious activity on a computer system. 
  • Firewall 
  • Importance of keeping updated Software  
  • wireless sensor network 
  • What are the effects of ad-hoc networks  
  • How can a company network be safe? 
  • What are Network segmentation and its applications? 
  • Discuss Data Loss Prevention systems  
  • Discuss various methods for establishing secure algorithms in a network. 
  • Talk about two-factor authentication

E. Best Data Security Research Topics

  • Importance of backup and recovery 
  • Benefits of logging for applications 
  • Understand physical data security 
  • Importance of Cloud Security 
  • In computing, the relationship between privacy and data security 
  • Talk about data leaks in mobile apps 
  • Discuss the effects of a black hole on a network system. 

F. Important Application Security Research Topics

  • Detect Malicious Activity on Google Play Apps 
  • Dangers of XSS attacks on apps 
  • Discuss SQL injection attacks. 
  • Insecure Deserialization Effect 
  • Check Security protocols 

G. Cybersecurity Law & Ethics Research Topics

  • Strict cybersecurity laws in China 
  • Importance of the Cybersecurity Information Sharing Act. 
  • USA, UK, and other countries' cybersecurity laws  
  • Discuss The Pipeline Security Act in the United States 

H. Recent Cyberbullying Topics

  • Protecting your Online Identity and Reputation 
  • Online Safety 
  • Sexual Harassment and Sexual Bullying 
  • Dealing with Bullying 
  • Stress Center for Teens 

I. Operational Security Topics

  • Identify sensitive data 
  • Identify possible threats 
  • Analyze security threats and vulnerabilities 
  • Appraise the threat level and vulnerability risk 
  • Devise a plan to mitigate the threats 

J. Cybercrime Topics for a Research Paper

  • Crime Prevention. 
  • Criminal Specialization. 
  • Drug Courts. 
  • Criminal Courts. 
  • Criminal Justice Ethics. 
  • Capital Punishment.
  • Community Corrections. 
  • Criminal Law. 

Cyber Security Future Research Topics

  • Developing more effective methods for detecting and responding to cyber attacks
  • Investigating the role of social media in cyber security
  • Examining the impact of cloud computing on cyber security
  • Investigating the security implications of the Internet of Things
  • Studying the effectiveness of current cyber security measures
  • Identifying new cyber security threats and vulnerabilities
  • Developing more effective cyber security policies
  • Examining the ethical implications of cyber security

Cyber Security Topics For Research Paper

  • Cyber security threats and vulnerabilities
  • Cyber security incident response and management
  • Cyber security risk management
  • Cyber security awareness and training
  • Cyber security controls and countermeasures
  • Cyber security governance
  • Cyber security standards
  • Cyber security insurance
  • Cyber security and the law
  • The future of cyber security

5 Current Research Topics in Cybersecurity

Below are the latest 5 cybersecurity research topics. They are:

  • Artificial Intelligence
  • Digital Supply Chains
  • Internet of Things
  • State-Sponsored Attacks
  • Working From Home

Research Area in Cyber Security

The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including: 

  • Quantum & Space  
  • Data Privacy  
  • Criminology & Law 
  • AI & IoT Security
  • RFID Security
  • Authorisation Infrastructure
  • Digital Forensics
  • Autonomous Security
  • Social Influence on Social Networks

How to Choose the Best Research Topics in Cyber Security

A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics. 

1. Brainstorm

In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible. 

2. Understanding the Background

In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it. 

3. Write a Single Topic

Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about. 

4. Be Flexible

There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out. 

The Layout of Cybersecurity Research Guidance

It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.  

In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness. 

Writing Tips from Expert

Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security Research Topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.

  • Before you begin writing your research paper, make sure you understand the assignment. 
  • Your Research Paper Should Have an Engaging Topic 
  • Find reputable sources by doing a little research 
  • Precisely state your thesis on cybersecurity 
  • A rough outline should be developed 
  • Finish your paper by writing a draft 
  • Make sure that your bibliography is formatted correctly and cites your sources. 
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!

Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.

The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.

Frequently Asked Questions (FAQs)

Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices. 

Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others. 

The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security. 

Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses? 

Profile

Mrinal Prakash

I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cyber Security Batches & Dates

Course advisor icon

Cyber Security Project Proposal

A proposal work is considered as an initial and important process to get approval for carrying out further processes. At phdprojects.org, we offer an array of captivating Cyber Security Project Proposal topics that are well-defined and intriguing. Our aim is to provide you with a clear focus, allowing you to delve into precise research questions and objectives. For a cybersecurity-based project proposal, we provide a pattern below that could be altered in terms of particular project necessities or demands:

Cybersecurity Project Proposal Template

  • SecureIT: Enhancing Cyber Resilience in Small and Medium Enterprises (SMEs)

Executive Summary

  • Explain the project, the issue that it intends to tackle effectively, and its goal in a concise manner. For example: By creating an extensive cybersecurity toolkit based on the resource limitations and specific requirements of small industries, SecureIT intends to improve the cyber resilience of SMEs.

Introduction

  • Background: Based on the relevance of the project, offer background details. For SMEs, the significance of cybersecurity has to be described. The more general issues that are confronted by SMEs like constrained cybersecurity knowledge and budgets must be explained in the introduction section.
  • Problem Statement: Describe the research issue in an explicit way. As an instance: To apply efficient cybersecurity solutions, SMEs do not have sufficient resources, because of this, cybercriminals can easily focus them.
  • For SMEs, create a cost-efficient cybersecurity-related toolkit.
  • To aware SMEs workers, carry out cybersecurity attention training.
  • In order to react and retrieve from cyber phenomena, develop a protocol for SMEs.

Methodology

  • Toolkit Development: By considering the choice of resources and tools regarding the requirements of SME, the process that will be carried out to create a cybersecurity toolkit should be explained.
  • Training Program: The scheme of the cybersecurity attention training must be summarized explicitly. It particularly encompasses the dissemination approach like online programs or workshops, and the topics that are important to consider.
  • Incident Response Protocol: To create a cybersecurity phenomenon response protocol for SMEs, the specific method that could be followed has to be described. Major procedures for phenomenon detection, control, elimination, and rehabilitation must be defined.

Target Audience

  • The SME firms or companies that will be focused by the project and any particular conditions for involvement purposes must be specified.

Expected Outcomes

  • The results that you expect from your project have to be discussed. It might include minimized occurrence of cyber assaults, enhanced attention towards cyber hazards, and strengthened cybersecurity measures over involved SMEs.
  • By examining the major sections and progressions such as creation of toolkit, training executions, and assessment, offer a determined time-frame for the project.
  • On the basis of expenses for creation of toolkit, training sources, other necessary resources and workers, summarize the approximate budget.

Evaluation and Impact Assessment

  • In what way you will assess the achievements and implications of the project should be explained. It could encompass qualitative as well as quantitative indicators, For instance: number of cyber phenomena that occurred before and after applying toolkit, pre- and post-training evaluation marks.

Sustainability and Future Work

  • Over the project time-frame, in what way the results of the project will be persistent has to be described. If you have any idea or plans for further enhancement or exploration, specify them in an explicit way.
  • The conclusion phase must include the explanation based on the importance of the project. In improving cybersecurity in SMEs, the possible implications of the project should be described.
  • It is significant to mention all the references or materials that are referred to in the proposal.
  • In the appendices section, any additional sources like in-depth budget plans, major project worker’s resumes, or approval documents have to be encompassed.

