Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
Comparative analysis of operational malware Dynamic Link Library (DLL) injection live response vs. memory image
Download07/29/2012
One advanced tactic used to deliver a malware payload to a target operating system is Dynamic Link Library (DLL) injection, which has the capabilities to bypass many security settings. In cases of compromise involving DLL injection, volatile memory contains critical evidence, as these attacks...
-
Comparing the anti-microbial effect of penicillin to that of chlorine dioxide on three opportunistic pathogens
Download2013-12-04
Introduction: The discovery of penicillin is a watershed in the history of medicine. Today, antibiotics are a part of everyday life. However, some speculate that society may return to the pre-antibiotic era if the increasing emergence and spread of antibiotic resistant bacteria cannot be slowed....
-
2021-04-16
Call Centers or Support Centers in different companies aggregate huge amount of audio data everyday. From all the conversations, few conversations demonstrate the disappointment of clients towards services, products or delivery. Finding the sentiment of the customer helps in determining whether...
-
2020
In recent times, ensuring data and user privacy has been one of the biggest impediments in information technology. With the advent of high penalties for privacy breaches and the high risk of reputation loss for a corporation, the need to comply with privacy regulations have never been greater....
-
2020
Database as a Service (DBaaS) is one of the key cloud computing services that is well-known as a type of Application-as-a-Service which gives users access to a database without downloading and installing software or performance configuration but maintains the customers database. DBaaS assumes the...
-
2022
Active contour is one of successful image segmentation techniques, which has been implemented in a wide range of medical imaging problems. Active contour minimizes an energy functional in an unsupervised manner, which offers the required force to converge the user defined initial contour at the...
-
Deep learning based models for software effort estimation using story points in agile environments
Download2021-09-01
In the era of agile software development methodologies, traditional planning and software effort estimation methods are replaced to meet customer’s satisfaction in agile environments. However, software effort estimation remains a challenge. Although teams have achieved better accuracy in...
-
Deep packet inspection in industrial automation control system to mitigate attacks exploiting Mosbus/TCP vulnerabilities
Download2020
Modbus TCP/IP protocol is a commonly used protocol in industrial automation control systems, systems responsible for sensitive operations such as gas turbine operation and refinery control. The protocol was designed decades ago with no security features in mind. Denial of service attack and...
-
2020
Mobile antivirus technologies incorporate static analysis which involves the analysis of programs without its execution. This technique relies on pattern matching against a signature repository to identify malware, which can be easily tricked by transformation techniques such as obfuscation....
-
Determining the viability of salvaged organic peat soil using peat-mineral mixes and surrogate growth species Poa protensis and Lolium multiform
Download2015-12-04
Peat-mineral mixes (PMM) have been shown and recommended as a suitable reclamation material when upland boreal forest soil (LFH) is not available or cost-prohibitive. During the construction of some wellsites an engineered pad is constructed above the original peat soils. During the reclamation...