SearchSkip to Search Results
- 167Concordia University of Edmonton
- 93Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
- 12Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 10Concordia University of Edmonton/Master of Arts in Biblical and Christian Studies Theses (Concordia University of Edmonton)
This thesis examines how the Hebrew word רוח is used in Ezekiel 37:1-14 and the Greek word πνευμα is used in John 3:1-21. Greek and Hebrew are two very different languages. Yet they often are paired together, since they are the two main languages used in the Christian Bible. They certainly have...
Water quality of the North Saskatchewan River and its four tributaries in Alberta's Industrial HeartlandDownload
Monitoring the quality of the water in the North Saskatchewan River and its tributaries is critical to ensure compliance with provincial and federal guidelines related to water quality; for the benefit of humans, other animals and the ecosystems surrounding these areas. The human population and...
Web Applications are subject to threats as they tend to be vulnerable. This unit will be focusing on various web application vulnerability detection and attempting to exploit them as well. The main goal will be to identify and utilize some of the tools to perform penetration testing on existing...
The Rivest-Shamir-Adleman (RSA) cryptosystem is one of the most popular cryptosystems being used in secure data transmission. Until today, the cryptosystem is still considered to be safe due to the hardness of the factorization problem. The LenstraLenstra-Lovã¡sz (LLL) algorithm offers various...
The Android operating system is increasingly exposed to a growing list of dangerous malware attacks, these attacks cost users and businesses. There is considerable research into Android malware detection, malware behavior, interaction and permissions. However, there is much less research effort...
Many versions of green fluorescent protein (GFP) have been engineered by site-directed or random mutagenesis of native proteins. However, there are still areas where these proteins can be altered in order to provide the research community with more effective biotechnology tools. This experiment...
IoT comprises of cyber-physical devices connected through the internet. These devices carry sensitive data and support critical services. Due to the sensitivity of user data shared across IoT, there is a risk of attacks such as spoofing, eavesdropping, and denial of service (DoS). These attacks...
The purpose of a kernel rootkit is to prevent detection of a compromised operating system. System Service Dispatch Table (SSDT) hooking has been employed by most Windows kernel rootkits as a method of hiding files, processes and registry keys from system and investigative utilities, by...
This thesis analyses the development of Dietrich Bonhoeffer’s understanding of the bodily presence of Christ pro nobis in, with, and through the church-community. In studying his ecclesiology, the Christological basis for his comprehension of the church is displayed. The first chapter discusses...
The modeling of an identity catching attack on the Universal Mobile Telecommunication System (UMTS) using attack tree methodologyDownload
This research focuses on the modeling of an Identity Catching attacks in the Universal Mobile Telecommunication System (UMTS) using attack tree methodology. The possible ways an intruder could launch an identity catching attacks on the UMTS are identified and modeled using attack tree...