What is the thesis for cyber security?

Cybersecurity-related thesis specifically includes several areas like cryptography, information security, threat investigation, network security, and other relevant areas and its major aim is to create novel mechanisms, solve particular limitations, or research conceptual theories based on cybersecurity.

Structure of a Cybersecurity Thesis

In terms of various educational programs, the particular necessities for a thesis can differ. Below, we offer the general structure of cybersecurity-based thesis to consider:

  • Title Page: In the title page, include the thesis specific title, name of the author, university, department, and the submission date.
  • Abstract: By encompassing research issues, methodology, major discoveries, and conclusions, offer an outline in a concise manner.
  • Acknowledgments: It is an optional phase for recognizing persons who supported you in the exploration process.
  • Table of Contents: The chapters and major phases of the thesis must be mentioned in the table of contents with their appropriate paginations.
  • List of Figures/Tables: Along with page numbers, list out all the tables and figures that are encompassed in the thesis if required.
  • Introduction: This section should include the introduction of research issues, summarization of research queries or goals, explanation of background details, and demonstration of the thesis statement.
  • Literature Review: Specifically for finding gaps that could be addressed by your thesis, analyze previous studies and literature relevant to the selected thesis topic.
  • Methodology: By incorporating data gathering and analysis methods, the research approaches that you employed for carrying out the exploration have to be explained clearly.
  • Results: In a logical and explicit way, depict the discoveries of the study by utilizing statistical analysis, figures, and tables.
  • Discussion: The discussion section must include the explanation based on the outcomes by considering how they align into the extensive background of previous studies and their impacts.
  • Conclusion: Major discoveries of your study must be outlined. For further exploration, recommend potential areas. This phase must recognize the challenges that exist in your research.
  • References: Adhere to the suitable citation style for mentioning all the materials that are referred to in your thesis.
  • Appendices: Related to the study, any additional sources like code snippets, in-depth methodologies, or data sheets could be included in the appendices section.

Instance of Thesis Topics in Cybersecurity

  • In offering protective interaction channels against upcoming quantum computing hazards, the effectiveness of quantum cryptography has to be explored.
  • To find and reduce hazards in IoT platforms, model and assess an intrusion identification system that specifically employs methods of machine learning.
  • Examine how cybersecurity policies and data security approaches have been impacted by General Data Protection Regulation (GDPR) globally.
  • For developing a reliable, tamper-resistant, and protective electronic voting framework, the benefits of blockchain mechanism must be studied.
  • In order to interpret the part of human faults, analyze the phenomena of cybersecurity violations. To minimize vulnerability with the support of attention courses and training, create policies.

Cyber Security Thesis Ideas

Cyber Security Thesis Proposal

Are you struggling to find information on a specific theme for your Cyber Security Thesis Proposal? Don’t worry about spending endless hours on research – we know how busy scholars can be. At phdprojects.org, our experts specialize in crafting flawless proposals that are both engaging and informative. If you’re still looking for brainstorming topics, check out some of our ideas for your research inspiration!

  • A new perspective of network vulnerability analysis using Network Security Gradient
  • An Eco-Defending Architecture for Network Security Based on Immuninty and Mobile Agents
  • Research on Network Security Protection System Based on Fusion of Computer Big Data Technology
  • A Design and Implementation of Wireless Sensor Network Security on Nano-Qplus Platform
  • Study on Applying the Neural Network in Computer Network Security Assessment
  • Improvement on advanced security network module on real telecommunication infrastructure
  • A Survey on Interfaces to Network Security Functions in Network Virtualization
  • Improve the Network Security During the Implementation of IoT Application Using Data Encryption and Trustworthy Network
  • Towards Improved Network Security Requirements and Policy: Domain-Specific Completeness Analysis via Topic Modeling
  • A Quantification Method for Network Security Situational Awareness Based on Conditional Random Fields
  • Study on Core Network Security Enhancement Strategies in 5G Private Networks
  • Research on Computer Network Security Framework Based on Concurrent Data Detection and Security Modelling
  • Research on network security situation awareness method based on topology analysis
  • The network security situation predicting technology based on the small-world echo state network
  • The research of worm distributed detection technology based on network security
  • A Structured Investigation of Network Security Strategies and its Applications
  • Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks
  • Analysis of the implementation method of network security in the logical security domain of edge power secondary integration equipment
  • An Extraction Method of Situational Factors for Network Security Situational Awareness
  • Situational Control of a Computer Network Security System in Conditions of Cyber Attacks
  • PHD Guidance
  • PHD PROJECTS UK
  • PHD ASSISTANCE IN BANGALORE
  • PHD Assistance
  • PHD In 3 Months
  • PHD Dissertation Help
  • PHD IN JAVA PROGRAMMING
  • PHD PROJECTS IN MATLAB
  • PHD PROJECTS IN RTOOL
  • PHD PROJECTS IN WEKA
  • PhD projects in computer networking
  • COMPUTER SCIENCE THESIS TOPICS FOR UNDERGRADUATES
  • PHD PROJECTS AUSTRALIA
  • PHD COMPANY
  • PhD THESIS STRUCTURE
  • PHD GUIDANCE HELP
  • PHD PROJECTS IN HADOOP
  • PHD PROJECTS IN OPENCV
  • PHD PROJECTS IN SCILAB
  • PHD PROJECTS IN WORDNET
  • NETWORKING PROJECTS FOR PHD
  • THESIS TOPICS FOR COMPUTER SCIENCE STUDENTS
  • IEEE JOURNALS IN COMPUTER SCIENCE
  • OPEN ACCESS JOURNALS IN COMPUTER SCIENCE
  • SCIENCE CITATION INDEX COMPUTER SCIENCE JOURNALS
  • SPRINGER JOURNALS IN COMPUTER SCIENCE
  • ELSEVIER JOURNALS IN COMPUTER SCIENCE
  • ACM JOURNALS IN COMPUTER SCIENCE
  • INTERNATIONAL JOURNALS FOR COMPUTER SCIENCE AND ENGINEERING
  • COMPUTER SCIENCE JOURNALS WITHOUT PUBLICATION FEE
  • SCIENCE CITATION INDEX EXPANDED JOURNALS LIST
  • THOMSON REUTERS INDEXED JOURNALS
  • DOAJ COMPUTER SCIENCE JOURNALS
  • SCOPUS INDEXED COMPUTER SCIENCE JOURNALS
  • SCI INDEXED COMPUTER SCIENCE JOURNALS
  • SPRINGER JOURNALS IN COMPUTER SCIENCE AND TECHNOLOGY
  • ISI INDEXED JOURNALS IN COMPUTER SCIENCE
  • PAID JOURNALS IN COMPUTER SCIENCE
  • NATIONAL JOURNALS IN COMPUTER SCIENCE AND ENGINEERING
  • MONTHLY JOURNALS IN COMPUTER SCIENCE
  • SCIMAGO JOURNALS LIST
  • THOMSON REUTERS INDEXED COMPUTER SCIENCE JOURNALS
  • RESEARCH PAPER FOR SALE
  • CHEAP PAPER WRITING SERVICE
  • RESEARCH PAPER ASSISTANCE
  • THESIS BUILDER
  • WRITING YOUR JOURNAL ARTICLE IN 12 WEEKS
  • WRITE MY PAPER FOR ME
  • PHD PAPER WRITING SERVICE
  • THESIS MAKER
  • THESIS HELPER
  • DISSERTATION HELP UK
  • DISSERTATION WRITERS UK
  • BUY DISSERTATION ONLINE
  • PHD THESIS WRITING SERVICES
  • DISSERTATION WRITING SERVICES UK
  • DISSERTATION WRITING HELP
  • PHD PROJECTS IN COMPUTER SCIENCE
  • DISSERTATION ASSISTANCE

75 Cyber Security Research Topics in 2024

75 Cyber Security Research Topics in 2024

Introduction to Cybersecurity Research

Cybersecurity research aims to protect computer systems, networks, and data from unauthorised access, theft, or damage. It involves studying and developing methods and techniques to identify, understand, and mitigate cyber threats and vulnerabilities. 

