Ph.D. Dissertations and Master's Theses -header

Ph.D. Dissertations and Master's Theses

Masters Theses

The thesis and PhD dissertations are the capstone achievements of a student's academic endeavors at NPS. A permanent copy of these documents are placed in the 's digital archives. The Library holds all NPS theses and dissertations.

If you have any questions or would like additional information on Faculty and Student Research at NPS, please e-mail research@nps.edu.

Material contained herein is made available for the purpose of peer review and discussion and does not necessarily reflect the views of the Department of the Navy or the Department of Defense.

Orwat, M., "A Decision Framework for Enhancing MANET Stability and Security," Doctorial Dissertation, 窪蹋勛圖厙, June 2008. 

Shaffer, A., "An Application Of Alloy To Static Analysis For Secure Information Flow And Verification Of Software Systems," Doctorial Dissertation, 窪蹋勛圖厙, December 2008.

Afinidad, F. B., "An Interval Algebra-Based Temporal Access Control Protection Architecture," Doctoral Dissertation, 窪蹋勛圖厙, June 2005.

Bibighaus, D. L., "Applying Doubly Labeled Transition Systems to the Refinement Paradox," Doctoral Dissertation, 窪蹋勛圖厙, September 2005. 

VanPutte, M., "A Computational Model and Multi-Agent Simulation of the INFOSEC Domain," Doctoral Dissertation, 窪蹋勛圖厙, June 2002. 

Franconia, Jamie C., Mitigating Insider Threats in Virtual Environments with Deception Detection, Master's Thesis, 窪蹋勛圖厙, June 2021. 

Pommer, P., Design and Implementation of a Distributed Ledger to Support Data Survivability in an Unmanned Multi-Vehicle System, Master's Thesis, 窪蹋勛圖厙, March 2021. 

Richardson, T., Learning Objective Based Development of CyberCIEGE Instructional Video Game Scenarios, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, June 2021.

H. Rosario, H., CyberCIEGE Videos: From English to Spanish; V 覺deos de CyberCIEGE: Del Ingl es al Espan ol, Masters thesis, 窪蹋勛圖厙, Monterey, California, June 2021.

Carter, N., Design and Verification of a Distributed Ledger Protocol for Distributed Autonomous Systems Using Monterey Phoenix, Master's Thesis, 窪蹋勛圖厙, December 2020. 

 H. T. Cheer, Choice Confidence and Persuasion Resistance Through Mouse Action Observation, M.S. thesis, 窪蹋勛圖厙, Monterey, California, December 2020

Dougherty, J. T., Evasion Of Honeypot Detection Mechanisms Through Improved Interactivity Of ICS- Based Systems, M.S. Thesis, 窪蹋勛圖厙, Monterey, California, September 2020

Harter, G., Metamorphic and Polymorphic Techniques For Obfuscation Of K-Ary Malicious Codes, Masters thesis, 窪蹋勛圖厙, Monterey, California, March 2020.

Martineau, J.,  Mapping Mobile IPv6 Providers, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2020

Moore, G. M., Blockgrid A Blockchain-Mediated Cyber-Physical Instructional Platform, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, December 2020.

Purser, J., Using Generative Adversarial Networks For Intrusion Detection In Industrial Control Systems, Masters thesis, 窪蹋勛圖厙, Monterey, California, December 2020

Norton, G., Security Analysis of Industrial Security Appliances, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, September 2020. 

Thordarson, K.E., Analysis Of EUI-64 Based Addressing And Associated Vulnerabilities, Masters thesis, 窪蹋勛圖厙, Monterey, California, September 2020

Walker, M.H., The Science Of Speech: Developing A Computational Model For Digital Communication And Its Ramifications For Author Identification In Cybersecurity, Masters thesis, 窪蹋勛圖厙, Monterey, California, March 2020.

Wikman, E., Static Analysis Tools for Detecting Stack-based Buffer Overflows, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, June 2020. 

Hardt, A., Characterizing BBP Community Irregularities Towards An Anomaly Detection Engine, M.S. Thesis, 窪蹋勛圖厙, Monterey, California, September 2019

Kalinowski, P. Neural Networks for Malware Detection Using Static Analysis, M.S. thesis, 窪蹋勛圖厙, Monterey, California, March 2019

Kvitchko, T., Sunup: ICMP Timestamp Behaviors In Fingerprinting, M.S. Thesis, 窪蹋勛圖厙, Monterey, California, September 2019

Sowers, R. and Rogers, A., Defensive Binary Code Instrumentation To Protect Against Buffer Overflow Attacks,  Masters thesis, 窪蹋勛圖厙, Monterey, California, September 2019.

Affield, D. W., McPherson, P.C., and  Budzitowski, D.E, Cloaking Malware with Respect to Static Analysis, Masters thesis, 窪蹋勛圖厙, Monterey, California, September 2018.

Alcorn, D.R., Educational Guidance on Extensible Software Development, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2018.

