This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
2015-07-04
Salmonellosis is one of the most common food infections identified in medical microbiology. Salmonella typhimurium, a pathogenic bacterium that produces this food infection is found to be a problem in the United States and Canada. It causes certain symptoms ranging from mild discomfort to death...
-
2021-09-01
Lately, technological advancement has made it possible with the accessibility of enormous annotated datasets and artificial intelligence breakthroughs to have sparked a spectacular rise of precise object recognition and analysis. This thesis specifies the development and implementation...
-
2009-01-01
Distributed Denial of Service attacks have long been a staple of the Internet?s malware community that has not been dealt with outside of companies with large budgets. Many of these attacks use spoofing to obfuscate their originating address. It is this problem that I intend to address with a new...
-
2020
Johnson, Florence Mary Paul David
With increased financial loss and massive data breaches in the cloud-based environments, it is imperative for organizations to invest in new Identity and Access Management(IAM) solutions that are usable and are conforming to all the security requirements needed to protect cloud identities. A...
-
Salix discolor: Prospects for phytoremediation of lead and polycyclic aromatic hydrocarbons
Download2016-08-04
Phytoremediation is the application of green plants and their associated microbial communities for the removal, stabilization or detoxification of contaminants in the environment. Salix discolor, commonly known as the pussy willow, is a common Canadian shrub that was evaluated for...
-
2012-01-01
Industries are highly dependent on reliable, accurate and automated control systems to monitor equipment that are critical to their operation. Supervisory Control And Data Acquisition (SCADA) is the most advanced control system which is being widely used in industries and it is an attractive...
-
2007-01-01
Supervisory Control and Data Acquisition (SCADA) systems within the corporate environment are changing into information systems. As such, they also are becoming information assets within the organization and, therefore, they need to be protected appropriately, possibly via existing IT standards...
-
Scoping ITGCs for SOx 404 audits: Combining frameworks and/or methodologies to achieve efficiencies and effectiveness
Download2008-01-05
Scoping IT general controls (ITGC's) for the purpose of complying with legislation such as Section 404 of the Sarbanes-Oxley Act has been no simple feat. Both management and auditors alike have faced challenges in terms of scoping the work that is to be performed around ITGC's. The Public Company...
-
Securing remote access networks using malware detection tools for industrial control systems
Download2021-04-16
With their role as an integral part of its infrastructure, Industrial Control Systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have witnessed the integration of Information Systems (IS) into their processes, connecting them to the...
-
Securing remote access networks using malware detection tools for industrial control systems
Download2020
With their role as an integral part of its infrastructure, Industrial control systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have witnessed the integration of information systems (IS) into their processes, connecting them to the...