The field can be divided into theoretical and applied research and faces challenges such as

  • Increasing complexity 
  • New forms of malware 
  • The growing sophistication of cyber attacks

On a daily basis, approximately 2,200 cyber attacks occur, with an average of one cyber attack happening every 39 seconds. This is the reason why researchers must stay up-to-date and collaborate with others in the field. 

In this article, let’s discuss the different cybersecurity research topics and how they will help you become an expert in the field.

Ads of upGrad blog

Check out our  free technology courses  to get an edge over the competition.

Here are some of the latest research topics in cyber security – 

Emerging Cyber Threats and Vulnerabilities in 2024

Continual technological advancements lead to changes in cybersecurity trends, with data breaches, ransomware, and hacks becoming more prevalent. 

  • Cyber Attacks and Their Countermeasures – Discuss – This research paper will discuss various cyber attacks and their corresponding countermeasures. It aims to provide insights on how organisations can better protect themselves from cyber threats.
  • Is Cryptography Necessary for Cybersecurity Applications? – Explore the role of cryptography in ensuring the confidentiality, integrity, and availability of data and information in cybersecurity. It would examine the various cryptographic techniques used in cybersecurity and their effectiveness in protecting against cyber threats.

Here are some other cyber security topics that you may consider – 

  • Discuss the Application of Cyber Security for Cloud-based Applications 
  • Data Analytics Tools in Cybersecurity
  • Malware Analysis
  • What Are the Behavioural Aspects of Cyber Security? 
  • Role of Cyber Security on Intelligent Transporation Systems
  • How to Stop and Spot Different Types of Malware?

Check Out upGrad’s  Software Development Courses  to upskill yourself.

Machine Learning and AI in Cybersecurity Research

Machine learning and AI are research topics in cybersecurity, aiming to develop algorithms for threat detection, enhance intelligence and automate risk mitigation. However, security risks like adversarial attacks require attention.

trending cyber security research topcs

  • Using AI/ML to Analyse Cyber Threats – This cyber security research paper analyses cyber threats and could include an overview of the current state of cyber threats and how AI/ML can help with threat detection and response. The paper could also discuss the challenges and limitations of using AI/ML in cybersecurity and potential areas for further research.

Here are some other topics to consider – 

  • Developing Cognitive Systems for Cyber Threat Detection and Response
  • Developing Distributed Ai Systems to Enhance Cybersecurity
  • Developing Deep Learning Architectures for Cyber Defence
  • Exploring the Use of Computational Intelligence and Neuroscience in Enhancing Security and Privacy
  • How is Cyber Security Relevant for Everyone? Discuss
  • Discuss the Importance of Network Traffic Analysis
  • How to Build an App to Break Ceasar Cipher

You can check out the Advanced Certificate Programme in Cyber Security course by upGrad, which will help students become experts in cyber security. 

IoT Security and Privacy

IoT security and privacy research aim to develop secure and privacy-preserving architectures, protocols, and algorithms for IoT devices, including encryption, access control, and secure communication. The challenge is to balance security with usability while addressing the risk of cyber-attacks and compromised privacy.

  • Service Orchestration and Routing for IoT – It may focus on developing efficient and secure methods for managing and routing traffic between IoT devices and services. The paper may explore different approaches for optimising service orchestration. 
  • Efficient Resource Management, Energy Harvesting, and Power Consumption in IoT – This paper may focus on developing strategies to improve energy use efficiency in IoT devices. This may involve investigating the use of energy harvesting technologies, optimising resource allocation and management, and exploring methods to reduce power consumption.

Here are some other cyber security project topics to consider – 

  • Computation and Communication Gateways for IoT
  • The Miniaturisation of Sensors, Cpus, and Networks in IoT
  • Big Data Analytics in IoT
  • Semantic Technologies in IoT
  • Virtualisation in IoT
  • Privacy, Security, Trust, Identity, and Anonymity in IoT
  • Heterogeneity, Dynamics, and Scale in IoT
  • Consequences of Leaving Unlocked Devices Unattended

Explore our Popular Software Engineering Courses

Blockchain security: research challenges and opportunities.

Blockchain security research aims to develop secure and decentralised architectures, consensus algorithms, and privacy-preserving techniques while addressing challenges such as smart contract security and consensus manipulation. Opportunities include transparent supply chain management and decentralised identity management.

  • Advanced Cryptographic Technologies in the Blockchain – Explore the latest advancements and emerging trends in cryptographic techniques used in blockchain-based systems. It could also analyse the security and privacy implications of these technologies and discuss their potential impact. 
  • Applications of Smart Contracts in Blockchain – Explore the various use cases and potential benefits of using smart contracts to automate and secure business processes. It could also examine the challenges and limitations of smart contracts and propose potential solutions for these issues.

Here are some other topics – 

  • Ensuring Data Consistency, Transparency, and Privacy in the Blockchain
  • Emerging Blockchain Models for Digital Currencies
  • Blockchain for Advanced Information Governance Models
  • The Role of Blockchain in Future Wireless Mobile Networks
  • Law and Regulation Issues in the Blockchain
  • Transaction Processing and Modification in the Blockchain
  • Collaboration of Big Data With Blockchain Networks

Cloud Security: Trends and Innovations in Research

Cloud security research aims to develop innovative techniques and technologies for securing cloud computing environments, including threat detection with AI, SECaaS, encryption and access control, secure backup and disaster recovery, container security, and blockchain-based solutions. The goal is to ensure the security, privacy, and integrity of cloud-based data and applications for organisations.

  • Posture Management in Cloud Security – Discuss the importance of identifying and addressing vulnerabilities in cloud-based systems and strategies for maintaining a secure posture over time. This could include topics such as threat modelling, risk assessment, access control, and continuous monitoring.
  • Are Cloud Services 100% Secure?
  • What is the Importance of Cloud Security?
  • Cloud Security Service to Identify Unauthorised User Behaviour
  • Preventing Theft-of-service Attacks and Ensuring Cloud Security on Virtual Machines
  • Security Requirements for Cloud Computing
  • Privacy and Security of Cloud Computing

Explore Our Software Development Free Courses

Cybercrime investigations and forensics.

Cybercrime investigations and forensics involve analysing digital evidence to identify and prosecute cybercriminals, including developing new data recovery, analysis, and preservation techniques. Research also focuses on identifying cybercriminals and improving legal and regulatory frameworks for prosecuting cybercrime.

