Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
2014-01-01
This research paper focuses on the impact of intentional and unintentional exposure or leakage of sensitive personal data elements that- when aggregated and used or disclosed in an unauthorized manner- could impact the employees of an organization. Doxing usually escalates to hacking, espionage...
-
A study on WHOIS privacy or proxy abuse on domains associated with harmful internet communications
Download2011-01-01
A concern was raised that some domains associated with harmful internet communication may use the means of Privacy/Proxy registration to obscure their identity, making it more difficult to investigate and possibly shut down. Our goal is to investigate the degree/scope of this abuse. To conduct...
-
A survey of payment token vulnerabilities towards stronger security with fingerprint based encryption on Samsung Pay
Download2018
The use of payment tokens, based on EMV® specifications and the Payment Card Industry token standard, both propels the spread of mobile payment technologies and improves the security of Mobile Payments including protection of the original payment information and primary account numbers. However,...
-
A unified view of epidemiological modelling and artificial intelligence-based approach to understanding the COVID-19 disease spread for supporting public policy decisions
Download2022
The Covid-19 epidemic has emerged as one of the most concerning global public health catastrophes of the twenty-first century, highlighting the critical need for robust forecasting approaches for disease identification, alleviation, and prevention, among other things. Forecasting is one of the...
-
2021-04-01
Single Packet Authorization (SPA) is the technique used to guard camouflaged network services against unauthorized users. SPA hides specific ports from the external world to reduce attacks at TLS ports until a cryptographically protected packet is received and authorized by the transport layer....
-
2013-03-01
This paper will provide a brief but comprehensive account of how the two missions worked in competition with one another to Christianize the people of the Canadian Northwest in the nineteenth century. Separate narrative accounts of the missions, including brief biographical sketches of some of...
-
An acute 72hr growth inhibition test using ampicillin on a mixed population of microalgae (Pseudokirchneriella subcapitata., Chlorella spp., Scenedesmus spp.)
Download04/15/2016
Increased use of pharmaceuticals such as antibiotics has lead to the presence of biologically active antibiotics (i.e ampicillin) in surface waters, causing awareness of possible human and environmental health concerns. These non-target effects could cause effects on aquatic ecosystems and...
-
An analysis of the effectiveness of black-box web application scanners in detection of stored XSSI vulnerabilities
Download2012-01-01
Stored Cross-Site Scripting (XSS) vulnerabilities are difficult to detect and state-of-the-art black-box scanners have low detection rates. Both Bau et al. and Doupé et al. investigated black- box web application security scanners, and this paper extends their analyses of state-of-the-art...
-
An evaluation of a government organization's information systems access control process: Issues and proposed solutions based on Role-Based Access Control Methodology
Download2009-01-05
This research paper reviews and evaluates a bona fide government organization's information systems security access control and audit process. From this review, the research paper will identify three major areas of concern with the existing access control process. The first is Systems...