Atadika, M. K, Applying U.S. Military Cybersecurity Policies to Cloud Architectures, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2018.

Austin, S., Security Analysis of Industrial Firewalls, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, December 2018. 

Garcia, D., (on distribution hold), Master's Thesis, 窪蹋勛圖厙, Monterey, CA, September 2018.

Gentile, B. Officer Data Card (ODC) Dissemination Policy, Model and Blockchain-based Accountability Mechanism,  Master's Thesis, 窪蹋勛圖厙, Monterey, CA, June 2018.

Glasser, D. P.,  Longitudinal Study of Large-Scale Traceroute Results, Masters Thesis, Naval Postgrad- uate School, Monterey, California, March 2018.

Hyun, D.,  Collecting Cyberattack Data for Industrial Control Systems with Honeypots, M.S. Thesis, 窪蹋勛圖厙, Monterey, California, March 2018.

Shaw, M., A Blockchain Testbed for DoD Applications, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, September 2018.

Timmerman, M., Enabling Collaboration and Visualization of Complex Operational Technology Computer Networks and Augmented Reality Technology, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, September 2018. 

Wanic, E.E., Cyber Weapons and Deterrence, M.S. Thesis, 窪蹋勛圖厙, Monterey, California, September 2018.

Ballesteros, P.R., Investigating background pictures for picture gesture authentication, Masters Thesis, 窪蹋勛圖厙, Monterey, California, June 2017.

Banuelos, C. A., Development of information assurance protocol for low bandwidth nanosatellite communications, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2017.

Fessler, K. E., Analysis of space based infrared system (sbirs) block 10 ground segment cybersecurity, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2017.

Gormley, J., Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers, 窪蹋勛圖厙, Monterey, CA, December, 2017. 

Khosalim, J.  Implementation of a Parameterization Framework for Cybersecurity Laboratories, Master's Thesis, 窪蹋勛圖厙, Monterey, CA, March, 2017. 

 

Fischer, B. D. and Lato, A. M., A taxonomy for software-defined networking, man-in-the-middle attacks, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2016.

Foster, H., Why does MPTCP have to make things so complicated?: cross-path NIDS evasion and countermeasures, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2016.

McKenna, S., Detection and classification of web robots with honeypots, Masters Thesis, 窪蹋勛圖厙, Monterey, California, March 2016.

Shing, L., An improved tarpit for network deception, Masters Thesis, 窪蹋勛圖厙, Monterey, California, March 2016.

Tacliad, F., ENIP fuzz: A scapy-based ethernet/ip fuzzer for security testing, Masters Thesis, 窪蹋勛圖厙, Monterey, California, September 2016.

Yee, J., Characterizing crowd participation and productivity of foldit through web scraping, Masters Thesis, 窪蹋勛圖厙, Monterey, California, March 2016.

Master's Theses 2014

David Bergesen, D., A Prioritization Matrix for Intelligence Feeds to the Distributed Common Ground System Navy (DCGS-N), Master's Thesis, 窪蹋勛圖厙, Monterey, CA, March 2014. 

Theses 2013

Doucet, R., Dontchev, D. M., Burden, J. and Skoff T., Big Data Analytics Test Bed, Master's Capstone Project Report, 窪蹋勛圖厙, September 2013.

Theses 2012

Wolf. S., Non-Digital Games for Computer Security Concepts, Master's Thesis, 窪蹋勛圖厙, December, 2012.

Swisher, D., Automated Policy Updating Using a Semantic Wiki,  Master's Thesis, 窪蹋勛圖厙, December, 2012.

Rimando, R., Development and Analysis of Security Policies in Security Enhanced Android, Master's Thesis, 窪蹋勛圖厙, December, 2012.

McGrath, G., Function Matching Using Similiarity Metrics, Master's Thesis, 窪蹋勛圖厙, December, 2012.

Edgar, S., Symbolic Execution from an Emulator,  Master's Thesis, 窪蹋勛圖厙, December, 2012.

Delaroderie, J., Clustering Similarity Digest Bloom Filters in Self-Organizing Maps, Master's Thesis, 窪蹋勛圖厙, December, 2012.

Hom, M., Symbolic Execution Over Native X86, Master's Thesis, 窪蹋勛圖厙, June, 2012.

Hirst, N., The Implications of Virtual Machine Introspection for Digital Forensics on Non-Quiescent Virtual Machines,  Master's Thesis, 窪蹋勛圖厙, June, 2012.

Biblarz, A., Web Syndication in a Multilevel Security Environment, Master's Thesis, 窪蹋勛圖厙, April, 2012.

Tan, Hwee Meng, USB Support for the Least Privilege Separation Kernel, Master's Thesis, 窪蹋勛圖厙, March 2012.

Theses 2011

Kostopoulos, S., A Concept for Continuous Monitoring That Reduces Redundancy in Information Assurance Processes, Master's Thesis, 窪蹋勛圖厙, September 2011.