  • Black Hat and White Hat Hacking: Comparison and Contrast – Explore the similarities and differences between these two approaches to hacking. It would examine the motivations and methods of both types of hackers and their impact on cybersecurity.
  • Legal Requirements for Computer Forensics Laboratories
  • Wireless Hacking Techniques: Emerging Technologies and Mitigation Strategies
  • Cyber Crime: Current Issues and Threats
  • Computer Forensics in Law Enforcement: Importance and Challenges
  • Basic Procedures for Computer Forensics and Investigations
  • Digital Forensic Examination of Counterfeit Documents: Techniques and Tools
  • Cybersecurity and Cybercrime: Understanding the Nature and Scope

An integral part of cybercrime investigation is to learn software development. Become experts in this field with the help of upGrad’s Executive Post Graduate Programme in Software Development – Specialisation in Full Stack Development . 

Cybersecurity Policy and Regulations

Cybersecurity policy and regulations research aims to develop laws, regulations, and guidelines to ensure the security and privacy of digital systems and data, including addressing gaps in existing policies, promoting international cooperation, and developing standards and best practices for cybersecurity. The goal is to protect digital systems and data while promoting innovation and growth in the digital economy.

  • The Ethicality of Government Access to Citizens’ Data – Explore the ethical considerations surrounding government access to citizens’ data for surveillance and security purposes, analysing the potential risks and benefits and the legal and social implications of such access. 
  • The Moral Permissibility of Using Music Streaming Services – Explore the ethical implications of using music streaming services, examining issues such as intellectual property rights, artist compensation, and the environmental impact of streaming. 
  • Real Name Requirements on Internet Forums
  • Restrictions to Prevent Domain Speculation
  • Regulating Adult Content Visibility on the Internet
  • Justification for Illegal Downloading
  • Adapting Law Enforcement to Online Technologies
  • Balancing Data Privacy With Convenience and Centralisation
  • Understanding the Nature and Dangers of Cyber Terrorism

Human Factors in Cybersecurity

Human factors in cybersecurity research study how human behaviour impacts cybersecurity, including designing interfaces, developing security training, addressing user error and negligence, and examining cybersecurity’s social and cultural aspects. The goal is to improve security by mitigating human-related security risks.

  • Review the Human Factors in Cybersecurity –  It explores various human factors such as awareness, behaviour, training, and culture and their influence on cybersecurity, offering insights and recommendations for improving cybersecurity outcomes.
  • Integrating Human Factors in Cybersecurity for Better Risk Management
  • Address the Human Factors in Cybersecurity Leadership
  • Human Factors in IoT Security
  • Internal Vulnerabilities: the Human Factor in It Security
  • Cyber Security Human Factors – the Ultimate List of Statistics and Data

In-Demand Software Development Skills

Cybersecurity education and awareness.

Cybersecurity education and awareness aims to educate individuals and organisations about potential cybersecurity threats and best practices to prevent cyber attacks. It involves promoting safe online behaviour, training on cybersecurity protocols, and raising awareness about emerging cyber threats.

  • Identifying Phishing Attacks – This research paper explores various techniques and tools to identify and prevent phishing attacks, which are common types of cyber attacks that rely on social engineering tactics to trick victims into divulging sensitive information or installing malware on their devices.
  • Risks of Password Reuse for Personal and Professional Accounts – Investigate the risks associated with reusing the same password across different personal and professional accounts, such as the possibility of credential stuffing attacks and the impact of compromised accounts on organisational security. 
  • Effective Defence Against Ransomware
  • Information Access Management: Privilege and Need-to-know Access
  • Protecting Sensitive Data on Removable Media
  • Recognising Social Engineering Attacks
  • Preventing Unauthorised Access to Secure Areas: Detecting Piggybacking and Tailgating
  • E-mail Attack and Its Characteristics
  • Safe Wifi Practice: Understanding VPN

With the increasing use of digital systems and networks, avoiding potential cyber-attacks is more important than ever. The 75 research topics outlined in this list offer a glimpse into the different dimensions of this important field. By focusing on these areas, researchers can make significant contributions to enhancing the security and safety of individuals, organisations, and society as a whole.

upGrad’s Master of Science in Computer Science program is one of the top courses students can complete to become experts in the field of tech and cyber security. The program covers topics such as Java Programming and other forms of software engineering which will help students understand the latest technologies and techniques used in cyber security. 

The program also includes hands-on projects and case studies to ensure students have practical experience in applying these concepts. Graduates will be well-equipped to take on challenging roles in the rapidly growing field of cyber security.

Profile

Pavan Vadapalli

Something went wrong

Our Popular Software Engineering Courses

Full Stack Development

Our Trending Software Engineering Courses

  • Master of Science in Computer Science from LJMU
  • Executive PG Program in Software Development Specialisation in Full Stack Development from IIIT-B
  • Advanced Certificate Programme in Cyber Security from IIITB
  • Full Stack Software Development Bootcamp
  • Software Engineering Bootcamp from upGrad

Popular Software Development Skills

  • React Courses
  • Javascript Courses
  • Core Java Courses
  • Data Structures Courses
  • ReactJS Courses
  • NodeJS Courses
  • Blockchain Courses
  • SQL Courses
  • Full Stack Development Courses
  • Big Data Courses
  • Devops Courses
  • NFT Courses
  • Cyber Security Courses
  • Cloud Computing Courses
  • Database Design Courses
  • Crypto Courses
  • Python Courses

Frequently Asked Questions (FAQs)

Artificial intelligence (AI) has proved to be an effective tool in cyber defence. AI is anticipated to gain even more prominence in 2024, mainly in monitoring, resource and threat analysis, and quick response capabilities.

One area of focus is the development of secure quantum and space communications to address the increasing use of quantum technologies and space travel. Another area of research is improving data privacy.

The approach to cybersecurity is expected to change from defending against attacks to acknowledging and managing ongoing cyber risks. The focus will be on improving resilience and recovering from potential cyber incidents.

