top of page

2026 CAE-CD Track Posters

AI Based Dynamic Threat Modeling for Assessing Access Control Posture in Cyber Physical Systems

Indrakshi Ray, Shwetha Gowdanakatte

Colorado State University, Fort Collins

Like

Building a Privacy and Security Layer Around LLM Models to Protect Against Common AI Attacks

Samuel Kadima, Kyle Totorica
Xavier University, Department of Computer Science

Like

Building a Secure, Scalable Capture The Flag Platform for Cybersecurity Education

Giovanni Braun

University of Southern Maine

Like

Cybersecurity Capstone Project Design: A Simulation Approach

Ping Wang

Robert Morris University

Like

Designing an Information Security Policy and Compliance Plan for a Dental Clinic: A NIST Cybersecurity Framework Approach to Managing ePHI Risks

Team/Students: ISEC 695-1 / Tomas Heredia & Mauricio Bisogno

Business Advisor: James Adams

Professor: Dr. Yair Levy, Professor of IS & Cybersecurity

Nova Southeastern University, Center for Information Protection, Education, and Research (CIPhER), College of Computing, AI, and Cybersecurity (CCAC)

Like

Development of a Digital Forensics Lab for Incident Response, Criminal Investigation, and Host Analysis Training

William Meredith, Thomas Devine, PhD

West Virginia University

Like

Development of a Unified Theoretical Framework for Zero Trust Enterprise Network Cybersecurity (ZTENS)

Olufemi Agunbiade, Dr. Onyema Osuagwu
The C4 Lab, Morgan State University, Maryland

Like

Evansdale 2050: A Cybersecurity-Centered Physical Model of a Personal Rapid Transit System

Tucker Amon, Salem Hefeida, Jordan Luzier, James Sleptzoff, Dr. Cosmas Nwakanma, Dr. Mohamed Hefeida

Lane Department of Computer Science and Electrical Engineering, WVU

Like

Federated Learning-Based Anomaly Detection for High-Performance Research Networks

Ehsan Saeedizade, Shamik Sengupta, Jay Thom

University of Nevada, Reno

Like

Free and Open-Source Security Orchestration, Automation, and Response Platform (FOSS-SOAR)

Aedan Podest, Cooper Landen

Xavier University, Department of Cyber Security

Like

From Mass Extraction To Ethical Triage: Multi agent AI For Privacy-preserving Computer Forensics

Md Tamjid Hossain, CISSP, PhD; Shafkat Islam, PhD
Texas A&M University–San Antonio, Purdue University Northwest

Like

Gated Cross-Attention Matcher for Aligning Course With Relevant KUs

Aashish Pandey, Ram Dantu
Department of Computer Science and Engineering, University of North Texas

Like

Governing & Securing AI Systems Through LLM Red Teaming

Kellep A. Charles, D.Sc.

Capitol Technology University, Cybersecurity Department

Like

HARM66+ A Taxonomy for the Harm-Entity-Aware Post-AI Security

Javed I Khan, Sharmila Rahman Prithula
Kent State University

Like

Important Factors in Obtaining a Job in Cybersecurity in the United States

Laila Hamdan, Aslihan Altindal, Eric Chan-Tin
Department of Computer Science, Loyola University Chicago

Like

Increasing Network-Based Protection against Cybersecurity Threats within a Healthcare Clinic

Student: Jose F Padilla

Business Advisor: Tim Dentes

Professor: Dr. Yair Levy, Professor of IS & Cybersecurity
Nova Southeastern University, Center for Information Protection, Education, and Research (CIPhER), College of Computing, AI, and Cybersecurity (CCAC)

Like

Injecting Software Guarantees in Brownfield Software Development

Student: Ishi Golub

Advisor: Prof. Aspen Olmsted, Ph.D.
School of Computing and Data Science, Wentworth Institute of Technology

Like

Jericho: An Accessible Cyber City Model for Teaching Cyber Operations

Alex Taylor, David Moore, Nathaniel Gavilan, Andrew Quick, Dr. Seth Hamman

Cedarville University, School of Engineering and Computer Science

Like

Modeling Cloud-Controlled Cyber-Physical System Resilience Using a Reinforcement-Learning Cart-Pole Testbed

Md Imran Jahid Khan, Mohammad Rahman, Fan Wu

Department of Computer Science, Tuskegee University

Like

Securing AI Systems Against Data, Model, and Tool Poisoning Attacks

Dr. Meryem Abouali, Danish Merchant, Mauricio Embus Perez, Perla Dahan
John Jay College of Criminal Justice, New York

Like

Securing real-time biosignal Command Streaming for Assistive Robotics

Joy Williams, Chukwuebuke Okwese, Dr. Onyema Osuagwu

The C4 Lab, Morgan State University

Like

Semantic Search for Healthcare Patient Data using Sentence Transformers and ChromaDB

Students: Megan Rabb, Shani Walker, Joniqua Bates

Faculty Mentors: Xiaomao Liu, Janmejay Mohanty, Biswajit Biswal, Nikunja Swain
South Carolina State University, Computer Science and Mathematics Department

Like

Strengthening Home Networks: Evaluating Routers Against NIST Standards

Oluwapemiisin G. Akingbola, Dr. Toluwalogo Odumosu
Morgan State University, Cybersecurity Assurance and Policy Center

Like

The Impact of Scholarships and Co-Curriculum Activities on the Academic Success and Career Prospects of Cybersecurity Students

Katerina Goseva-Popstojanova, Lane Dept. of Computer Science and Electrical Engineering

Robin Hensel, Fundamentals of Engineering Program

West Virginia University

Like

The Overclock Experience: Living and Learning in the Modern Cybersecurity Residence Hall

David Richards, Executive Director

Grand Canyon University, Cyber Center of Excellence

Like

Toward AI-driven Monitoring And Malware Detection Framework For IoT And Edge Systems

Ehsan Saeedizade, Jake Lyon, Shamik Sengupta
University of Nevada, Reno, The College of Wooster

Like

US Coast Guard Academy (USCGA1) eCTF 2026

Team: Tyler Bissett, Phillip Kuznetsov, Caden Waters, Daniel Yi

Advisor: Mohamed Elwakil, PhD

Department of Electrical Engineering and Computing, U.S. Coast Guard Academy

Like

Use of Cyber-Informed Engineering for Digital Risk Mitigation

Wm. Arthur Conklin

University of Houston, Texas

Like
bottom of page