Theses 2010

Ang, K. K., "A Multilevel Secure Constrained Intrusion Detection System Prototype," Master's Thesis, 窪蹋勛圖厙, December 2010. 

Beech, Z. W. , "A Formal Security Model for Emergency Access to Information," Master's Thesis, 窪蹋勛圖厙, June 2010. (Abstract/PDF not available at this time)

Guillen, J., "Least Privilege Separation Kernel Storage Hierarchy Prototype For The Trusted Computing Exemplar Project," Master's Thesis, 窪蹋勛圖厙, June 2010. 

Martinsen, J., "Implementation Of Intel Virtual Machine Extension Root Operation On The NPS Least Privilege Separation Kernel," Master's Thesis, 窪蹋勛圖厙, September 2010. 

Ng, Y.C., "An Application for Normal and Critical Operations in a Tactical MLS System," Master's Thesis, 窪蹋勛圖厙, December 2010.

O'Connell, R., Descovich, C., "Decreasing Variance In Response Time To Singular Incidents Of Piracy In The Horn Of Africa Area Of Operation," Master's Thesis, 窪蹋勛圖厙, June 2010. 

Quah, R., "Securing Emergency State Data in a Tactical Computing Environment," Master's Thesis, 窪蹋勛圖厙, December 2010. 

Quek, C. L., "A Configuration Framework And Implementation For The Least Privilege Separation Kernel," Maste'rs Thesis, 窪蹋勛圖厙, December 2010. 

Toh, B.P., "Design And Implementation Of An Audit Subsystem For A Separation Kernel," Master's Thesis, 窪蹋勛圖厙, December 2010. 

Yoong, H. L., "IP Services Design and Implementation in a Prototype Device for Transient Tactical Access to Sensitive Information," Master's Thesis, 窪蹋勛圖厙, December 2010. 

Theses 2009

Cowan-Sharp, J. "A Study of Topic and Topic Change in Conversational Threads," Master's Thesis, 窪蹋勛圖厙, September 2009. 

Farrell, P. F., "A Framework For Automated Digital Forensic Reporting," Master's Thesis, 窪蹋勛圖厙, March 2009. 

Mok, C., "National Authentication Framework Implementation Study," Master's Thesis, 窪蹋勛圖厙, December 2009. 

Regan, J. E., "The Forensic Potential of Flash Memory," Master's Thesis, 窪蹋勛圖厙, September 2009. 

Roussas, G., "Visualization Of Client-Side Web Browsing And Email Activity," Master's Thesis, 窪蹋勛圖厙, June 2009. 

Skaff, S. J. C., "Probability Distributions Over Cryptographic Protocols," Master's Thesis, 窪蹋勛圖厙, June 2009. 

Slack, A. A., "Digital Authentication For Official Bulk Email," Master's Thesis, 窪蹋勛圖厙, March 2009. 

Venema, J. P., Shu, J. L. Y., "Investigation Into The Impacts Of Migration To Emergent Nsa Suite B Encryption Standards," Master's Thesis, 窪蹋勛圖厙, June 2009. 

Welliver, T. M., "Configuration Tool Prototype for the Trusted Computing Exemplar Project," Master's Thesis, 窪蹋勛圖厙, December 2009. 

Theses 2008

Adams, C. M., "VOIP Quality Measurements in a Multilevel Secure (MLS) Environment," Master's Thesis, 窪蹋勛圖厙, Monterey, California, March 2008. 

Adams, Paige, "Conversion Thread Extraction and Topic Detection in Text-Based Chat," Master's Thesis, 窪蹋勛圖厙, June 2008. 

Bassi, S. D., "An Automated Acquisition System for Media Exploitation," Master's Thesis, 窪蹋勛圖厙, Monterey, California, June 2008. 

Huynh, Daniel P., "Exploring and validating data mining algorithms for use in data ascription," Master's Thesis, 窪蹋勛圖厙, June 2008. 

Koh, C. L. and Ng, E. S., "Security Modeling and Correctness Proof Using Specware and Isabelle," Masters thesis, 窪蹋勛圖厙, Monterey, CA, December 2008. 

LaVelle, C., "A Preliminary Analysis for Porting XML-Based Chat to MYSEA," Master's Thesis, 窪蹋勛圖厙, June 2008. 

McLaren, Simon R., "Reliability of iris recognition as a means of identity verification and future impact on transportation worker identification credential," Master's Thesis, 窪蹋勛圖厙, March 2008. 

Migletz, James J., "Automated metadata extraction," Master's Thesis, 窪蹋勛圖厙, June 2008. 

Tenhunen, T. F., "Implementing an Intrusion Detection System in the MYSEA Architecture," Master's Thesis, 窪蹋勛圖厙, June 2008. 

Theses 2007

Carter, D. W., "An Oskit-Based Implementation Of Least Privilege Separation Kernel Memory Partitioning," Master's Thesis, 窪蹋勛圖厙, June 2007. 