Related Programs View All

Certification

40 Hrs Live, Expert-Led Sessions

2 High-Quality Practice Exams

View Program

cyber security thesis proposal

Master's Degree

40000+ Enrolled Learners

cyber security thesis proposal

Executive PG Program

IIIT-B Alumni Status

cyber security thesis proposal

2 Unique Specialisations

cyber security thesis proposal

Job Assistance

300+ Hiring Partners

159+ Hours of Live Sessions

cyber security thesis proposal

126+ Hours of Live Sessions

Fully Online

20+ Hrs Instructor-Led Sessions

Live Doubt-Solving Sessions

13+ Hrs Instructor-Led Sessions

17+ Hrs Instructor-Led Training

3 Real-World Capstone Projects

32-Hr Training by Dustin Brimberry

Question Bank with 300+ Practice Qs

16 Hrs Live Expert-Led Training

CLF-C02 Exam Prep Support

cyber security thesis proposal

Microsoft-Approved Curriculum

24 Hrs Live Expert-Led Training

4 Real-World Capstone Projects

45 Hrs Live Expert-Led Training

289 Hours of Self-Paced Learning

10+ Capstone Projects

288 Hours Self-Paced Learning

9 Capstone Projects

490+ Hours Self-Paced Learning

4 Real-World Projects

690+ Hours Self-Paced Learning

Cloud Labs-Enabled Learning

40 Hrs Live Expert-Led Sessions

2 Mock Exams, 9 Assessments

cyber security thesis proposal

Executive PG Certification

GenAI integrated curriculum

cyber security thesis proposal

Job Prep Support

Instructor-Led Sessions

Hands-on UI/UX

16 Hrs Live Expert-Led Sessions

12 Hrs Hand-On Practice

30+ Hrs Live Expert-Led Sessions

24+ Hrs Hands-On with Open Stack

2 Days Live, Expert-Led Sessions

34+ Hrs Instructor-Led Sessions

10 Real-World Live Projects

24 Hrs Live Expert-Led Sessions

16 Hrs Hand-On Practice

8 Hrs Instructor-Led Training

Case-Study Based Discussions

40 Hrs Instructor-Led Sessions

Hands-On Practice, Exam Support

24-Hrs Live Expert-Led Sessions

Regular Doubt-Clearing Sessions

Extensive Exam Prep Support

6 Hrs Live Expert-Led Sessions

440+ Hours Self-Paced Learning

400 Hours of Cloud Labs

15-Hrs Live Expert-Led Sessions

32 Hrs Live Expert-Led Sessions

28 Hrs Hand-On Practice

Mentorship by Industry Experts

24 Hrs Live Trainer-Led Sessions

Mentorship by Certified Trainers

GenAI Integrated Curriculum

Full Access to Digital Resources

16 Hrs Live Instructor-Led Sessions

80+ Hrs Hands-On with Cloud Labs

160+ Hours Live Instructor-Led Sessions

Hackathons and Mock Interviews

31+ Hrs Instructor-Led Sessions

120+ Hrs of Cloud Labs Access

35+ Hrs Instructor-Led Sessions

6 Real-World Live Projects

24+ Hrs Instructor-Led Training

Self-Paced Course by Nikolai Schuler

Access Digital Resources Library

300+ Hrs Live Expert-Led Training

90 Hrs Doubt Clearing Sessions

56 Hours Instructor-Led Sessions

82 Hrs Live Expert-Led Sessions

22 Hrs Live, Expert-Led Sessions

CISA Job Practice Exams

Explore Free Courses

Study Abroad Free Course

Learn more about the education system, top universities, entrance tests, course information, and employment opportunities in Canada through this course.

Marketing

Advance your career in the field of marketing with Industry relevant free courses

Data Science & Machine Learning

Build your foundation in one of the hottest industry of the 21st century

Management

Master industry-relevant skills that are required to become a leader and drive organizational success

Technology

Build essential technical skills to move forward in your career in these evolving times

Career Planning

Get insights from industry leaders and career counselors and learn how to stay ahead in your career

Law

Kickstart your career in law by building a solid foundation with these relevant free courses.

Chat GPT + Gen AI

Stay ahead of the curve and upskill yourself on Generative AI and ChatGPT

Soft Skills

Build your confidence by learning essential soft skills to help you become an Industry ready professional.

Study Abroad Free Course

Learn more about the education system, top universities, entrance tests, course information, and employment opportunities in USA through this course.

Suggested Tutorials

Python Tutorial

Explore Python programming with this concise tutorial, covering basics to advanced concepts for beginners and enthusiasts alike.

C Tutorial

Introduction to C Programming, Learn all the C programming language concepts in this tutorial.

Suggested Blogs

Best Jobs in IT without coding

12 Apr 2024

Scrum Master Salary in India: For Freshers & Experienced [2023]

by Rohan Vats

05 Mar 2024

SDE Developer Salary in India: For Freshers & Experienced [2024]

by Prateek Singh

29 Feb 2024

Marquee Tag & Attributes in HTML: Features, Uses, Examples

by venkatesh Rajanala

What is Coding? Uses of Coding for Software Engineer in 2024

by Harish K

Functions of Operating System: Features, Uses, Types

by Geetika Mathur

What is Information Technology? Definition and Examples

by spandita hati

50 Networking Interview Questions & Answers (Freshers & Experienced)

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Dissertations / Theses on the topic 'Computer security ; cybersecurity'

Create a spot-on reference in apa, mla, chicago, harvard, and other styles.

Consult the top 47 dissertations / theses for your research on the topic 'Computer security ; cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Choi, Min Suk. "Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/119.

Locke, Ronald Taylor. "Anomaly detection with applications in environmental and cyber security." Thesis, Boston University, 2012. https://hdl.handle.net/2144/33260.

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Gcaza, Noluxolo. "A national strategy towards cultivating a cybersecurity culture in South Africa." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.

Loughry, Joe. "Security test and evaluation of cross domain systems." Thesis, University of Oxford, 2014. https://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352.

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Johnson, William. "Development of Peer Instruction Material for a Cybersecurity Curriculum." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2367.

Deshpande, Pranita. "Assessment Of Two Pedagogical Tools For Cybersecurity Education." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2557.

Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.

Goode, Jodi. "Comparing Training Methodologies on Employee’s Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical Programs." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1045.

Cardarelli, Anthony. "Automated Deployment of a Security Operations Center." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592133599167901.

Selinger, David Emanuel. "Designing a Security Education Curriculum Using Gamification Principles." Kent State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1574424122762057.

Sengelmann, Michael. "An Overview of Reverse Engineering and A Security Analysis of TikTok." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613748245334672.

Friman, Nelly. "Security Analysis of Smart Buildings." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279423.

Amir-Mohammadian, Sepehr. "A Formal Approach to Combining Prospective and Retrospective Security." ScholarWorks @ UVM, 2017. http://scholarworks.uvm.edu/graddis/802.

Horcher, Ann-Marie. "Conservation of Limited Resources: Design Principles for Security and Usability on Mobile Devices." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1028.

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Muedas, Higginson Ana Cristina, and Velásquez Renato Germán Rojas. "Modelo de madurez de seguridad de aplicaciones web ante ciberataques para clínicas de nivel 2." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/628108.

Rodriguez, Ricardo J. "An Electroencephalogram (EEG) Based Biometrics Investigation for Authentication| A Human-Computer Interaction (HCI) Approach." Thesis, Nova Southeastern University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3723216.

Encephalogram (EEG) devices are one of the active research areas in human-computer interaction (HCI). They provide a unique brain-machine interface (BMI) for interacting with a growing number of applications. EEG devices interface with computational systems, including traditional desktop computers and more recently mobile devices. These computational systems can be targeted by malicious users. There is clearly an opportunity to leverage EEG capabilities for increasing the efficiency of access control mechanisms, which are the first line of defense in any computational system.

Access control mechanisms rely on a number of authenticators, including “what you know”, “what you have”, and “what you are”. The “what you are” authenticator, formally known as a biometrics authenticator, is increasingly gaining acceptance. It uses an individual’s unique features such as fingerprints and facial images to properly authenticate users. An emerging approach in physiological biometrics is cognitive biometrics, which measures brain’s response to stimuli. These stimuli can be measured by a number of devices, including EEG systems.

This work shows an approach to authenticate users interacting with their computational devices through the use of EEG devices. The results demonstrate the feasibility of using a unique hard-to-forge trait as an absolute biometrics authenticator by exploiting the signals generated by different areas of the brain when exposed to visual stimuli. The outcome of this research highlights the importance of the prefrontal cortex and temporal lobes to capture unique responses to images that trigger emotional responses.

