This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 2Kaur, Amandeep
- 1Ahuja, Puneet
- 1Ancha, Jyothi Sharmila
- 1Bagla, Navjot
- 1Bhusri, Sagar
- 1Bonagiri, Raja Venkata Sandeep Kumar
-
2021-06-01
Kolencheril, Jerbin Joy, Messerschmidt, Mitchell, Bhusri, Sagar, Kotha, Vamshidhar Reddy, Jawanda, Gurcharan, Thomas, Betsy Elsa, Bonagiri, Raja Venkata Sandeep Kumar, Shah, Aakash, Nallarala, Abhilash, Garg, Gaurav, Pathak, Isha, Saggu, Ravdeep, Doddaka, Sravya, Pole, Sparsha, Singh, Satinderpal, Vadlamudi, Tejaswini, Sethuraman, Vigneshwar, Vangala, Vishista, Kaur, Amritpal, Kaur, Parminder, Chittimalla, Sai Kumar, Chittimalla, Sandeep, Patel, Priyesha, Kirandeep, Singh, Mandeep, Joshi, Dhanvi, Pathan, Rahim Khan, Ancha, Jyothi Sharmila, Kaur, Amandeep, Bagla, Navjot, Thakur, Preeti, Pugalenthi, Subaveena, Garrapu, Tharun, Gummakonda, Anirudh, Soobhri, Pawan, Kaur, Simranbir, Ahuja, Puneet, Rathod, Divya, Varma, Upasana, Nadipineni, Pavan kumar, Vemuri, Keerthi Kishore, Maadeereddy, Amulya, Raikar, Akshata Rajendra, Sunkara, Leela Suresh, Mehta, Akshat, Heena, Kaur, Kiranjit, Shah, Anish Manishkumar, Elumalai, Sweatha, Joshi, Mansi, Chauhan, Bhavyarajsinh, Nellore, Rishab Kumar Singh, Lindskog, Dale
In recent years, the prevalent utilization of technology and web applications has given rise to security vulnerabilities. This problem has dramatically increased the demand for proposed security models and mechanisms. Organizations find it challenging to secure their web applications and find...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
In this research project , the forensic assessment, identification, and prevention of the Metasploit 2 exploits were performed using SNORT to evolve useful rules for future reference to ensure high level information security.