The UH West O`ahu Cyber Security Research Laboratory (CSRL) is a U.S. Department of Defense (DoD) Cyber Scholarship Program (CySP) grant funded initiative established to provide students with unique opportunities to combine cyber security education and skills to promote the exploration and development of advanced knowledge and capabilities in an applied research environment.
The CSRL provides internship opportunities where students participate in faculty guided applied analysis and research related to the understanding and improvement of security and resiliency for critical information infrastructures and systems at the local, regional, and national level. The CSRL coordinates with the UH West O`ahu Cyber Security Coordination Center (CSCC) with cybersecurity research, analysis, and outreach initiatives.
![](https://www.google.com/images/icons/product/drive-32.png)
Unmanned Aerial Vehicle Detection Using Radio Frequency Analysis
Kyle Vetters
![](https://www.google.com/images/icons/product/drive-32.png)
Assessment of Industrial IoT Device Security
Matthew Yamaguchi
![](https://www.google.com/images/icons/product/drive-32.png)
Assessment of Anti-Malware Effectiveness in Android Virtual Machines
Matthew Yamaguchi
![](https://www.google.com/images/icons/product/drive-32.png)
Wireless Vehicle Entry and Start System Security
Gabriel Kapeliela
![](https://www.google.com/images/icons/product/drive-32.png)
Effects of Denial-of-Service on Video Game Performance
Jonathan Chin
![](https://www.google.com/images/icons/product/drive-32.png)
Comparison of Free and Premium VPN Services for Mobile Phones
Ydel Espiritu
![](https://www.google.com/images/icons/product/drive-32.png)
Impact of Semiconductor Supply Chain on National Security
Humiharu Takasugi
![](https://www.google.com/images/icons/product/drive-32.png)
Comparison of Digital Forensic Analysis Tools
Joshua Bourns and Melissa Navares
![](https://www.google.com/images/icons/product/drive-32.png)
Internet of Things (IoT) Security
Max Soto
![](https://www.google.com/images/icons/product/drive-32.png)
Quick Response (QR) Code Vulnerabilities
Melchor Servito-Sipeli’i
![](https://www.google.com/images/icons/product/drive-32.png)
Measuring the Effects of Dimensionality Reduction Algorithms: Principal Component Analysis on Optical Character Recognition Models with Support Vector Machine Classifier
Guy Nguyen-Phuoc
![](https://www.google.com/images/icons/product/drive-32.png)
Evaluation of Multi-Factor Authentication Systems
William Sotelo
![](https://www.google.com/images/icons/product/drive-32.png)
Comparison of Information Security Education and Certification Requirements
Joshua Celebre
![](https://www.google.com/images/icons/product/drive-32.png)
Assessment of Management Frame Protection
Daniel Cummings
![](https://www.google.com/images/icons/product/drive-32.png)
Perspectives on Wearable Fitness Device Security and Privacy
Nina Pandya
![](https://www.google.com/images/icons/product/drive-32.png)
Cyber Security Penetration Testing Methods and Procedures
Michael Irizarry
![](https://www.google.com/images/icons/product/drive-32.png)
Effectiveness of Thermal Attacks on Electronic and Mechanical Locks
Justin Labiano
![](https://www.google.com/images/icons/product/drive-32.png)
Evaluation of Security Vulnerabilities and Risks in Online Gaming
Justin Balino
![](https://www.google.com/images/icons/product/drive-32.png)
Evaluation of Increased Security Procedures on the Efficiency of High Reliability Availability
Gil Gajardo Jr.
![](https://www.google.com/images/icons/product/drive-32.png)
Evaluation of Impact of Cyber Attacks on Industry Sectors
Christopher Gallarde Jr.
![](https://www.google.com/images/icons/product/drive-32.png)
Evaluation of the Impact of Communication Standards and Protocols on Vehicle-to-Vehicle Communications
Leilani Ledesma
![](https://www.google.com/images/icons/product/drive-32.png)
Safe Software: An Analysis on the Feasibility of the Rust Programming Language for Modern Software Development
David Pavlicek
![](https://www.google.com/images/icons/product/drive-32.png)
Defending Against Payment Card Skimming
Shai Paige
![](https://www.google.com/images/icons/product/drive-32.png)
Enhancements to Network Configuration for Small and Medium Sized Businesses
Timothy Mitchell
![](https://www.google.com/images/icons/product/drive-32.png)
Medical IoT Attack Analysis
Chyson Pena
![](https://www.google.com/images/icons/product/drive-32.png)
Artificial Intelligence Integration in Modern Military Operations
Clark Casabay
![](https://www.google.com/images/icons/product/drive-32.png)
Applications for LoRaWAN Wireless Secure Mesh Network Communications
David Pavlicek and Jared McCann
![](https://www.google.com/images/icons/product/drive-32.png)
Evaluation of Artificial Intelligence for Malware Detection
Daniel Delos Santos
![](https://www.google.com/images/icons/product/drive-32.png)
Importance of Digital Forensics Process Models: Some Examples
David Begg
![](https://www.google.com/images/icons/product/drive-32.png)
Healthcare Data Breaches Impact on Privacy and Security
Nichole Cavada
![](https://www.google.com/images/icons/product/drive-32.png)
Connected Cars Connected Risks A Cybersecurity Analysis of Electric Vehicles
Angelina Jones
![](https://www.google.com/images/icons/product/drive-32.png)
Digital Supply Chain Vulnerabilities and Mitigation
Chloe Kurashima
![](https://www.google.com/images/icons/product/drive-32.png)
Evaluation of Artificial Intelligence-Based Cyber Threats
Jance Apuya
Dr. Burrell, Director
Cyber Security Research Laboratory
Updated 12/20/2024