Search
Skip to Search Results- 148GAPSSHRC
- 88Various
- 86CIHR
- 59University of Alberta Symphonic Wind Ensemble
- 53University of Alberta Concert Choir
- 51University of Alberta Concert Band
-
Securing remote access networks using malware detection tools for industrial control systems
Download2020
With their role as an integral part of its infrastructure, Industrial control systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have witnessed the integration of information systems (IS) into their processes, connecting them to the...
-
2014-01-01
VoIP technology is rapidly gaining adoption because of its advantage in providing voice services on IP networks. Therefore, it also gains attention of hackers and crackers. In this work, a security issue namely eavesdropping and phrase spotting is handled using a new technique. The proposed...
-
2020
Containers technology has radically changed the ways for packaging applications and deploying them as services in a cloud environment. According to the recent report of TrendMicro security predictions of 2020, the vulnerabilities in container components that are deployed with cloud architecture...
-
2021-06-01
Kairoju, Supraja, Sultana, Rouheen, Danidharia, Priyanka
The necessity to store extensive volumes of data as the information produced increases exponentially. An increasing number of businesses have embraced different types of non-relational databases in recent years, generally referred to as NoSQL databases. Security auditing procedures for these new...
-
2018
Software Defined Networking (SDN) a novel approach to networking has introduced both innovative opportunities and disadvantages in the networking field. The opportunities brought by this technology varies from the facility in configuring and managing a vast and dynamic network while using less...
-
2013-01-01
This paper provides insight into the security of the existing mobile payment system by studying its system architecture and the security architecture. It also reviews the security vulnerabilities in some components of the architecture and studies how these vulnerabilities might be exploited. This...
-
2020
There has been notable proliferation of network-enabled devices. The myriad of security threats and highly publicized data breaches demonstrate the importance of protecting access to the evolving enterprise network. The introduction of Software Defined Network (SDN) has brought about remarkable...
-
2022
This research analyzed selected contact tracing applications to identify potential vulnerabilities and geolocation of services used by these applications. MobSF framework and Android emulators were used to perform static and dynamic analysis of the applications. Security policies of applications...
-
Sedimentological, Ichnological, and Architectural Characteristics of Geobodies in a Fluvial to Estuary Setting: the McMurray Formation in the Christina River area, NE Alberta, Canada - Supplementary material
Sedimentological, Ichnological, and Architectural Characteristics of Geobodies in a Fluvial to Estuary Setting: the McMurray Formation in the Christina River area, NE Alberta, Canada - Supplementary material
Download2023-01-01
These are supplementary materials for the PhD thesis titled "Sedimentological, Ichnological, and Architectural Characteristics of Geobodies in a Fluvial to Estuary Setting: the McMurray Formation in the Christina River area, NE Alberta, Canada". Abstract: The Lower Cretaceous McMurray...
-
Selected Children’s Fiction by Canadian Indigenous Authors Related to Truth and Reconciliation Themes
Download2018-06-29
Tan, Maria C; Campbell, Sandy; Quaiattini, Andrea
This list of children's fiction by Canadian Indigenous authors was selected for content related to the Truth and Reconciliation Commissions Calls to Action.