Additionally, the utilization of logarithmic band power processing combined with LDA as the machine learning algorithm provides higher accuracy when compared against common spatial patterns or windowed means processing in combination with GMM and SVM machine learning algorithms. These results continue to validate the value of logarithmic band power processing and LDA when applied to oscillatory processes.

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Curran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.

Gaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.

Habeeb, Richard. "Improving the Security of Building Automation Systems Through an seL4-based Communication Framework." Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7161.

Doyle, Marc. "Comprehending the Safety Paradox and Privacy Concerns with Medical Device Remote Patient Monitoring." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1090.

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Hedlund, Filip, and Emma Loots. "Information Security Risk Assessment : An Analysis of a Medical Aid Service." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284151.

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Persson, Sebastian. "Who Watches The Privileged Users." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414648.

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Shirley, Brandon L. "Developing and Securing Software for Small Space Systems." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7544.

Lindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.

(5929946), James E. Lerums. "Measuring the State of Indiana's Cybersecurity." Thesis, 2019.

This dissertation introduces a scorecard to enable the State of Indiana to measure the cybersecurity of its public and private critical infrastructure and key resource sector organizations. The scorecard was designed to be non-threatening and understandable so that even small organizations without cybersecurity expertise can voluntarily self-asses their cybersecurity strength and weaknesses. The scorecard was also intended to enable organizations to learn, so that they may identify and self-correct their cybersecurity vulnerabilities. The scorecard provided quantifiable feedback to enable organizations to benchmark their initial status and measure their future progress.

Using the scorecard, the Indiana Executive Council for Cybersecurity launched a Pilot to measure cybersecurity of large, medium, and small organizations across eleven critical infrastructure and key resources sectors. This dissertation presents the analysis and results from scorecard data provided by the Pilot group of 56 organizations. The cybersecurity scorecard developed as part of this dissertation has been included in the Indiana Cybersecurity Strategy Plan published September 21, 2018.

Patala, Najiyabanu Noormohmed. "Cybersecurity framework for cloud computing adoption in rural based tertiary institutions." Diss., 2018. http://hdl.handle.net/11602/1362.

Van, Vuuren Johanna Christina Jansen. "Methodology and Model to Establish Cybersecurity for National Security in Africa using South Africa as a Case Study." Thesis, 2016. http://hdl.handle.net/11602/744.

(8072417), Braiden M. Frantz. "CISTAR Cybersecurity Scorecard." Thesis, 2019.

Highly intelligent and technically savvy people are employed to hack data systems throughout the world for prominence or monetary gain. Organizations must combat these criminals with people of equal or greater ability. There have been reports of heightened threats from cyber criminals focusing upon the energy sector, with recent attacks upon natural gas pipelines and payment centers. The Center for Innovative and Strategic Transformation of Alkane Resources (CISTAR) working collaboratively with the Purdue Process Safety and Assurance Center (P2SAC) reached out to the Computer and Information Technology Department to assist with analysis of the current cybersecurity posture of the companies involved with the CISTAR initiative. This cybersecurity research project identifies the overall defensive cyber posture of CISTAR companies and provides recommendations on how to bolster internal cyberspace defenses through the identification of gaps and shortfalls, which aided the compilation of suggestions for improvement. Key findings include the correlation of reduced cybersecurity readiness to companies founded less than 10 years ago, cybersecurity professionals employed by all CISTAR companies and all CISTAR companies implementing basic NIST cybersecurity procedures.

(6613439), Siddharth Chowdhury. "PERCEPTIONS OF PURPLE TEAMS AMONG CYBERSECURITY PROFESSIONALS." Thesis, 2019.

Gwala, Sizwe. "Barriers to implementation of the (SA) National Cybersecurity Policy Framework." Thesis, 2016. https://hdl.handle.net/10539/23802.

"CacheLight: A Lightweight Approach for Preventing Malicious Use of Cache Locking Mechanisms." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.50522.

(11173323), Hanlin Chen. "Adaptive Safety and Cyber Security for Connected and Automated Vehicle System." Thesis, 2021.

This dissertation discussed the potential benefits that CAV systems can bring to the general well-being, and how the threat lies within the CAV system can affect its performance and functionality.

Particularly, this dissertation discovered how CAV technology can benefit homeland security and crime investigations involving child abduction crimes. By proposing the initial design network, this dissertation proposed a solution that enhances the current AMBER Alert system using CAV technology. This dissertation also discussed how CAV technology can help perception in corner-case driving scenarios and reduce the risk of traffic accidents, by proposing a dataset that covers various corner cases including different weather and lighting conditions targeting the work zone. Evaluation is made on the collected data and several impact factors have been figured out.

This dissertation also discussed an attack scenario that a ROS-based CAV platform was attacked by DoS attacks. We analized the system response after we attacked the system. Discussion and analysis was made on the functionality and stability of the system.

Overall, we determined that CAV technology can greatly benefit in general well-being, and threats within the CAV system can cast potential negative benefits once the CAV system is being attacked.

(8810120), Naif S. Almakhdhub. "INTERNET OF THINGS SYSTEMS SECURITY: BENCHMARKING AND PROTECTION." Thesis, 2020.

Internet of Things (IoT) systems running on Microcontrollers (MCUS) have become a prominent target of remote attacks. Although deployed in security and safety critical domains, such systems lack basic mitigations against control-flow hijacking attacks. Attacks against IoT systems already enabled malicious takeover of smartphones, vehicles, unmanned aerial vehicles, and industrial control systems.

The thesis introduces a systemic analysis of previous defense mitigations to secure IoT systems. Building off this systematization, we identify two main issues in IoT systems security. First, efforts to protect IoT systems are hindered by the lack of realistic benchmarks and evaluation frameworks. Second, existing solutions to protect from control-flow hijacking on the return edge are either impractical or have limited security guarantees. This thesis addresses these issues using two approaches.

First, we present BenchIoT, a benchmark suite of five realistic IoT applications and an evaluation framework that enables automated and extensible evaluation of 14 metrics covering security, performance, memory usage, and energy. BenchIoT enables evaluating and comparing security mechanisms. Using BenchIoT, we show that even if two security mechanisms have similarly modest runtime overhead, one can have undesired consequences on security such as a large portion of privileged user execution.

Second, we introduce Return Address Integrity (RAI), a novel security mechanism to prevent all control-flow hijacking attacks targeting return edges, without requiring special hardware. We design and implement μRAI to enforce the RAI property. Our results show μRAI has a low runtime overhead of 0.1% on average, and therefore is a

practical solution for IoT systems.

This thesis enables measuring the security IoT systems through standardized benchmarks and metrics. Using static analysis and runtime monitors, it prevents control-flow hijacking attacks on return edges with low runtime overhead. Combined, this thesis advances the state-of-the-art of protecting IoT systems and benchmarking its security.

"SDN-based Proactive Defense Mechanism in a Cloud System." Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.34850.

(6623090), Gregory Walkup. "Investigating Attacks on Industrial Control Systems Using Deterministic Replay Simulation." Thesis, 2019.

(8119418), Hafiz Muhammad Junaid Khan. "A MACHINE LEARNING BASED WEB SERVICE FOR MALICIOUS URL DETECTION IN A BROWSER." Thesis, 2019.

