The Department of Security Studies and International Affairs offers:

The department offers a broad, applied social science approach to security, intelligence and global conflict studies, providing hands-on processes starting early in a student's career. That approach continues through projects such as the senior capstone in Global Conflict Studies or Homeland Security and Intelligence, where students go out of the classroom, consult with industry members and work with real clients to solve real problems.

Visit the website of the Department of Security Studies & International Affairs

Follow

Submissions from 2021

PDF

Cyber Supply Chain Risk Management: Implications for the SOF Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, and Diane M. Zorri

PDF

Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF, Gary C. Kessler and Diane M. Zorri

Submissions from 2020

PDF

The Evolution of Social Justice in International Higher Education, Aaron D. Clevenger

PDF

Meeting at the Crossroads: A Dialogue Navigating the Intersections between International Education and Social Justice, Aaron D. Clevenger and Linwood Whitten

PDF

Iran, Diane M. Zorri

Submissions from 2019

PDF

Field Expertise: How to Create an Effective Travel Risk Policy, Aaron D. Clevenger

PDF

Current Trends in Small Unmanned Aircraft Systems: Implications for U.S. Special Operations Forces, J. Philip Craiger and Diane Maye Zorri

PDF

An Overview of Cryptography (Updated Version 24 January 2019), Gary C. Kessler

PDF

Cybersecurity in the Maritime Domain, Gary C. Kessler

Submissions from 2018

Link

A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System, Gary C. Kessler, Philip Craiger, and J. C. Haass

PDF

A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System, G. C. Kessler, J. P. Craiger, and J. C. Haass

PDF

Two Awakenings, One Process: Implications from the Sunni Realignment in Iraq, 2006-2007, Diane Maye Zorri

Submissions from 2017

PDF

Exploring Myths in Digital Forensics: Separating Science From Ritual, Gary C. Kessler and Gregory H. Carlton

PDF

Using Journals to Assess Non-STEM Student Learning in STEM Courses: A Case Study in Cybersecurity Education, Gary Kessler, Glenn S. Dardick, and Douglas L. Holton

PDF

Autarky or Interdependence? U.S. vs. European Security and Defense Industries in a Globalized Market, Diane Maye Zorri

PDF

Does ISIS Satisfy the Criteria of an Apocalyptic Islamic Cult? An Evidence-Based Historical Qualitative Meta-Analysis, Diane Maye Zorri and Bruce Barron

Submissions from 2016

PDF

An Overview of Cryptography (Updated Version, 3 March 2016), Gary C. Kessler

PDF

The Wrecks of Lake Champlain, Gary C. Kessler

PDF

Understanding the Sunni Awakening with Complexity Theory, Diane Maye Zorri

Submissions from 2015

PDF

Are Mobile Device Examinations Practiced like 'Forensics'?, Gary Kessler

PDF

An Overview of Steganography for the Computer Forensics Examiner (Updated Version, February 2015), Gary C. Kessler

Link

Herbert Yardley and the American Black Chamber: Lessons for Today?, William J. Lahneman

Submissions from 2014

PDF

A Study of Forensic Imaging in the Absence of Write-Blockers, Gary C. Kessler and Gregory H. Carlton

PDF

Educating the Next Generation of Cyberforensic Professionals, Mark Pollitt and Philip Craiger

Submissions from 2013

PDF

Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory, Gary C. Kessler

PDF

Paradigms for Cybersecurity Education in a Homeland Security Program, Gary C. Kessler and James Ramsay

PDF

The Case to Accredit Homeland Security Programs: Why Outcomes-based Accreditation Makes Sense, James D. Ramsay

PDF

There's a Pattern Here: The Case to Integrate Environmental Security into Homeland Security Strategy, James D. Ramsay and Terrence M. O'Sullivan

Submissions from 2012

PDF

New Media and Ethno-Politics in the Guinean Diaspora, Mohamed S. Camara

PDF

Identifying Trace Evidence from Target-Specific Data Wiping Application Software, Gregory H. Carlton and Gary C. Kessler

PDF

Developing a Homeland Security Curriculum: A Case Study in Outcomes-Based Education Using the Delphi Method, Daniel Cutrer

PDF

Introduction to Cryptography, Gary C. Kessler

PDF

The Advanced Persistent Threat and the Role of Cybersecurity Education, Gary C. Kessler

PDF

Perceptual Framing of Homeland Security, Linda Kiltz and James D. Ramsay

Submissions from 2011

PDF

Forensic Analysis of Plug Computers, Scott Conrad, Greg Dorn, and Philip Craiger

PDF

A Guide for Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses, Steven Hart and James D. Ramsay