Eatinger, C., "Testing Automation Tools For Secure Software Development," Master's Thesis, 窪蹋勛圖厙, June 2007. 

Goh, H. C., "Intrusion Deception in Defense of Computer Systems," Master's Thesis, 窪蹋勛圖厙, March 2007. 

McManus, S. C., "Predicting Host Level Reachability via Static Analysis of Routing Protocol Configuration," Master's Thesis, 窪蹋勛圖厙, September 2007. 

Murphy, E. J. "Counterintelligence Through Malicious Code Analysis," Master's Thesis, 窪蹋勛圖厙, June 2007. 

Ong, K. L., "Design And Implementation Of Wiki Services In A Multilevel Secure Environment," Master's Thesis, 窪蹋勛圖厙, December 2007. 

Phelps, D. A., "Alloy Experiments For A Least Privilege Separation Kernel," Master's Thesis, 窪蹋勛圖厙, June 2007.  

Pohl, M., "Experimentation And Evaluation Of Ipv6 Secure Neighbor Discovery Protocol," Master's Thesis, 窪蹋勛圖厙, September 2007. 

Portner, A. D., "A Prototype Of Multilevel Data Integration In The MYSEA Testbed," Master's Thesis, 窪蹋勛圖厙, September 2007.

Wiese, B., "Preliminary Analysis Of A Trusted Platform Module (TPM) Initialization Process," Master's Thesis, 窪蹋勛圖厙, June 2007. 

Theses 2006

Bradney, J. A., "Use Of Webdav To Support A Virtual File System In A Coalition Environment," Master's Thesis, 窪蹋勛圖厙, June 2006.  

Chew, Heng Hui, "A Secure Alert System," Master's Thesis, 窪蹋勛圖厙, December 2006. 

Chiang, K. H., "A Prototype Implementation Of A Time Interval File Protection System (TIFPS) In Linux," Master's Thesis, 窪蹋勛圖厙, September 2006. 

Cone, B. D., "A CyberCIEGE Campaign Fulfilling Navy Information Assurance Training And Awareness Requirements," Master's Thesis, 窪蹋勛圖厙, March 2006. 

Cullum, J. J., "Performance Analysis Of Automated Attack Graph Generation Software," Master's Thesis, 窪蹋勛圖厙, December 2006.

DeCloss, D. P., "An Analysis Of Specware And Its Usefulness In The Verification Of High Assurance Systems," Master's Thesis, 窪蹋勛圖厙, June 2006.  

Duong, B. T., "Comparisons Of Attacks On Honeypots With Those On Real Networks," Master's Thesis, 窪蹋勛圖厙, March 2006.  

Egan, M., "An Implementation Of Remote Application Support In A Multilevel Environment," Master's Thesis, 窪蹋勛圖厙, March 2006. 

Ellch, Jonathan P., "Fingerprinting 802.11 devices," Master's Thesis, 窪蹋勛圖厙, September 2006. 

Estlund, M. J., "A Survey And Analysis Of Access Control Architectures For Xml Data," Master's Thesis, 窪蹋勛圖厙, March 2006.  

Lim, S. H., "Assessing the Effects of Honeypots on Cyber-Attackers," Master's Thesis, 窪蹋勛圖厙, December 2006. 

Radowicz, Jody L., "Exploring fields with shift registers," Master's Thesis, 窪蹋勛圖厙, September 2006.

Urrea, J. M., "An Analysis Of Linux Ram Forensics," Master's Thesis, 窪蹋勛圖厙, March 2006. 

Wiberg, K. C., "Identifying Supervisory Control And Data Acquisition (SCADA) Systems On A Network Via Remote Reconnaissance," Master's Thesis, 窪蹋勛圖厙, September 2006. 

Theses 2005

Barwinski, M., "Taxonomy Of Spyware And Empirical Study Of Network Drive-By-Downloads," Master's Thesis, 窪蹋勛圖厙, September 2005. 

Bui, S., "Single Sign-On Solution For MYSEA Services," Master's Thesis, 窪蹋勛圖厙, September 2005. 

Cassidy, R. H. F., "Automating Case Reports For The Analysis Of Digital Evidence," Master's Thesis, 窪蹋勛圖厙, September 2005.  

Chua, C., "A CyberCIEGE Scenario Illustrating Software Integrity And Management Of Air-Gapped Networks In A Military Environment," Master's Thesis, 窪蹋勛圖厙, December 2005. 

Cooper, R. C., "Remote Application Support in a Multi-Level Environment," Master's Thesis, 窪蹋勛圖厙, March 2005. 

Craft, B. A. Jr., "Investigation Into the Potential Efficiencies and Added Security Provided by Employing RFID Technology To Monitor the Production of Materials," Master's Thesis, 窪蹋勛圖厙, September 2005. 

Gonzales, D. V., "An Analysis Of Automated Solutions For The Certification And Accreditation Of Navy Medicine Information Assets," Master's Thesis, 窪蹋勛圖厙, September 2005.  

