This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
2014-01-01
VoIP technology is rapidly gaining adoption because of its advantage in providing voice services on IP networks. Therefore, it also gains attention of hackers and crackers. In this work, a security issue namely eavesdropping and phrase spotting is handled using a new technique. The proposed...
-
2020
Containers technology has radically changed the ways for packaging applications and deploying them as services in a cloud environment. According to the recent report of TrendMicro security predictions of 2020, the vulnerabilities in container components that are deployed with cloud architecture...
-
2021-06-01
Kairoju, Supraja, Sultana, Rouheen, Danidharia, Priyanka
The necessity to store extensive volumes of data as the information produced increases exponentially. An increasing number of businesses have embraced different types of non-relational databases in recent years, generally referred to as NoSQL databases. Security auditing procedures for these new...
-
2018
Software Defined Networking (SDN) a novel approach to networking has introduced both innovative opportunities and disadvantages in the networking field. The opportunities brought by this technology varies from the facility in configuring and managing a vast and dynamic network while using less...
-
2013-01-01
This paper provides insight into the security of the existing mobile payment system by studying its system architecture and the security architecture. It also reviews the security vulnerabilities in some components of the architecture and studies how these vulnerabilities might be exploited. This...
-
2020
There has been notable proliferation of network-enabled devices. The myriad of security threats and highly publicized data breaches demonstrate the importance of protecting access to the evolving enterprise network. The introduction of Software Defined Network (SDN) has brought about remarkable...
-
2022
This research analyzed selected contact tracing applications to identify potential vulnerabilities and geolocation of services used by these applications. MobSF framework and Android emulators were used to perform static and dynamic analysis of the applications. Security policies of applications...
-
Semi-supervised learning for understanding the effects of COVID-19 on mental health from Twitter data
Download2021-04-16
More contagious virus variants plunge parts of Canada into the third wave of the pandemic which likely contributes to rising mental health difficulties. It is speculated that the fourth wave of the pandemic is going to be a mental health wave which will be sustained for a very long time. Now it...
-
2021-09-01
Coronavirus pandemic has caused major changes in peoples’ personal and social lives. The psychological effects have been substantial because it has affected the ways people live, work, and even socialize. It has also become major discussions on social media platforms as people showcase their...