PDF

Judges' Awareness, Understanding, and Application of Digital Evidence, Gary C. Kessler

Submissions from 2010

PDF

Forensic Analysis of a Playstation 3 Console, Scott Conrad, Greg Dorn, and Philip Craiger

PDF

Book Review: Digital Forensic Evidence Examination, Gary C. Kessler

PDF

Development of an Outcomes-Based Undergraduate Curriculum in Homeland Security, James D. Ramsay, Daniel A. Cutrer, and Robert Raffel

Submissions from 2009

PDF

Bluetooth Hacking: A Case Study, Dennis Browning and Gary C. Kessler

PDF

Forensic Analysis of the Sony Playstation Portable, Scott Conrad, Carlos Rodriguez, Chris Marberry, and Philip Craiger

PDF

Analyzing the Impact of a Virtual Machine on a Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, and Philip Craiger

PDF

Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, Gary C. Kessler

PDF

Digital Forensics: Everything Leaves a Trace in Cyberspace, Gary C. Kessler

Submissions from 2008

PDF

Benediction and Malediction in Fulani Culture: Exploring an Afro-Muslim Perception of the Socio-Spiritual Dimensions of Success and Failure, Mohamed S. Camara

PDF

Media, Civil Society and Political Culture in West Africa, Mohamed S. Camara

PDF

Book Review: Challenges to Digital Forensic Evidence, Gary C. Kessler

PDF

Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, Gary C. Kessler

PDF

Book Review: The dotCrime Manifesto: How to Stop Internet Crime, Gary C. Kessler

PDF

On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners, Gary C. Kessler

Submissions from 2007

PDF

Forensic Analysis of Xbox Consoles, Paul Burke and Philip Craiger

PDF

Nation Building and the Politics of Islamic Internationalism in Guinea: Toward an Understanding of Muslims’ Experience of Globalization in Africa, Mohamed S. Camara

PDF

Book Review: Conquest in Cyberspace: National Security and Information Warfare, Gary C. Kessler

PDF

Book Review: No Place to Hide, Gary C. Kessler

PDF

The Case for Teaching Network Protocols to Computer Forensics Examiners, Gary C. Kessler and Matt Fasulo

PDF

Factors Affecting One-Way Hashing of CD-R Media, Christopher Marberry and Philip Craiger

Submissions from 2006

PDF

Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke and Philip Craiger

PDF

Mac OS X Forensics, Philip Craiger and Paul Burke

PDF

Book Review: Digital Crime and Forensic Science in Cyberspace, Gary C. Kessler

PDF

Two-Factor Authentication for Online Banking Applications, Gary C. Kessler

PDF

The Design of an Undergraduate Degree Program in Computer & Digital Forensics, Gary C. Kessler and Michael E. Schirling

PDF

The Future of Intelligence Analysis, Volume 2: Annotated Bibliography: Publications on Intelligence Analysis and Reform, William J. Lahneman

Submissions from 2005

PDF

Recovering Digital Evidence From Linux Systems, Philip Craiger

PDF

Future Ideological Challenges: Fault Lines, Movements, and Competing Models (Annotated Bibliography Based on Survey of the Literature), William J. Lahneman

PDF

Future Ideological Challenges: Fault Lines, Movements, and Competing Models (Report on Survey of the Literature), William J. Lahneman

PDF

Impact of Diaspora Communities on National and Global Politics: Annotated Bibliography Based on Survey of the Literature, William J. Lahneman

PDF

Impact of Diaspora Communities on National and Global Politics: Report on Survey of the Literature, William J. Lahneman

Submissions from 2004

PDF

"Exclusive Domination" or "Short Term Imperialism": The Peruvian Response to U.S.-Argentine Rivalry, 1946-1950, Glenn J. Dorn

Link

An Overview of Steganography for the Computer Forensics Examiner, Gary C. Kessler

Submissions from 2002

PDF

Computer Forensics: The Issues and Current Books in the Field, Gary C. Kessler and Michael Schirling

Submissions from 1999

PDF

The Web Can Be Suitable for Learning, Gary C. Kessler, Ken Rosenblad, and Steven D. Shepard

Submissions from 1997

PDF

John Bassett Moore, Robert Lansing, and the Shandong Question, Stephen Craft

Submissions from 202

PDF

Impact of Technology on University International Travel Policies, Aaron D. Clevenger, Elaine Del Rossi, Patrick Morgan, and Gary Rhodes