Faculty, staff, and students at St. Cloud State University are active in the field of security research. Students may present their research at the annual Student Research Colloquium on campus. Faculty and staff contribute to the field through their publications.
Can a Distributed Key System Broken up Over Multiple Nodes Provide Greater Security Robustness While Meeting System Performance Requirements?
by James Redman, Erich Rice, Sen Han, Richard Anderson, Ben Paulson, and Joel Schwarting
Faculty Sponsor: Dennis Guster
Analysis of Used Hard Drives Using Computer Forensics Tool
by Dipendra Tripathi and Badri Paudel
Faculty Sponsor: Mark Schmidt
Computer Crime Analysis Using Digital Forensics
by Kasun Abeykoon and Thusith Abeykoon
Faculty Sponsor: Mark Schmidt
Solving a Virtual Crime Using Digital Forensics Tools
by Michael Biehl and Bashar Shehadeh
Faculty Sponsor: Mark Schmidt
Computer Forensics Project
by Zepu Chen and Liheng Xu
Faculty Sponsor: Mark Schmidt
Fictitious Crime Investigation Using Digital Forensics
by Dibesh Tuladhar and Priyanka Tamanag
Faculty Sponsor: Mark Schmidt
Computer Forensics Case Solutions
by Venkata Tetali and Rachel Robarge
Faculty Sponsor: Mark Schmidt
Mobile Forensics Analysis
by Subash Adhikari and Evans Ofori-Amoah
Faculty Sponsor: Mark Schmidt
Digital Tracing: Revolutionary Methods for Crime Scene Investigation
by Sai Mohit Muddu and Koushik Chilukuri
Faculty Sponsor: Mark Schmidt
A Digital Forensic Quandary: Who Done it?
by Erich Rice and Deepak G.C.
Faculty Sponsor: Mark Schmidt
Analysis of Solid State Drive
by Sandesh Malla and James Redman
Faculty Sponsor: Mark Schmidt
I Have No Idea What is Installed in my Machine
By Alassane Ba
Faculty Sponsor: Susantha Herath
Vivid-Pass: A Dual Layer Authentication Method With Custom-Made Security Features
by Bashar Shehadeh
Faculty Sponsor: Qingjun Chen
Analyzing Behavior of Operating Systems to Crafted Packets Using Scapy
by Kasun Abeykoon and Thusith Abeykoon
Faculty Sponsor: Tirthankar Ghosh
TCP/IP Packet Manipulation
by Jonathan Ray, Bachar Chehada and Michael Biehl
Faculty Sponsor: Tirthankar Ghosh
Comparison Between Two Computer Forensic Programs
by Feras Al-Mansour
Faculty Sponsor: Mark Schmidt
Spam Forensics
by Prabkhar Neupane
Faculty Sponsor: Mark Schmidt
Is Your Data Really Gone?
by Antony Forster
Faculty Sponsor: Mark Schmidt
Virtual Machine Forensics
by Michael J. Condon
Faculty Sponsor: Mark Schmidt
Bermuda Triangle: Computer Forensics to Solve a Fictitious Murder Case
by Eric Owen and Rashmi Rai
Faculty Sponsor: Mark Schmidt
I Know What you did – Your Hard Drive Told me
by Mandeep Pradhan and Sagun Sthapit
Faculty Sponsor: Mark Schmidt
Revealing Encrypted Data for use in Digital Forensics
by Dustin Rogers
Faculty Sponsor: Mark Schmidt
What was Lost can now be Found: A look into Data Recovery with Digital Forensics
by Jonathan Ray
Faculty Sponsor: Mark Schmidt
Computer Forensics: A Fictitious Case Study
by Tenashe Mubvumbi and Menna Tesfaye
Faculty Sponsor: Mark Schmidt
Digital Forensics in the Real World
by Larry Sundberg
Faculty Sponsor: Mark Schmidt
The Importance of Forensics Tools in Modern Computer Forensics
by Charitha Hettiarachchi and Imali Arthanayaka
Faculty Sponsor: Mark Schmidt
A Practical Approach to Computer Forensic Investigations
by Kyaw H. Thaung
Faculty Sponsor: Mark Schmidt
High Performance/Green Computing
by Corey Hemminger and Dustin Rogers
Faculty Sponsor: Dennis Guster
The Cell Phone. A criminals best friend or worst enemy
by Steve Minkler
Faculty Sponsor: Mark Schmidt
BCRL Global Authentication Using LDAP with Kerberos
by Corey Hemminger , Joseph T. Meunier, and Christopher Schroeder
Faculty Sponsor: Dennis Guster
Using Virtual Hosts to Reduce Complexity and Foster “Green” Computing in an Instructional/Research Oriented Computer Domain
by Corey Hemminger, Joseph T. Meunier, and Christopher Schroeder
Faculty Sponsor: Dennis Guster
Computer Forensics: Data Retrieval Methodologies
by Condon, Michael
Faculty Sponsor: Mark Schmidt
Hard Drive Analysis
by Dangol, Sabina, and Khan, Aneeqa
Faculty Sponsor: Mark Schmidt
A Proposed Study and Analysis of User Perceptions of Biometric Acceptance
by Das, Debjani
Faculty Sponsor: Mark Schmidt
Live Forensics
by Guragain, Rekha
Faculty Sponsor: Mark Schmidt
Data Aquisition and Analysis in Computer Forensics: Acquiring an Image and Analyzing the Digital Information of a Hard Drive
by Hou, Tian
Faculty Sponsor: Mark Schmidt