The Institute for Cyber Security conducts applied research focused on advancing cybersecurity capabilities for critical infrastructure, public-sector organizations, and emerging technologies across West Virginia and the Appalachian region.
Our research integrates hands-on experimentation, cyber range environments, OT/ICS test platforms, drone and unmanned systems analysis, and digital forensics innovation. Each project is designed to solve real operational challenges faced by municipalities, healthcare providers, water systems, power utilities, and regional partners.
ICS research aligns directly with our mission: strengthening cyber readiness, improving resilience, accelerating innovation, and supporting the cybersecurity needs of communities, industry, and government.
Key research areas include:
Drone Trace + Unmanned Systems Security
Drone Trace + Unmanned Systems Security
The ICS’s partnership with DroneTrace supports applied research in drone forensics, traceability, and unmanned aircraft system (UAS) behavior.
Confirmed activities include:
- Analyzing drone flight data and hardware
- Practicing traceability and identification techniques
- Exploring security challenges in emerging UAS technologies
- Supporting hands-on training for students and practitioners
Digital Forensics and Investigative Innovation
The ICS supports digital forensics research and development through:
- Experimentation with forensic tools and methods
- Applied evidence-handling processes
- Hands-on student and practitioner training
- Practical testing of classroom and lab procedures
This research area grows directly from ICS faculty expertise and community training needs.
IT and OT Security for Critical Infrastructure
The ICS advances cybersecurity for operational technology across sectors including:
- Water and wastewater systems
- Healthcare technology environments
- Municipal services
- Industrial control systems
- Transportation systems
Focus areas:
- OT/ICS lab-based training
- Cyber readiness and scenario planning
- Vulnerability and threat analysis
- Alignment with federal guidance (CISA, EPA, NIST)
Cyber Operations Simulations and Threat-Response Modeling
The ICS conducts scenario driven cyber operations simulations:
- Simulated ransomware attacks to test incident response, containment, and recovery procedures.
- Phishing and social engineering campaigns that evaluate organizational awareness and detection capabilities.
- Advanced persistent threat (APT) emulation exercises replicating nation-state tactics, techniques, and procedures (TTPs).
- Distributed denial-of-service (DDoS) attack scenarios to assess network resilience and defensive mitigation strategies.
- Insider threat simulations modeling credential misuse, privilege escalation, and data exfiltration.
- ICS/OT disruption scenarios that mimic real-world failures in energy, water, transportation, or manufacturing systems.
- Supply-chain compromise simulations that replicate poisoned updates, dependency tampering, or compromised vendors.