Horn, J. F., "IPSec-Based Dynamic Security Services for the MYSEA Environment," Master's Thesis, 窪蹋勛圖厙, June 2005. 

Kane, D. R., "Web-Based Dissemination System for the Trusted Computing Exemplar Project," Master's Thesis, 窪蹋勛圖厙, June 2005.  

Labbe, K. G., "An Evaluation of Two Host-Based Intrusion Prevention Systems," Master's Thesis, 窪蹋勛圖厙, June 2005. 

Lysinger III, J.E., "Multilevel Print Server Requirements for DoN Application," Master's Thesis, 窪蹋勛圖厙, June 2005. (Access to this thesis is restricted) 

Mikus, N. A., "An Analysis of Disc Carving Techniques"," Master's Thesis, 窪蹋勛圖厙, March 2005. 

Mun, N. C., "A CyberCIEGE Scenario To Illustrate Classified Information Management In Multilevel Secure Systems For Military Command And Control," Master's Thesis, 窪蹋勛圖厙, December 2005. 

Noonan, R. J., "Vulnerability Assessment of the SLC 5/05 Programmable Controller (U)," Master's Thesis, 窪蹋勛圖厙, June 2005. (Access to this thesis is restricted))

Ruppar, C. A., "Identity Theft Prevention In CyberCIEGE," Master's Thesis, 窪蹋勛圖厙, December 2005.  

Tan, N. K., "A Firewall Training Program Based On CyberCIEGE," Master's Thesis, 窪蹋勛圖厙, December 2005. 

Todd P. Anderson, (Classified), Master's Thesis, 窪蹋勛圖厙, December 2005.

Mueller, D. S., "Authentication Scenario For Cyberciege," Master's Thesis, 窪蹋勛圖厙, September 2005. 

Tse, L., "Feasibility Study of VOIP Integration into the MYSEA Environment," Master's Thesis, 窪蹋勛圖厙, September 2005.

Vernon, R. C., "A Design For Sensing The Boot Type Of A Trusted Platform Module Enabled Computer," Maste'rs Thesis, 窪蹋勛圖厙, September 2005. 

Theses 2004

Ambers, V. P., and Kelly, A. M., "Installation, Configuration and Operational Testing of a PKI Certificate Server and its Supporting Services," Master's Thesis, 窪蹋勛圖厙, June 2004. 

Athanasopoulos, V., "Design and Development of a Web-Based DOD PKI Common Access Card (CAC) Instruction Tool," Master's Thesis, 窪蹋勛圖厙, March 2004.  

Baumgartner, T. J., and Phillips, M. D. W., "Implementation of a Network Address Translation Mechanism Over IPV6," Master's Thesis, 窪蹋勛圖厙, June 2004.  

Burrows, D., and Lemott Jr., D., "Evaluation of the 3COM Embedded Firewall System and its Role in Protection Against Distributed Denial of Service (DDOS) Attacks," Master's Thesis, 窪蹋勛圖厙, September 2004. (Access to this thesis is restricted)

Christensen, R. R., (Classified), Master's Thesis, 窪蹋勛圖厙, June 200

Cisneros, J. J., (Classified), Master's Thesis, 窪蹋勛圖厙, June 2004

Clark J. L., "High Assurance Project Evidence Presentation Using Semantic Graphs in XML," Master's Thesis, 窪蹋勛圖厙, March 2004

Craven, D. S., "A Formal Analysis of the MLS LAN: TCB-To-TCBE, Session Status, and TCBE-T0-Session Server Protocols," Master's Thesis, 窪蹋勛圖厙, September 2004.  

Dodge, C. A., "Recommendations for Secure Initialization Routines in Operating Systems," Master's Thesis, 窪蹋勛圖厙, September 2004.  

Fielk, K. W., "CyberCIEGE Scenerio Illustrating Integrity Risks to a Military Like Facility," Master's Thesis, 窪蹋勛圖厙, September 2004.  

Gross, M. E., "Configuration Management Evaluation Guidance for High Robustness Systems," Master's Thesis, 窪蹋勛圖厙, March 2004.

Guild, J., "Scripting Quality of Security Service (QoSS) Safeguard Measures for the Suggested INFOCON System," Master's Thesis, 窪蹋勛圖厙, March 2004. 

Guild, J. R., "Design and Analysis of a Model Reconfigurable Cyber-Exercise Laboratory (RCEL) for Information Assurance Education," Master's Thesis, 窪蹋勛圖厙, March 2004. 

Hart, D., "An Approach To Vulnerability Assessment For Navy Supervisory Control And Data Acquisition (Scada) Sytems," Master's Thesis, 窪蹋勛圖厙, September 2005. 

Herbig, C. F., "Use of OpenSSH Support for Remote Login to a Multilevel Secure System," Master's Thesis, 窪蹋勛圖厙, December 2004. 

Hilchie, A. T., "A Trusted Path Design and Implementation for Security Enhanced Linux," Master's Thesis, 窪蹋勛圖厙, September 2004.

