This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 1Bitla, Sairam Kumar
- 1Devarapalli, Rama Chandini
- 1Hindle, Abram
- 1Kaur, Amandeep
- 1Nelakurthi, Divya
- 1Siripuram, Sai Pramukha
- 3Concordia University of Edmonton
- 2Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 1Computing Science, Department of
- 1Computing Science, Department of/Conference Papers (Computing Science)
- 1Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
-
2021-06-01
Bitla, Sairam Kumar, Siripuram, Sai Pramukha, Devarapalli, Rama Chandini, Nelakurthi, Divya
Authentication/authorization mechanisms are always a potential target for an attacker. Port Knocking and its variations such as Single Packet Authentication (SPA) allow administrators to put additional shield on network interfaces with sensitive services. The existing SPA solutions are prone to...
-
2020
Web application firewalls (WAF) have been proven to be a useful tool in a much needed security for internet applications. Automation of ruleset development for WAF may reduce human errors and establish required baseline for web security. This research paper shows that mechanical implementation of...
-
2016
NIMEs typically focus on novelty but the cost of novelty is often to ignore other non-functional requirements and concerns such as usability or security. Digital security has probably not been a concern for performers due to the duration of their performances and lack of disrespectful hackers,...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
In this research project , the forensic assessment, identification, and prevention of the Metasploit 2 exploits were performed using SNORT to evolve useful rules for future reference to ensure high level information security.