This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
Exploiting the vulnerabilities on Metasploit 3 (Ubuntu) machine using Metasploit framework and methodologies
Download2020
A penetration test is also known as a pen test, pentest or ethical hacking. Penetration testing helps to secure networks and highlights the security issues. In this unit, investigate different aspects of penetration testing, including phases, tools, attack methodologies. More specifically, we...
-
2020
This unit focuses on penetration testing, and the main objective is to perform penetration testing on Metasploitable 3 to exploit vulnerabilities and to escalate privileges to administrator rights or higher. The primary purpose of this unit is to exploit Metasploitable 3 by taking reference from...
-
Exploring the experience of discernment of Alberta teachers in leadership roles when they face difficult situations in the education system
Download2020
This study explored the experience of discernment of Alberta teachers in leadership roles when they face difficult situations in the education system. The author of this research interviewed two participants in in-depth interviews. The purpose of this research was to gain an understanding of...
-
2021-06-01
Kaur, Prabhjot, Patel, Shiv, Mittal, Sanjaa, Sharma, Surbhi
Software Defined Networks have a centralized nature due to which the attackers may try to compromise them to jeopardize the whole network security. The SDN controller is the center point for connections between the applications and the network, becomes the potential candidate for network attacks...
-
2021-04-16
Although the COVID-19 pandemic brought uncertainty, this project uses a mixed-method research design to study the ways people thrive during a pandemic. Two hundred and five participants, ages 18 to 83 years, completed an online survey with 102 quantitative questions consisting of 5 inventories, a...
-
2021-06-01
Bitla, Sairam Kumar, Siripuram, Sai Pramukha, Devarapalli, Rama Chandini, Nelakurthi, Divya
Authentication/authorization mechanisms are always a potential target for an attacker. Port Knocking and its variations such as Single Packet Authentication (SPA) allow administrators to put additional shield on network interfaces with sensitive services. The existing SPA solutions are prone to...
-
2023
Patel, Dhruvkumar Girishchandra
Facial emotion recognition has gained substantial attention in past decade’s as a key factor for human-computer interaction. Emotion recognition refers to the ability to identify and understand human emotions based on various cues, such as facial expressions, voice tone, body language, and...