Quick links

Research

Convocation Years: 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007


2017 Convocation

Gurjot Balraj
Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud

Ruchi Mishra
Behavioural Study of Malwares Impacting Financial Institutions

Jagvinder Singh
Enhanced Security of Fingerprint Using System-on-Card Biometric Technology Using Multiple Hardened Templates and Random Challenges

Harshkumar Patel
Smart Rack Temperature Management System with Advanced Scanning Mechanism for Hot Spot Detection P

Gurvinder Singh
Prevention of thermal print scanning on retail payment terminals

Shawn Thompson
National Cybersecurity Strategy

Amaka Uchendu
An Improvement On Group Based Authentication In Machine-Type Communication Over 4G LTE-Advanced


2016 Convocation

Anu Sudevan:
A Compendium of CAATT-based Audit Tests for the Detection of a Fraudulent Disbursement

Chukwunenye Lois Odilinye:
Audit Plan for Patch Management of Enterprise Applications

Julia Onchieku:
Development of an Audit Plan for CRM Systems based on COBIT 5 Framework

Muhammad Ali Sujjad:
A Compendium of CAATT-based Audit Tests for Detection of Financial Statement Fraud

Temitayo Kosemani:
The Use of Predictive Analytics Technology to Detect Credit Card Fraud in Canada

Rajbhooshan Bhakte:
Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework

Blandine Nzouonta:
Application of COBIT 5 Implementation of NIST Framework for Critical Infrastructure Cybersecurity in the Banking Industry

Kamlapati Choubey:
A Method for Detection of Packed Executable using Entropy Difference

Jagjot Kaur:
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks Cut

Gaurav Sharma:
Implementation Guide to Disaster Recovery for Mid-Size Businesses using ITIL® Framework

Chit Nyi Nyi Hlyne
SCAP benchmark for Cisco router security configuration compliance

Rameez Ali:
Analysis of Performance of State-of-the-Art Web Application Firewalls

Nickkisha Farrell:
Verification of the Memory Image Acquisition Process

Manbrinder Ghumman:
Assessment of Effectiveness of Black-Box Vulnerability Scanners in Detection of SQL Injection in Web Services Environment.

Parul Khanna:
Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect Against Doxing Attacks.

Monika:
Experimental Analysis of Ransomware on Windows and Android Platforms

Amarachi Nwaeze:
Compliance Evaluation of Information Privacy Protection in Anglophone West Africa using ISO/IEC 29100:2011

Jude Okoro:
Application of Dual V-Model Methodology for Highly Reliable and Guaranteed Quality Information Security Management Systems

Ekene Okoye:
Enhanced User Security and Privacy Protection in 4G LTE Network

Sachdeva Deepanshu:
Comparative Analysis of Recommendations of ISO/IEC 31000:2009 and ISO/IEC 27005:2011 for ISO/IEC 27001:2013-based Information Security Management System

Devanshu Trivedi:
Enhancing Relational Database Security by Metadata Segregation

Veerareddy Vaka:
Enhancing of biometric authentication with pass strings and cryptographic checksums

Christine Wagoner:
Study of Public Perception of Risks to De-identified Information

Gabriel Biedima Peterside
Automated Security Configuration Checklist for a Cisco IPsec VPN Router using SCAP 1.2

Shireesha Katam
Applicability of Domain Based Security Risk Modelling to SCADA Systems

Vimal Kumar SathiyaBalan:
Study of Applicability of Chinese Remainder Theorem based Group Key Management for Cloud Environment

Muhammad Parvez:
Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities

Rohit Beniwal:
Study of Compliance of Apple’s Location Based APIs with Recommendations of the IETF Geopriv

Subhash C. Satyal
A Study on the Use and Applicability of Social Network Analysis (SNA) Tools and Technologies to Detect Fraudulent Automobile Insurance Claims

Zain Abbas
A Proposed Data Breach Prevention Framework Based on a Lifecycle and Layered Defense Approach

Oluwaseun Opeyemi Akeju
Main factors and good practices for managing BYOD and IoT risks in a K-12 environment.