Johns, Jr. K. W., "Toward Managing and Automating CyberCIEGE Scenario Definition File Creation," Master's Thesis, 窪蹋勛圖厙, March 2004. 

Lamorie, J., "A CyberCIEGE Scenario Illustrating Secrecy Issues in an Internal Corporate Network Connected to the Internet," Master's Thesis, 窪蹋勛圖厙, September 2004. 

LaMore, R.L., "CyberCIEGE Scenario Illustrating Secrecy Issues Through Mandatory and Discretionary Access Control Policies in a Multi-Level Security Network," Master's Thesis, 窪蹋勛圖厙, June 2004. 

Meyer, M.K., "A CyberCIEGE Scenario Illustrating Multilevel Secrecy Issues in an Air Operations Center Environment," Master's Thesis, 窪蹋勛圖厙, June 2004. 

Nguyen, L. K., "Predicting Catastrophic BGP Routing Instabilities," Master's Thesis, 窪蹋勛圖厙, March 2004. 

Phan, K. Q., "Design and Implementation of NFS for a Multilevel Secure System," Master's Thesis, 窪蹋勛圖厙, March 2004. 

Rogers, J., "Secure Distribution of Open Source Information," Master's Thesis, 窪蹋勛圖厙, December 2004. 

Rowlands, D., and Shumaker, T., "Risk assessment of the 窪蹋勛圖厙 Gigabit Network, Master's Thesis, 窪蹋勛圖厙, Monterey, California, September 2004.

Sears, J. D., "Simultaneous Connection Management and Protection in a Multilevel Security Environment," Master's Thesis, 窪蹋勛圖厙, September 2004. 

Sherman, M. A., "An Analysis of VPN Solutions and Best Practices for Use in Conjunction with Cyber Attack and Defend Exercises," Master's Thesis, 窪蹋勛圖厙, September 2004. 

Ward, M. P., "An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems," Master's Thesis, 窪蹋勛圖厙, September 2004. 

Wee, O. K., "Wireless Network Security: Design Considerations For An Enterprise Network," Master's Thesis, 窪蹋勛圖厙, March 2004.

Theses 2003

Alageel, S. M., "Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)," Master's Thesis, 窪蹋勛圖厙, June 2003.

Bailey, C. F., "Analysis of Security Solutions in Large Enterprises," Master's Thesis, 窪蹋勛圖厙, June 2003. 

Carrillo, C. M., "Continuous Biometric Authentication for Authorized Aircraft Personnel: A Proposed Design," Master's Thesis, 窪蹋勛圖厙, June 2003.

Galante, V. J., "Feasibility of Automatic FIWC Website Noncompliance Monitoring and Enforcement Activities," Master's Thesis, 窪蹋勛圖厙, June 2003. 

MacMichael Jr., J. L., "A Survey and Security Strength Classification of PKI Certificate Revocation Management Implementations," Master's Thesis, 窪蹋勛圖厙, December 2003. 

O'Neal, M. R., "A Design Comparison Between IPV4 and IPV6 in the Context of MYSEA, and Implementation of an IPV6 MYSEA Prototype," Master's Thesis, 窪蹋勛圖厙, June 2003. 

Teo, T. L., "Scenario Selection And Student Assessment Modules For CyberCIEGE," Master's Thesis, 窪蹋勛圖厙, Monterey, December 2003.  

Ubhayakar, S. S., "Evaluation of Program Specification and Verification Systems," Master's Thesis, 窪蹋勛圖厙, June 2003. 

Theses 2002

Anderson, E., A Demonstration of the Subversion Threat: Facing a Critical Responsibility in the Defense of Cyberspace, Master's Thesis, 窪蹋勛圖厙, March 2002. 

Aposporis, P., Framework for Managing Metadata Security Tags as the Basis for Making Security Decisions, Master's Thesis, 窪蹋勛圖厙, December 2002. 

Goktepe, M., "Windows XP Operating System Security Analysis," Master's Thesis, 窪蹋勛圖厙, October 2002.

Mohan, R., XML Based Adaptive IPSEC Policy Management in a Trust Management Context, Master's Thesis, 窪蹋勛圖厙, September 2002.

Morrison, J. D., IEEE 802.11 Wireless Local Area Network Security through Location Authentication, Master's Thesis, 窪蹋勛圖厙, September 2002. 

Senter III, J. W., and Thornton, C. S., Information Technology (IT) Ethics: Training and Awareness Materials for the Department of the Navy, Master's Thesis, 窪蹋勛圖厙, September and June 2002, respectively 

Smith, K. R., "Linux, OpenBSD, and Talisker: A Comparative Complexity Analysis," Master's Thesis, 窪蹋勛圖厙, March 2002. 

Price, P. D., "Toward an Internet Service Provider (ISP) Centric Security Approach," Master's Thesis, 窪蹋勛圖厙, March 2002.

