Student Research at St. Cloud State University


Student Research Colloquium

Faculty Sponsors

Guster, Dennis

Schmidt, Mark


Student Presentations for the SRC 2013

Can a Distributed Key System Broken up Over Multiple Nodes Provide Greater Security Robustness While Meeting System Performance Requirements?
by James Redman, Erich Rice, Sen Han, Richard Anderson, Ben Paulson, and Joel Schwarting
Faculty Sponsor: Dennis Guster

Analysis of Used Hard Drives Using Computer Forensics Tool
by Dipendra Tripathi and Badri Paudel
Faculty Sponsor: Mark Schmidt

Computer Crime Analysis Using Digital Forensics
by Kasun Abeykoon and Thusith Abeykoon
Faculty Sponsor: Mark Schmidt

Solving a Virtual Crime Using Digital Forensics Tools
by Michael Biehl and Bashar Shehadeh
Faculty Sponsor: Mark Schmidt

Computer Forensics Project
by Zepu Chen and Liheng Xu
Faculty Sponsor: Mark Schmidt

Fictitious Crime Investigation Using Digital Forensics
by Dibesh Tuladhar and Priyanka Tamanag
Faculty Sponsor: Mark Schmidt

Computer Forensics Case Solutions
by Venkata Tetali and Rachel Robarge
Faculty Sponsor: Mark Schmidt

Mobile Forensics Analysis
by Subash Adhikari and Evans Ofori-Amoah
Faculty Sponsor: Mark Schmidt

Digital Tracing: Revolutionary Methods for Crime Scene Investigation
by Sai Mohit Muddu and Koushik Chilukuri
Faculty Sponsor: Mark Schmidt

A Digital Forensic Quandary: Who Done it?
by Erich Rice and Deepak G.C.
Faculty Sponsor: Mark Schmidt

Analysis of Solid State Drive
by Sandesh Malla and James Redman
Faculty Sponsor: Mark Schmidt

I Have No Idea What is Installed in my Machine
By Alassane Ba
Faculty Sponsor: Susantha Herath

Vivid-Pass: A Dual Layer Authentication Method With Custom-Made Security Features
by Bashar Shehadeh
Faculty Sponsor: Qingjun Chen

Student Presentations for the SRC 2012

Analyzing Behavior of Operating Systems to Crafted Packets Using Scapy
by Kasun Abeykoon and Thusith Abeykoon
Faculty Sponsor: Tirthankar Ghosh

TCP/IP Packet Manipulation
by Jonathan Ray, Bachar Chehada and Michael Biehl
Faculty Sponsor: Tirthankar Ghosh

Comparison Between Two Computer Forensic Programs
by Feras Al-Mansour
Faculty Sponsor: Mark Schmidt

Spam Forensics
by Prabkhar Neupane
Faculty Sponsor: Mark Schmidt

Student Presentations for the SRC 2011

Is Your Data Really Gone?
by Antony Forster
Faculty Sponsor: Mark Schmidt

Virtual Machine Forensics
by Michael J. Condon
Faculty Sponsor: Mark Schmidt

Bermuda Triangle: Computer Forensics to Solve a Fictitious Murder Case
by Eric Owen and Rashmi Rai
Faculty Sponsor: Mark Schmidt

I Know What you did – Your Hard Drive Told me
by Mandeep Pradhan and Sagun Sthapit
Faculty Sponsor: Mark Schmidt

Revealing Encrypted Data for use in Digital Forensics
by Dustin Rogers
Faculty Sponsor: Mark Schmidt

What was Lost can now be Found: A look into Data Recovery with Digital Forensics
by Jonathan Ray
Faculty Sponsor: Mark Schmidt

Computer Forensics: A Fictitious Case Study
by Tenashe Mubvumbi and Menna Tesfaye
Faculty Sponsor: Mark Schmidt

Digital Forensics in the Real World
by Larry Sundberg
Faculty Sponsor: Mark Schmidt

The Importance of Forensics Tools in Modern Computer Forensics
by Charitha Hettiarachchi and Imali Arthanayaka
Faculty Sponsor: Mark Schmidt

A Practical Approach to Computer Forensic Investigations
by Kyaw H. Thaung
Faculty Sponsor: Mark Schmidt

Student Presentations for the SRC 2010

High Performance/Green Computing
by Corey Hemminger and Dustin Rogers
Faculty Sponsor:  Dennis Guster

The Cell Phone.  A criminals best friend or worst enemy
by Steve Minkler
Faculty Sponsor: Mark Schmidt

SRC 2010 - Image Gallery

Student Presentations for the SRC 2009

BCRL Global Authentication Using LDAP with Kerberos
by Corey Hemminger , Joseph T. Meunier, and Christopher Schroeder
Faculty Sponsor: Dennis Guster

Using Virtual Hosts to Reduce Complexity and Foster “Green” Computing in an Instructional/Research Oriented Computer Domain
by Corey Hemminger, Joseph T. Meunier, and Christopher Schroeder
Faculty Sponsor: Dennis Guster

Computer Forensics: Data Retrieval Methodologies
by Condon, Michael
Faculty Sponsor: Mark Schmidt

Hard Drive Analysis
by Dangol, Sabina, and Khan, Aneeqa
Faculty Sponsor: Mark Schmidt

A Proposed Study and Analysis of User Perceptions of Biometric Acceptance
by Das, Debjani
Faculty Sponsor: Mark Schmidt

Live Forensics
by Guragain, Rekha
Faculty Sponsor: Mark Schmidt

Data Aquisition and Analysis in Computer Forensics: Acquiring an Image and Analyzing the Digital Information of a Hard Drive
by Hou, Tian
Faculty Sponsor: Mark Schmidt

SRC 2009 - Image Gallery

Untitled Document