Daniel Davis

Date of Award


Document Type


Degree Name

Master of Science (MS)


Computer Science

Committee Chair

Feng Zhu

Committee Member

Mary Ellen Weisskopf

Committee Member

Harry Delugach


Computer security., Cyberterrorism., Cyber infrastructure--Security measures.


A progressive approach to teach students how to develop and deploy cybersecurity algorithms across a wide range of heterogeneous computing devices is proposed. Data confidentiality and data integrity can be ensured when sensitive information is transferred between various types of devices over insecure communication channels by using cybersecurity algorithms. A step-by-step procedure to teach students cybersecurity algorithms on devices ranging from personal computers to devices deployed in the Internet of Things ecosystem is needed. We develop four learning modules that offer students the opportunity to explore commonly utilized cybersecurity algorithms across several heterogeneous devices. Students are able to utilize our learning modules in hands-on projects to develop their own applications that utilizes cybersecurity algorithms to protect their sensitive information. Improvements to our learning modules is possible with eye tracking technology.



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.