Vojtik, R., "Exploiting IEEE 802.11B Networks: An Electronic Warfare Approach," Master's Thesis, 窪蹋勛圖厙, June 2002. (Access to this thesis is restricted)

Theses 2001

Agar, C. D., "Dynamic Parameterization of IPSec," Master's Thesis, 窪蹋勛圖厙, December 2001.

Brock, J., "Supporting the Secure Halting of User Sessions and Processes in the Linux Operating System," Master's Thesis, 窪蹋勛圖厙, June 2001. 

Brodhun, C. P., "Prioritization of IA Technology in a Resource Constrained Environment," Master's Thesis, 窪蹋勛圖厙, September 2001. (Access to this thesis is restricted) 

Burns, T., "Analysis of Thread Management in Windows CE," Master's Thesis, 窪蹋勛圖厙, September 2001.  

Glover, M., "Integrating a Trusted Computing Base Extensions Server and Secure Session Server into the Linux Operating System," Master's Thesis, 窪蹋勛圖厙, September 2001. 

Haynes, L. D., "Implications of User Identification Devices (UIDS) for the United States," Master's Thesis, 窪蹋勛圖厙, September 2001.

Hestad, D., "A Discretionary-Mandatory Model as Applied to Network Centric Warfare and Information Operations," Master's Thesis, 窪蹋勛圖厙, March 2001. 

McGovern, S., "INFOSEC Requirements for a Coalition Wide Area Network," Master's Thesis, 窪蹋勛圖厙, June 2001.

McKinley, D. R., "Implementing the 窪蹋勛圖厙's Security Policy Using Windows 2000," Master's Thesis, 窪蹋勛圖厙, September 2001. 

Negi, C., "Using Network Management Systems to Detect Distributed Denial of Service Attacks," Master's Thesis, 窪蹋勛圖厙, September 2001.

Pedersen, C., "Trust and Its Ramifications for the DoD Public Key Infrastructure (PKI)," Master's Thesis, 窪蹋勛圖厙, March 2001. 

Pereira, B., "Analyzing Input/Output Subsystem Security in Windows CE," Master's Thesis, 窪蹋勛圖厙, June 2001. 

Stocks, A. "Requirements for the Deployment of Public Key Infrastructure (PKI) in the USMC Tactical Environment," Master's Thesis, 窪蹋勛圖厙, June 2001. 

Whalen, T.,  Human Factors in Coast Guard Computer Security - An Analysis of the USCG's Current Awareness Level and Potential Techniques to Improve Security Program Viability, Master's Thesis, 窪蹋勛圖厙, June 2001. 

Ziemba, M., A Training Framework for the Department of Defense Public Key Infrastructure, Master's Thesis, 窪蹋勛圖厙, September 2001. 

Theses 2000

Agacayak, C., "Analysis of Mechanisms for TCBE Control of Object Reuse in Clients," Master's Thesis, 窪蹋勛圖厙, March 2000.

Bartram, S., "Supporting a Trusted Path for the Linux Operating System," Master's Thesis, 窪蹋勛圖厙, June 2000. 

Bersack, E. L., "Implementation of a HTTP (Web) Server on a High Assurance Multilevel Secure Platform, Master's Thesis, 窪蹋勛圖厙, December 2000.  

Brown, E., "Implementation of an SMTP Server for a High Assurance Multilevel LAN," Master's Thesis, 窪蹋勛圖厙, September 2000. 

Everette, T., "Enhancement of Internet Message Access Protocol (IMAP) for User-friendly Multilevel Mail Management," Master's Thesis, 窪蹋勛圖厙, September 2000.  

Polk, K. V., "Transparent Detection of QOS Violations for Continuos Applications," Master's Thesis, 窪蹋勛圖厙, June 2000.

Roeper, F., "An Analysis of Current and Future Cryptographic Token Technology and its Applications," Master's Thesis, 窪蹋勛圖厙, September 2000. (Access to this thesis is restricted) 

Rossetti, R., "A Mail File Administration Tool for a Multilevel High Assurance LAN," Master's Thesis, 窪蹋勛圖厙, September 2000. 

Turan, B., "Analysis for A Trusted Computing Base Extension Prototype Board," Master's Thesis, 窪蹋勛圖厙, March 2000.

Wilson, J. D., "Trusted Networking in a Multilevel Secure Environment," Master's Thesis, 窪蹋勛圖厙, June 2000. 


Theses 1999

Balmer, S. "Trusted Computing Base Extension Control System For Client Workstations," Master's Thesis, 窪蹋勛圖厙, September 1999.  

Bryer-Joyner, S. and Heller, S., "Local Area Network Services for a High Assurance Multilevel Network," Master's Thesis, 窪蹋勛圖厙, March 1999. 

Clark, P., "A Linux-Based Support of Low-Cost Access Control Policies," Master's Thesis, 窪蹋勛圖厙, September 1999.