Tutu Oyebanjo-Odofin
Using COBIT 5 to recommend mitigation strategies to Smart device companies (SDMCs) while sharing data/information in outsourcing process in Supply Chain Management

Muhammad Aleem
Analysis of Security Weaknesses in Optical Burst Switching

Sai Krishna Yellanki
Compliance of Wi-Fi Positioning System APIs with RFC 6280

Navneet Sing
A Training Program to Address Insider Threats within Banks or Financial Institutions

Kushbhai Jayeshkumar Soneji
Password Pattern Recognition in Honeyword Systems

Bhoomika Sheladiya
Enhancement of watchdog mechanism to overcome weaknesses caused by insertion attacks

Saket Pansare
Study of Compliance of the Android System API with IETF Common Policy RFC 4745

Adeyemi Aladeokin
Analysis and Compliance Evaluation of Cookies-Setting Websites with Privacy Protection Laws

Aramide Ishola
Identification of Over-declaration of Dangerous Permissions in Android mHealth Applications

Nnaji Cinderella
A Risk Model and Checklist for Outsourcing Cloud Big data Storage and Analytics

Jasjit Singh Sidhu
Study of potential attacks on rubber PIN pads based on mobile thermal imaging

Igbape Ikhade Maro
Modelling and Simulation of Node Capture Attack in Wireless Sensor Networks for Railway Monitoring and Control Systems

Fetuga Michael Adedoyin
Recommended Areas of Improvement in the Cloud Security Alliance Cloud Control Matrix v3.0.1 for Improved Security and Privacy of PII in Cloud

Shadi Abunada
Securing Virtualized Internetworks Using FreeBSD Jails

Shivani Modi
Cobit 5 Risk Scenarios Study With Fault Tree Analysis

Temitope Runsewe
Tailoring of NIST SP 800-53 Rev 4 Privacy Controls to Satisfy the 1974 Privacy Act in Cloud Services

Naga Venkata Vijay Vallabhaneni
SCAP Automated Secure Configuration Checklist for VMware VCenter Server

Samuel Alonge
Varying Privacy Risk Impact and Consequences: The Case of M-Pesa Business and Customers


2015 Convocation

Master of Information Systems Security

Ajijola, Akinola
Comparative Evaluation of Forensics Guidelines of NIST SP 800-101 Rev.1:2014 and ISO/IEC 27037:2012, World Congress on Internet Security (WorldCIS 2014), London, U.K. Dec. 2014.

Alade, David 
Privacy Protection in Nigerian E-Government Systems. In review.

Mostafa, Mohammed 
An Analytic Comparison between The Effectiveness of Anti-rootkits and Antivirus Tools in Removing Rootkits from Windows 7 Environments.10th Annual ADFSL Conference on Digital Forensics, Security and Law

Nnadi, Moses
A Comparative Analysis of High Assurance Cybersecurity Plan Templates for Nuclear Facilities

Podiyan, Pradeep
Study of compliance of Android location APIs with Geopriv. Accepted for 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks

Pryde, Nubea Sema
A critical review of attack scenarios in the IAEA Technical Guidance NSS No.17 World Congress on Internet Security (WorldCIS 2014), London, U.K., Dec. 2014.

Nithin Reddy
A Security Perspective in Comparative Study Of Platform-Based And Platform-Less BYOD Systems

Master of Information Systems Assurance

Tebug, Techoro 
Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit.Mobile and Secure Services (MOBISECSERV), 2015 First Conference on , vol., no., pp.1,6, 20-21 Feb. 2015 doi: 10.1109/MOBISECSERV.2015.7072875


Master of Information Systems Security Research 2014 Convocation

Adedayo, Love
E-Government Web Services and Security of Personally Identifiable Information in Developing Nations a Case of Some Nigerian Embassies, International Conference for Internet Technology and Secured Transactions, Pg. 623-629 Link

Privacy, Security and Trust Issues Arising from Outsourcing PII Data Collection in Developing Nations, International Journal Multimedia and Image Processing (IJMIP), Volume 4, Issues 1/2/3/4, March/June/September/December 2014.

Alghamdi, Mazen Magbool
A Risk Assessment Study Of Children Privacy Of The Mobile Apps

Anayit, Mumtaz
Forensics as a Service Interface in Cloud Computing

Bashir, Hamid
Securing VoIP Transmission Against Eavesdropping Attack 

Boparai, Anujot Ambala
The Behavioural Study of Low Interaction Honeypots: Dshield and Glastopf In Various Web Attacks

Ekechukwu, Chikaodili
“A Notary Extension for the Online Certificate Status Protocol’, proceedings of the 2013 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2013) Conference

Ghebreslassie, Fitsum Kidane
A  Comparative  Case  Study  on  Cloud  Service  Providers,  Their  Service  Level Agreements,  and  Loss  of  Availability  Due  to  Security  Breach:  Amazon  EC2  and  S3, and Microsoft Windows Azure Compute and Storage

Ghuman, Jashandeep Kaur
Analysis of Effectiveness of CORE Watchdog Mechanism in Mobile Ad Hoc Networks

Gilady, Erez
Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems

Hanaysha, Tareq
Using open source tools to investigate malware in the  Android Operating System

