- Investing in Legacy: Cleaning and Categorizing a United States Government Information Technology Budget Dataset to Understand Public Sector Legacy Systems Investment. Natalie Simkins and Julia Stachofsky.
- Laser-Cutter System Password. Zebedee Kumley and Caleb Lowe.
- Examining Current Safefty Measures and Awareness of Cyber Threats to Mobile Devices: A Literary Review. Samantha Brewer and Blessing Akinrotimi.
- Trusted Platform Module in Satellite Applications. James Minteer.
- Developing Tools for Cybersecurity Education and Assessment. Moises Carranza and James Crabb.
- Leveraging Learning Theory to Improve the Effectiveness of Cybersecurity Education. Alan Sun and James Crabb.
- Evaluating the Observability of Network Security Monitoring Strategies With TOMATO. Zachery Werle, William Heinecke, James Halvorsen.
- Supervised Graphical Binary Threat Detection (WIP). Andrew Fritz, Cai Haught, Jose Sainz, Nathan Waltz.
- U.S. Military Offensive Cyber Capabilities. Macy Schowalter, Tyler Moravec, Andrew Fallin.
- A Model System for Study of Cyberattacks on Biomanufacturing. Adam Caudle, Mikayden Weise, Yaacov Mitsourov, Brenden Fraser-Hevlin.