COMPSCI 725 Written Report Archive
The following students have given permission for their written report to be posted to this website.  All other publication rights (including the moral right of the author to be identified as such) are reserved.
If you were a student in COMPSCI 725, and you would like your written report to be published here, please send email to cthombor@cs.
Kristine Espanto 2018 A Double Take on High Stakes: Exploring the Ethical Conflict of Acquiring Informed Consent in Online Social Network Research
Yezhou Liu 2018 An In-depth Discussion of Adversarial Image Generator (AIG) in Real-life Scenarios
Cameron McCarthy 2018 Analysis of Fake Profiles for Research Purposes with Respect to the IEEE Code of Ethics
Brad Miller 2018 Proposals for Holistic Security in Preventing Email Phishing Attacks
Callan Christophersen 2017 A Brief Aetiology of Computer System Security
Jonas Debes 2017 Evaluating Machine Learning Based Intrusion Detection Techniques in a Real World Setting
Albertus Mitton 2017 Same-Origin Policy definition variations across different problem contexts
Vikram Jothinagara Prasanna Kumar 2017 Honeynets as a possible defensive strategy for aiding Artificial Intelligence Safety
James Cooper 2016 Subversive-C: How reasonable are the assumptions?
Tao Yang 2016 Improving Two-Factor Authentication Usability with Sensor-Assisted Facial Recognition
Gareth Sime 2015 Using OpenID As An SSO Protocol
Stuart Bradley 2015 Realistic DNA De-anonymization using Phenotypic Prediction
Anthony Wood 2014 Cross-Domain Authentication and Authorisation in Pervasive Computing Environments
Ranran (Monica) Bian 2013 Alice in Battlefield: An Evaluation of the Effectiveness of Various UI Phishing Warnings
Sam Kavanagh 2013 Predictors of Social Networking Privacy Behaviour
Arthur Joel Lewis 2013 Control, Risk Awareness and Self-Disclosure: Factors Influencing Online Privacy
Tze Ching (Josephine) Lim 2013 To what Extent does De-Anonymization of Mobile Datasets Compromise Privacy?
Mehul Raniga 2013 Understanding the Gap between Usability and Security
Rong Wang 2013 Lab Study or Field Study: the Problems that Researchers Face in Measuring the Effectiveness of Browser SSL Warning Designs
David MacDonald 2009 An Algorithmic Comparison of Location Privacy k-Anonymity Systems
Liam Fearnley 2009 Square Root Laws of Steganographic Capacity in the Context of Existing Models
Mikhail Gouline 2009 Relevance of Existing Taxonomies to Current Software Watermarking Research
Mark Spadafora 2009 Discovering Campaign Based Spamming Strategies
Han Zhong 2009 Special Properties of Ad-hoc Wireless Network and Security Models
Sunny (Zhe) Sun 2008 Using Two-factor Authentication Systems to Prevent Social Phishing and Man-In-The-Browser Attacks for Internet Banking
Rick (Fan) Zhang 2008 An Analysis of the Online Banking Security Issues Reported by Hole, Moen, and Tjostheim
Han Zhong 2008 The Vulnerabilities of IEEE 802.11 Wireless LANs (WLANs)
Maxim Kharlamov 2007 An Overview of RFID Security and Privacy Threats
Lei Wei 2007 Evaluation of Intrusion Detection Systems
Tony Wu 2007 Transparent System for E-mail Security
Zhong Xia Ma 2006 Insider Threats Assessment in the Real-World System
Eugene Phan Hin Min 2006 Biometrics: Application in Cryptographic Signatures
Gavin Grant Neale 2006 Investigating the Feasibility of Keyboard Acoustic Attacks
Chi Yuen 2006 A Framework for Legal Analysis of DRM Systems: Copyright and Privacy
Hong Zhou 2006 Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0
Fu'Ad W. F. Al Tabba' 2005 Why Computer Security Fails - An Economic View
Chang Chen 2005 Recent Developments in Tracing Traitors
Jiazhen Chen 2005 Problems when running Untrusted Java threads and ways to solve them
Samantha J. Daniels 2005 Insider Threats within the Financial and Movie Sectors: A Comparative Study
Daniel Ronald Flower 2005 Threat Analysis of Emanation-Based Attacks
Qian Gao 2005 Misuse/Use Cases and Security Use Cases in Eliciting Security Requirements
Birgit Kaschte 2005 Biometric authentication systems today and in the future
Ron (Seong Min) Kim 2005 Trusted Platform Module and Privacy: Promises and Limitations
Mu Li 2005 Analysis of the Insider Attack Issue in the Movie, Banking, and Computer Industries
Man Fai Ma 2005 How security requirements should be reused
Bruce Megget 2005 Assessment of Keyboard Acoustic Threats by Insiders
Ahmed Mujuthaba 2005 Towards a General Architecture for Secure Computing
Gilbert Notoatmodjo 2005 Detection of Self-Mutating Computer Viruses
Mukul Pahwa 2005 Digital Rights (Mis) Management
Chun Wei (Johnny) Sia 2005 Misuse Cases and Abuse Cases in Eliciting Security Requirements
Gene Tang 2005 Trusted Computing: Addressing Insider Threats to the Banking and Financial Sector
Jens Trotzky 2005 Analysis of turnitin.com
Vanessa Wan Sze Tsang 2005 Towards Analysis of Templates for Security Requirements
Slobodan Vukanovic 2005 Completeness, Versatility, and Practicality in Role-Based Administration
Amodha Wijekoon 2005 Protecting against piracy: Building Tamper resistant software
Jesse Wu 2005 Innocence of Traced Traitors
Dong Zhang 2005 Checking Primitives with Guards
Miaomiao Zhang 2005 What Should We Do about Self-plagiarism
Mingfeng Bao 2004 Improved data confidentiality: an overview of NGSCB
Brendan Sean Cervin 2004 Review of Security Requirements Engineering Processes
Michael Alan Cochrane 2004 VPN Access for mobile users: IPSec or SSL?