Moradmand Badie, Azin
Responding to intrusions in mobile ad hoc networks

Nagy, Tamer
Analytic Comparison between Live Memory Analysis and Memory Image Analysis in Android Environment. 2015 International Conference on Computer Information Systems (ICCIS 2015) [in press]

Najjar, Karim Moufid
Mid-size Canadian Businesses Investment in BCM

Nyaketcho, Doreen
STK Implementation In SMS Banking In M-Pesa – Kenya, Exploits And Feasible Solutions

Odilinye, Chukwudinma Sarah
Evaluation Criteria for Selecting a BYOD Platform

Ordor, Ngowari
Guidelines for Achieving Balance between Corporate Dataveillance and Employee Privacy Concerns (under review for a chapter of a book)

Pan, Jun
Suggestion of Security Audit Framework for Virtual Desktop Infrastructure

Shi, Lu 
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems 

Simon Mathews, Roney
A Study of Doxing, its Security Implications and Mitigation Strategies for Organizations

Zhang, Ting
Full function Firewalls on MANETs: A routing storage and query mechanism for ROFL

Full Function Firewalls and Fast Routing Query on MANETs’, Journal of Internet Technology and Secured Transactions (JITST), Volume 3, Issues 1/2

Master of Information Systems Assurance Research 2014 Convocation

Illoh, Onyeka Uchemdi
Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates, LNCS

Wankah, Colin Neba
Leveraging COBIT 5 in Selecting Governance, Risk Management and Compliance Tools


Master of Information Systems Security Research 2013 Convocation

Al-Shaheri, Sami
A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against SSSDT Hooking Rootkits

Kyei, Kwaku
A Review and Comparative Study of Digital Forensic Investigation Models 

Olajide, Peter
PCI DSS Compliance Validation of Different Levels of Merchants in a Multi-tenant Private Cloud

Olanrewaju, Temitope
Security Modeling Of Mobile Payment System Architecture

Patil, Pallavi
Fault Tree Analysis of Accidental Insider Security Events Conference

Umair Saeed
Two techniques for detecting packed portable executable files Conference

Anwar, Waqar
Redesigning secure element access control for NFC enabled android smartphones using mobile trusted computing Conference

An Alternate Secure Element Access Control for NFC Enabled Android Smartphones.  International Journal for Information Security Research (IJISR), Volume 3
Issues 1/2 

Master of Information Systems Security Research 2012 Convocation

Alasiri, Ahmed
Comparative Analysis of Operational Malware Dynamic Link Library (DLL) Injection Live Response vs. Memory Image Conference

Alassmi, Shafi
An Analysis of the Effectiveness of Black-Box Web Application Scanners in Detection of Stored XSSI Vulnerabilities Conference

Almari, Fares
Performance Analysis of Oracle Database in Virtual Environments Conference

Alzaidi, Muteb
The Study of SSDT Hook through Comparative Analysis between Live Response and Memory Image MAlzaidi.

Anisheh, Mehdi
SCADA Full State Network Intrusion and Malfunction Detection System

Baig, Mirza
The study of evasion of packed PE from static detection Conference

Bogari, Eyad
An analysis of security weaknesses in the evolution of RFID enabled passport Conference

Ekemezie, Emmanuel
Study of Network Instability in VRRP and HSRP sub second timer implementation

Fernando, Desmond
Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phase as needed Conference

Gill, Asif
A Proposed Framework for the Allocation of Security Budgets in Process-based Information Security Management

Nnoli, Henry
The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches Conference

Nwafor, Cyril
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management Conference

Ogundele, Oludele
The implementation of a full EMV smartcard for a point-of-sale transaction Conference  Fraud Reduction on EMV Payment Cards by the Implementation of Stringent Security Features Conference  The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and its Impact on the PCI DSS Conference

Onabajo, Prince David
The study of civil litigation in data storage environment Conference

Patel , Ajaybhai  (Ajay)
Baseline Security Controls for HIA-Compliant EMR Systems Using a Tailored NIST RMF Approach

Sogbesan, Ade
Collusion threat profile analysis: Review and analysis of MERIT model Conference

Syed, Kashif Ahmad
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process Conference

Master of Information Systems Security Research 2011 Convocation

Aljaedi, Amer
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging  Conference

Ali, Assad
Analysis of the Effects of Temporal and Environmental Metrics on Overall CVSS v2 Score  Conference

Buhr, Andrew
Media Access Control Address Spoofing Attacks against Port Security (WOOT, 2011 – usenix.org)  Conference

Chang, Yung Yu
Trend Analysis of the CVE for Software Vulnerability Management  Conference

Chen, Boyan
A Study of the Effectiveness of CSRF Guard  Conference

Dela Rosa, Leopoldo
Baseline Security Controls for HIA-Compliant EMR Systems Using a Tailored NIST RMF Approach