Svensson, Elina, and Annika Rydén. "JamaicaEye : What does cyber security look like in one of the most recently developed CCTV networks?" Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22266.

"Blurring Safety Between Online and Offline Worlds: Archival, Correlational, and Experimental Evidence of Generalized Threat in the Digital Age." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.44025.

(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.

21+ SAMPLE Cyber Security Proposal in PDF

Cyber security proposal, 21+ sample cyber security proposal,  a cyber security, benefits of cyber security proposal, how to develop a cyber security plan, what constitutes an effective cybersecurity strategy, is cyber security a source of stress, what is the definition of personal security.

Cyber Security Proposal Template

Cyber Security Guard Proposal

Cyber Security Area Project Proposal

PhD Cyber Security Area Project Proposal

Cyber Security Recommendation Proposal

Cyber Security PhD Research Recommendation Proposal

Joint Cyber Security Proposal

Joint Cyber Security Business Plan Proposal

Cyber Security Assessment Proposal

Cyber Security Security Awareness Proposal

Cyber Security Research Proposal

Cyber Security Business Proposal Letter

Cyber Security Data Center Modernization Proposal

Cyber Security Data Center Modernization Proposal

Cyber Security Proposal Form

Cyber Security Proposal Form

Bachelor of Science Degree in Cyber Security Proposal

Bachelor of Science Degree in Cyber Security Proposal

Cyber and Data Security Proposal Form

Cyber and Data Security Proposal Form

Cyber Risk and Security Proposal

Cyber Risk and Security Proposal

Cyber Security Proposal in PDF

Cyber Security Proposal in PDF

Cyber Security Products and Services Proposal

Cyber Security Products and Services Proposal

Cyber Security Insurance Proposal Form

Cyber Security Insurance Proposal Form

Cyber Security Audit of Website Proposal

Cyber Security Audit of Website Proposal

Cyber Security Services Proposal

Cyber Security Services Proposal

Cyber Security Skills Research Project Proposal

Cyber Security Skills Research Project Proposal

Cyber Security Proposal Example

Cyber Security Proposal Example

Cyber Security Act Proposal

Cyber Security Act Proposal

Cyber Security Legislative Proposal

Cyber Security Legislative Proposal

Standard Cyber Security Proposal

Standard Cyber Security Proposal

Cyber Security Audit Service Provider Proposal

Cyber Security Audit Service Provider Proposal

What is  a cyber security, share this post on your network, file formats, word templates, google docs templates, excel templates, powerpoint templates, google sheets templates, google slides templates, pdf templates, publisher templates, psd templates, indesign templates, illustrator templates, pages templates, keynote templates, numbers templates, outlook templates, you may also like these articles, 25+ sample construction company proposal in ms word.

sample construction company proposal

Navigating the intricate world of construction demands a seasoned company with a proven track record. Our comprehensive guide on the Construction Company Proposal is your blueprint to understanding the…

8+ SAMPLE Drama Proposal in PDF

sample drama proposal

Julia Child said: “Drama is very important in life: You have to come on with a bang. You never want to go out with a whimper. Everything can have…

browse by categories

  • Questionnaire
  • Description
  • Reconciliation
  • Certificate
  • Spreadsheet

Information

  • privacy policy
  • Terms & Conditions

Computer Science Thesis Proposal

May 2, 2024 12:00pm — 1:30pm.

Location: In Person - Reddy Conference Room, Gates Hillman 4405

Speaker: DORIAN CHAN , Ph.D. Student, Computer Science Department, Carnegie Mellon University https://dorianchan.com/

Diffraction and Computer Vision

Historically, computer vision systems struggle with sensor limits, bandwidth usage and power draw when applied in the wild, limiting their practicality. In this thesis, we explore how light diffraction can be used to mitigate these challenges in real applications. Thanks to the unique coding of light that diffractive optics provide, we demonstrate compressive high-speed imaging that better encodes scene content into available camera bandwidth compared to past approaches. Leveraging the unique image formation model of diffracting light, we implement high-dynamic range illumination systems that enable faster, more programmable structured light systems and longer range time-of-flight cameras without increasing power usage. With these ideas in mind, we propose a technique for sensing the fine vibrations of objects over a large field-of-view via diffraction, an approach for probing light transport based on programming the coherence of a projector system, and a methodology for spatially controlling camera resolution by using a programmable diffraction grating. 

Thesis Committee:  

Matthew O'Toole (Chair) Ioannis Gkioulekas Aswin Sankaranarayanan Mohit Gupta (University of Wisconsin-Madison)

Additional Information

Add event to Google Add event to iCal

Brazil pushes out Petrobras CEO, names ex-regulator to top job

  • Medium Text

Brazil pushes out Petrobras CEO, appoints ex-regulator to top post

  • Company Petroleo Brasileiro SA Petrobras Follow

Sign up here.

Reporting by Rodrigo Viga Gaier and Marta Nogueira in Rio de Janeiro; Additional reporting by Andre Romani in Sao Paulo and Lisandra Paraguassu in Porto Alegre; Writing by Fabio Teixeira; Editing by Brad Haynes, Leslie Adler and Sonali Paul

Our Standards: The Thomson Reuters Trust Principles. New Tab , opens new tab

Endeavor Group Holdings logo is displayed on a screen on the floor of the NYSE in New York

Markets Chevron

The spread of the coronavirus disease (COVID-19) in Frankfurt

Take Five: The good, the bad and the ugly

Markets are hoping for evidence that will solidify a brightening global economic outlook, though rising trade tensions are casting a cloud, while G7 finance ministers gather in Italy.

Signage for the London Stock Exchange Group is seen outside of offices in Canary Wharf in London

IMAGES

  1. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    cyber security thesis proposal

  2. 21+ SAMPLE Cyber Security Proposal in PDF

    cyber security thesis proposal

  3. How to Write a Winning Cyber Security Thesis? Best Practices and

    cyber security thesis proposal

  4. (PDF) cyber-security-thesis

    cyber security thesis proposal

  5. PhD Novel Research Proposal on Cyber Security [Thesis Writing]

    cyber security thesis proposal

  6. FREE 10+ Cyber Security Proposal Samples [ Project, Training, Audit ]

    cyber security thesis proposal

VIDEO

  1. Cyber Security for digital grids-Secure energy automation products and systems

  2. Janell Shah

  3. Cybersecurity portfolio for business

  4. How to (not) be Popular: The Making of a 1950's Emo (vs Hipster Punk)

  5. Cyber Crimes and Cyber Security

  6. Intrusion detection cyber security projects

COMMENTS

  1. PDF Thesis Proposal Composite Security Requirements in the Presence of

    performed significantly better than novices. To detect attacks successfully, cyber security experts need: 1) domain knowledge [20]-[22] that is obtained through formal academic learning and practical hands-on experience with tools; and 2) situated knowledge which is organization dependent and which analysts tend to learn through

  2. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    cybersecurity, President Barack Obama declared a "national emergency to deal with this threat" (White House 2015). This thesis will highlight the need for strong cyber protections and examine proposals for safeguarding the country. I will present the hypothesis that change in our national cyber culture is needed.

  3. TRENDING 9 CYBER SECURITY THESIS IDEAS

    In the cyber security thesis alone, we have nearly 100 happy customers. Our technical team offers you practical explanations to make you understand your topic and the cyber security thesis. Thus you can overcome your thesis fear. We provide you on-time delivery service, so you can come to us at any level of your thesis completion.

