This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
Enhancing the security and privacy of self-sovereign identites on hyperledger indy blockchain
Download2020
Self-sovereign identities provide user autonomy and immutability to individual identities and full control to their identity owners. The immutability and control are possible by implementing identities in a decentralized manner on blockchains that are specially designed for identity operations...
-
Escherichia coli (ATCC 13706) is susceptible to retapamulin, an antimicrobial semisynthetic derivative of pleuromutilin
Download2021-04-16
Antimicrobial resistance (AMR) is a top 10 global threat to human health, as well as a major global health threat to animals and the environment. AMR can reduce the efficacy of antibiotic therapeutics, making treatment of bacterial infections difficult, expensive, and sometimes impossible. The...
-
Evaluation and development of artificial intelligence tools to assess COVID-19 Severe Acute Respiratory Syndrome from chest imaging
Download2021-04-16
Most attention has been paid to chest Computed Tomography (CT) in this burgeoning crisis because many cases of COVID-19 demonstrate respiratory illness clinically resembling viral pneumonia which persist prominent visual signatures on high-resolution CT befitting of viruses that damage lungs....
-
Evaluation and development of Artificial Intelligence tools to assess COVID-19 Severe Acute4 Respiratory Syndrome from chest imaging
Download2021-09-01
Chest CT is being more widely used as a diagnostic test for COVID-19 Severe Acute Respiratory Syndrome-related lung disease. Artificial intelligence (AI) has the ability to assist in the rapid assessment of CT scans for COVID-19 Severe Acute Respiratory Syndrome findings from other clinical...
-
Evaluation and development of machine learning based algorithms for predicting Distributed Denial of Service (DDoS) attack
Download2021-04-16
The IT space is growing in all aspects ranging from bandwidth, storage, processing speed, machine learning and data analysis. This growth has consequently led to more cyber threat and attacks which now requires innovative and predictive security approach that uses cutting-edge technologies in...
-
2021-06-01
Patel, Himanshu, Kapoor, Vaishali, Harmanjot, Patel, Deep, Narasimhan, Karthik, Singh,Harmanpreet, Ahluwalia, Jaspreet, Reddy, Gadi Harshitha, Peruboina, Sai Sushma
Malware is rapidly spreading on mobile platforms, causing problems for users. Worldwide, 72.72% of users are using android-based smartphones. New malware is created rapidly: obfuscation techniques can evade the signaturebased mechanism implemented in current antimalware technology. This paper...
-
2008-01-01
Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) and SysTrust are two information security methodologies used to audit and review information security practices. OCTAVE is a comprehensive methodology to assess and analyze information security risks based on IT asset type....
-
2020
Risks related to web security are too important to be ignored. The Open Web Application Security Project (OWASP) document maintains a rating of the top 10 common threats. Although not an official standard, is widely acknowledged in the classification of vulnerabilities. This paper evaluates the...