skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Troy, Fayed"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. This report will discuss and analyze the risks and challenges associated with smart home devices, focusing on vulnerabilities in commonly used products such as smart speakers, security cameras, thermostats, and lighting systems. As the adoption of smart home security grows globally, it has become clear that many users remain unaware of the associated security risks, leading to data breaches and potential privacy violations. This research evaluates the security features of these devices, the frequency of breaches, and common vulnerabilities. Using a mixed-methods approach—including a user survey, analysis of past cybersecurity incidents, and a detailed review of existing literature—this study assesses the current state of smart home device security. The findings aim to highlight gaps in user awareness, evaluate manufacturers’ protective measures, and provide recommendations for improving cybersecurity practices in smart home environments. 
    more » « less
    Free, publicly-accessible full text available March 29, 2026
  2. This report will discuss implementing artificial intelligence in healthcare. Artificial Intelligence would be beneficial to healthcare because of the endless opportunities it provides. AI can be used to help detect and cure diseases, help patients with a path to treatment and even assist doctors with surgeries. Within this paper I will talk to you about the benefits of AI in healthcare and how it can be implemented using cyber security. In addition, I will conduct interviews with doctors and nurses to hear their perspective on AI in hospitals and how it is needed as well. As well as create a survey for nursing students at my university to see what their viewpoints are on adding AI unto the field of medicine. The best method to incorporate both user input and research into this paper is to use user input to back up the research. User input will be great addition because it gives the readers a real-world opinion on if this topic is valid. 
    more » « less
  3. This report will discuss the importance of network security. Network Security is important because it prevents hackers from gaining access to data and personal information. The issue in society is that users get their data stolen every day and are scared that their information is blasted out to the world. Within this paper I will talk to you about the importance of network security and how it can change your day-to-day life using cyber security. In addition, I will create a survey for computer science majors to see if network security is important. Also, I will send a survey to a DISA employee to get his perspective on this topic and his comments as well. The best method to incorporate both user input and research into this paper is to use user input to back up the research. User input will be a great addition because it gives the readers a real-world opinion on if this topic is valid. 
    more » « less