  4. Good cybersecurity thesis topics for a master's degree

    Håkon Olsen, security engineer and founder of cybersecurity firm Cybehave, weighed in on cybersecurity thesis topics in a recent forum on Quora, where he suggested tackling the subject of identity management. "Investigate how to maximize security within each user's threshold for usability impact," Olsen wrote, adding that most users don't use ...

  5. (PDF) A Systematic Literature Review on the Cyber Security

    A Systematic Literature Review on the Cyber Security. 1 Dr.Yusuf Perwej, 2 Prof. (Dr.) Syed Qamar Abbas, 3 Jai Pratap Dixit, 4 Dr. Nikhat Akhtar, 5Anurag. Kumar Jaiswal. 1 Professor, Department of ...

  6. Exploring Industry Cybersecurity Strategy in Protecting Critical

    governance present a dynamic cybersecurity challenge for managers and practitioners that equally challenges the supporting training and compliance programs (Lošonczi, Nečas, & Naď, 2016). Cyber threats are dynamic and persistent requiring timely cybersecurity response to remain viable (McLaughlin et al., 2016).

  7. Cybersecurity Strategies to Protect Information Systems in Small

    Cybersecurity has challenged business leaders and policymakers of international relations in the digital information age (Carr, 2016). Reid and Van Niekerk (2014) stated the term cybersecurity was interchangeable with the term information security. Reid and Van Niekerk defined cybersecurity as the collection of instruments, strategies, security

  8. Cybersecurity Research Topics (+ Free Webinar)

    If you're just starting out exploring cybersecurity-related topics for your dissertation, thesis or research project, you've come to the right place. In this post, we'll help kickstart your research by providing a hearty list of cybersecurity-related research topics and ideas, including examples from recent studies.. PS - This is just the start…

  9. MS in Cybersecurity Thesis

    The thesis option allows students to plan, execute, and report on an individual project that addresses a substantial problem covering both practical and scientific aspects. Through the thesis project, students demonstrate their understanding of and ability to apply the concepts, methods, and techniques covered in the MS in Cybersecurity core ...

  10. PhD Thesis

    Specifically, this thesis proposes data-driven cybersecurity indicators to bridge vulnerability management gaps induced by ad-hoc and subjective auditing processes as well as to increase the level ...

  11. Exploring Cybersecurity Awareness and Training Strategies To Protect

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an ... cybersecurity awareness and training programs to protect organizational information systems and data. Purpose Statement

  12. Theses and Projects

    We offer motivated students interested in our research projects the opportunity to write their Thesis (Bachelor or Master) or to conduct Guided Research Projects. ... The EU Artificial Intelligence Act Proposal's Approach to Regulating Biometric Systems: Bachelor: 2023: ... Methodology and Implementation of a Cyber Security Risk Management Tool ...

  13. THREE ESSAYS ON CYBERSECURITY-RELATED ISSUES

    ABSTRACT OF THE DISSERTATION THREE ESSAYS ON CYBERSECURITY-RELATED ISSUES By HE LI Dissertation Director: Dr. Miklos A. Vasarhelyi This dissertation consists of three essays that examine cybersecurity-related matters. In the first essay, I investigate whether external auditors respond to cyber incidents by

  14. PDF Managing Cybersecurity As a Business Risk for Small and Medium

    There are endless definitions for cybercrime because there is a variety of aspects. to consider about cybercrime. The components of a cybercrime vary in three ways of 1) In some cybercrimes that computers or data are the targets. 2) Computers or digital. technologies used as tools for committing cybercrimes.

  15. 60+ Latest Cyber Security Research Topics for 2024

    Criminal Law. Cyber Security Future Research Topics. Developing more effective methods for detecting and responding to cyber attacks. Investigating the role of social media in cyber security. Examining the impact of cloud computing on cyber security. Investigating the security implications of the Internet of Things.

  16. Cyber Security Project Proposal Topics

    Structure of a Cybersecurity Thesis. In terms of various educational programs, the particular necessities for a thesis can differ. Below, we offer the general structure of cybersecurity-based thesis to consider: Title Page: In the title page, include the thesis specific title, name of the author, university, department, and the submission date.

  17. (PDF) Research Paper on Cyber Security

    I.C.S. College, Khed, Ratnagri. Abstract: In the current world that is run by technology and network connections, it is crucial to know what cyber security is. and to be able to use it effectively ...

  18. PDF Proposal for the Development of Models of Cyber Security with

    Project Description. We are interested in developing concepts about models of cyber security to serve as an inspiration for researchers to advance the technology of models for counteracting cyber threats; for practitioners to use as a guide for responding to cyber terror; for university students to use in preparing for careers in cyber security ...

  19. 75 Cyber Security Research Topics in 2024

    Cybersecurity research aims to protect computer systems, networks, and data from unauthorised access, theft, or damage. It involves studying and developing methods and techniques to identify, understand, and mitigate cyber threats and vulnerabilities. The field can be divided into theoretical and applied research and faces challenges such as.

  20. Dissertations / Theses: 'Computer security ; cybersecurity ...

    Consult the top 47 dissertations / theses for your research on the topic 'Computer security ; cybersecurity.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard ...

  21. Cyber Security Dissertations

    Cyber security refers to technologies and practices undertaken to protect electronics systems and devices including computers, networks, smartphones, and the data they hold, from malicious damage, theft or exploitation. ... Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their ...

  22. User Awareness and Knowledge of Cybersecurity and the Impact of

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an ... cybersecurity and increase awareness within the public sector, and to protect the information systems from ...

  23. 21+ SAMPLE Cyber Security Proposal in PDF

    Cyber security is the practice of defending against malicious attacks on computers, computerized systems, networks, and data. The term "cloud computing" is used in various contexts, from business to mobile computing, and can be classified into a few broad categories. Cyber security is centered on the industry standard of confidentiality ...

  24. Computer Science Thesis Proposal

    Historically, computer vision systems struggle with sensor limits, bandwidth usage and power draw when applied in the wild, limiting their practicality. In this thesis, we explore how light diffraction can be used to mitigate these challenges in real applications. Thanks to the unique coding of light that diffractive optics provide, we demonstrate compressive high-speed imaging that better ...

  25. PhD Student Blade Frisch, Computer Science, to Present Dissertation

    PhD student Blade Frisch, Department of Computer Science, will present his dissertation proposal on Monday, May 20, 2024, at 10 am via Zoom online meeting. The title of the proposal is, "Designing Augmentative and Alternative Communication for Social and Community Engagement." Frisch is advised by Associate Professor Keith Vertanen, Computer Science. Join the Zoom meeting. . . .

  26. Brazil pushes out Petrobras CEO, names ex-regulator to top job

    Item 1 of 5 Jean-Paul Prate, former Chief Executive of Brazil's state-run oil company Petrobras, speaks to journalist as he leaves the Petrobras headquarters in Rio de Janeiro, Brazil May 15, 2024.

  27. Sustainability

    As cities strive to become sustainable, it is imperative to consider even the smallest components of the urban environment and prioritize sustainability. Ensuring the sustainability of urban furniture, especially the numerous benches found in cities, is crucial. This study proposes an alternative solution to the sustainability issue in cities regarding urban furniture. This is because a review ...