Christopher John Mills 2004 Investigation of Defences Against Cross Site Scripting Attacks
Siriwat Karndacharuk 2004 Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Corinne Alison Lawrence 2004 Intrusion Prevention Systems: The Future of Intrusion Detection?
Cho Hong Ling 2004 Internet Firewall Vulnerability Analysis Method
Zheng Liu 2004 Microsoft .NET Passport, a solution of single sign on
Zhengyuan Luo 2004 Two SSO Architectures with a Single Set of Credentials
Praveen Mandava 2004 E-Voting (in)Security
Paul Richard Mason 2004 An Intellectual Property Threat Analysis of a .NET Windows Application
Christian Hagensen Mosveen 2004 Why VPN Alone Will not Secure your Wireless Network
Sandeep Mudana 2004 Security Flaws in Internet Voting System
Richard Allen Paul 2004 Verifying the Integrity of Shared Libraries
Teng Teng 2004 Analyzing the vulnerability of a certain Reputation-Based Trust Management for P2P Networks
Lei Wang 2004 Fight against spyware on two laptops
Yijie Yang 2004 Raw Quick Pairs method of detecting Stego-images
Cheung-Ling-Kelly Yu 2004 A Case study on PKI: SERVE
Bojan Zdrnja 2004 Second-generation (GenII) honeypots
Surender Reddy Adavalli 2003 Smart Card Solution: Highly secured Java Card Technology
Sandeep Anand 2003 Incorporating Biometrics and Smart Cards
Kurt Bagby 2003 Taking Computer Virus Detection to a New Level
Matthew Barrett 2003 Secure Multimedia Content Delivery to the Home via the Internet
Diana Butters 2003 Comparison of Matching Algorithm Used in Three Plagiarism Detection Systems
Anupam Dewan 2003 Enhancing Biometric Authentication with Data Protection
Gopi Dinakaran 2003 Fail-Stop Signature Scheme for Digital Payment
Yuman Huang 2003 Safeguarding a Native XML Database System
Sasank Jampana 2003 Semantic Watermarking of Plain Text
Adam Johnson 2003 Protecting Free Speech using the Eternity Service
Gareth Karl 2003 A Probabilistic Trust Model
Sau Fan Lee 2003 Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks
Qiang Liu 2003 Techniques Using Exterior Component Against Software Piracy
Qing-Shan Martin Lun 2003 A Survey of Three Proposed Techniques to Increase the Security of Java
Sidney Markowitz 2003 User and Process Identity in Access Control
Akhil Mehra 2003 Methods of Securing the Bootstrap Process of an Operating System
ChaoLi Ou 2003 Text Watermarking for Text Document Copyright Protection
Po-yuan Peng 2003 Intrusion Detection System at Operating System Level
Iain Phillips 2003 Hardware-Based Methods for Prevention of Multimedia Piracy: Some Issues
Jerrold Poh 2003 Managing Trust: Real World Examples
Franz Rambach 2003 Taxonomies of Attackers
Paul Shotbolt 2003 Several Compromising-Emanations Based Interception Techniques and Their Implications
Mike Stay 2003 Cards vs. Shuffling
Ji Sun 2003 Is Decimalisation Table Attack Really a Major Threat?
Aditya Vutukuri 2003 Frequent Denial of Service Attacks
Lixin Wang 2003 Artificial Neural Network for Anomaly Intrusion Detection
William Xie 2003 Smart Card and its Application in Software Protection
Xiaodong Yang 2003 Protecting Mobile Agent against Malicious Hosts Using A Time-Limited Blackbox Approach
Hong Lei Zhang 2003 Three attacks in SSL protocol and their solutions
Lixi Chen 2002 Code Obfuscation Techniques for Software Protection
Xiaoyu Chen 2002 Privacy Protection in Digital Rights Management Systems 
Gareth George Cronin 2002 A Taxonomy of Methods for Software Piracy Prevention
Weiguo Jin 2002 Applying Epidemiology in Computer Virus Prevention: Prospects and Limitations
Haiying Tan 2002 Authentication in mobile-agent system: D'Agents
Stefan Anders Thoren 2002 Case Study: Applying common software security guidelines to improve program robustness
Michael Chun Long Yip 2002 Spyware: Tracking of Information, Counteraction, and Legal Implications