Eads, B., "Developing a High Assurance Multi-level Mail Server," Master's Thesis, 窪蹋勛圖厙, March 1999.  

Fowler, J., "Security Planning for Wireless Networks," Master's Thesis, 窪蹋勛圖厙, March 1999. 

Hansen, A., "Public Key Infrastructure Interoperability: A Security Services Approach to Support Transfer to Trust," Master's Thesis, 窪蹋勛圖厙, September 1999. 

Kremer H. S., "Real-Time Intrusion Detection For Windows Nt Based On Navy It -21 Audit Policy," Maste'rs Thesis, 窪蹋勛圖厙, September 1999. 

Joyner, L., "Development of a Load-Balancing Mechanism for Parallel Firewalls," Master's Thesis, 窪蹋勛圖厙, March 1999.

Morris, D., and Rowe, D., "PKI Roadmap for the USMC," Master's Thesis, 窪蹋勛圖厙, September 1999. 

Oakes, D. "Migration Paths for Responding to Operating Systems Consolidation from a Network Security Perspective," Master's Thesis, 窪蹋勛圖厙, September 1999.  

Robin, S., "Analyzing the Intel Pentium's Architecture to Support Virtual Machine Monitors," Master's Thesis, 窪蹋勛圖厙, September 1999. 


Theses Theses 1998

Darroca, G. G., "A Flow-Based Security Protocol for Fast IP Tag Switching," Master's Thesis, 窪蹋勛圖厙, September 1998  

Hackerson, J., "Constructing a Trusted Computing Base Extension in Commercial-Off-the-Shelf Personal Computers for Multilevel Secure Local Area Networks," Master's Thesis, 窪蹋勛圖厙, September 1998  

Isa, H., "Utilizing Hardware Features for Secure Thread Management," Master's Thesis, 窪蹋勛圖厙, December 1998 (, )
Macchione, W. A., "The Capabilities, Propagation Effects, and Targeting of Computer Systems," Master's Thesis, 窪蹋勛圖厙, March 1998 (Access to this thesis is restricted) 

Wright, R., "Integrity Architecture and Security Services Demonstration for Management System for Heterogeneous Networks," Master's Thesis, 窪蹋勛圖厙, June 1998 


Theses 1997

Barrus, J., "Intrusion Detection in Real-Time in a Multi-Node Multi Host Environment," Master's Thesis, 窪蹋勛圖厙, September 1997.  

Buettner, R., and Harris, R., "Comparative Analysis of Commercial Off The Shelf (COTS) Encryption Products for Use in Transmitting Sensitive But Unclassified (SBU) Data," Master's Thesis, 窪蹋勛圖厙, September 1997. (Access to this thesis is restricted) 

Downey, J., and Robb, D., "A High Assurance Label-Based Mail Service for LANs," Master's Thesis, 窪蹋勛圖厙, September 1997. 

English, J., "Security Analysis for a Management System for Heterogeneous Networks (MSHN)," Master's Thesis, 窪蹋勛圖厙, September 1997.  

Umentum, B., "Using Web Technology to Disseminate INFOSEC Lectures," Master's Thesis, 窪蹋勛圖厙, September 1997. 

Weldon, S., "Security Issues in the JMCIS-Ashore Command and Control System," Master's Thesis, 窪蹋勛圖厙, September 1997.


Theses 1996

Campbell, H., and Currie III, D. L., "Implementation and Efficiency of Steganographic Techniques in Bitmapped Images and Embedded Data Survivability Against Lossy Compression Schemes," Master's Thesis, 窪蹋勛圖厙, March 1996. 

Heaton, L. A., "Radiant Mercury: An Assessment of the Issues," Master's Thesis, 窪蹋勛圖厙, September 1996. (Access to this thesis is restricted) 

Lee, J. J., McKenna, T., "The Object-Oriented Database and Processing of Electronic Warfare Data," Master's Thesis, 窪蹋勛圖厙, March 1996. 

Fulp, J. D., "A National Imagery System Security Policy," Master's Thesis, 窪蹋勛圖厙, March 1996. (Access to this thesis is restricted) 

Lucas, J., "Ensuring a C2 Level of Trust and Interoperability in a Networked Windows NT Environment," Master's Thesis, 窪蹋勛圖厙, September 1996.

Marlett, R., "Analysis of General Magic Telescript with Respect to Requirements," Master's Thesis, 窪蹋勛圖厙, September 1996. 

Wootten, D., "A Graphic User Interface for Rapid Integration of Steganography Software," Master's Thesis, 窪蹋勛圖厙, March 1996.

Theses 1995

DeJong, R., "A Study of the Covert Channels in a Trusted Unix System," Master's Thesis, 窪蹋勛圖厙, March 1995. 


Theses 1994

Muschalek, K., "Mandatory Security Policy Enforcement in Commercial Off-the-Shelf Database Management System Software: A Comparative Analysis of Informix On-Line/Secure and Trusted ORACLE," Master's Thesis, 窪蹋勛圖厙, September 1994.