Edwards, David
eGovernment System Security Model (eGSSM): A Multidimensional, Risk Based Approach to eGovernment  Conference

Ejeana, Nonso
A Study on WHOIS Privacy or Proxy Abuse on Domains associated with Harmful Internet Communications

Gahiza, Deo
A Comparison of Australia and the U.S,. Electrical Infrastructure Cyber SecurityStrategies

Gilbert, Vincent
Measuring performance of two Application Servers for Java developed Web Services under heavy loads

Ibidapo, Ayodele
An Analysis of CVSS v2 Environmental Scoring  Conference

Ibidokun, Emmanuel
Performance and Scalability Evaluation of Oracle VM Server Virtualization Software in 64 bit Linux Environment  Conference

Johnston, Brian
Investigating the Knowledge, Attitudes and Habits of Academic Users Regarding Computer Usage Policy

Khoury, Nidal
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection  Conference Testing and Assessing Web Vulnerability Scanners for Persistent SQL Injection Attacks Conference

Kohli, Harpreet
An Enhanced Threat Identification Approach for Collusion Threats  Conference

Kyte, Iain
Detection of Hardware Virtualization Based Rootkits by Performance Benchmarking  Conference

Enhanced side-channel analysis method to detect hardware virtualization based rootkits Conference

MacDormand, Scott
Biometrics Privacy Impact Assessment Checklist for Public Educational Institutions in Alberta

Nip, Allen
A Comprehensive Framework for a Risk and Role Based Enterprise Security Awareness, Training and Education Program for ISO/IEC 27002 Compliance

Patel, Ajay
Baseline Security Controls for HIA-Compliant EMR Systems Using a Tailored NIST RMF Approach

Yearwood, Lisa
A Conceptual Framework for the Prevention and Detection of Occupational Fraud in Small Businesses

Yong, Siew Siao (Sue)
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles  Conference

Master of Information Systems Security Research 2010 Convocation

Adewusi, Emmanuel
Speech Quality Evaluation of P2P VOIP Applications over IPSEC VPN: Ekiga vs. Sjphone  Link

Ake-Johnson, Oluwatoyin Gloria
Comparative Analysis of ccTLD Security Policies Conference. A Game Theoretical Multi-layered Defense Approach Against Phishing Attacks (Link Unavailable)

Ezeude, Kingsley
The Modelling Of An Identity Catching Attack On The Universal Mobile Telecommunication System (UMTS) Using Attack Tree Methodology

Kalu, Etum
Developing a Trust Model for Anti-phishing Web-based Services – Customer Perspective

Murray, Brian
Reverse Discovery of Packet Flooding Hosts with Defense Mechanisms

Ngeno, Caroline
The User Experience: How Should Social Networking Sites Look in 10-15 Years?  Conference

Ogundare, Omotayo
An analysis of high availability solutions within the VMWare Infrastructure Architecture  Conference

Perez, Luis
An Internet ccTLD Security Governance Framework

Sackey, Ebenezer Panyin
A Framework for Home Wireless Network Security Education  Conference

Sherman, C. Mooney
IP Videoconferencing – Issues of Privacy Awareness, Challenges, and Compliance

Umana, Collins
Comparative Analysis of ccTLD Security Policies  Conference

Master of Information Systems Security Research 2009 Convocation

Ayonote, Clement
Analysis of the GMPLS Control Plane Security  Conference

Gilbert, Vincent
Measuring performance of two Application Servers for Java developed Web Services under heavy loads

Huang, Zhitao
Aligning COBIT 4.1, ITIL and ISO/IEC 27002 for Bill 198 (Canada Sarbanes-Oxley) compliance  Conference

Hyacintho, Michael
Internet Security Governance: Comparative Analysis of Country Code Top Level Domain (ccTLD) Administration

Lin, Xiaoli
Threat Modeling for CSRF Attacks  Conference

Ma, Billy
An Evaluation of a Government Organization Information Systems Access Control Process

Oladapo, Samuel
Managing Risk of IT Security Outsourcing in the Decision-Making Stage  Conference

Pasula, John
Elements of a New Comprehensive Risk Methodology

Perhar, Trish
Scoping ITGC’s for SOx 404 Audits – Combining frameworks and/or methodologies to achieve efficiencies and effectiveness

Rhodes, Donald
The Detection of Operational Malware by its Tactics of Obfuscation

Sachedina, Nisha
Systematic method of achieving Sarbanes-Oxley (SOX) compliance by harmonizing Cobit, ITIL and ISO 27002/17799

Saran, Mandeep
A Study of the Methods for Improving Internet Usage Policy Compliance  Conference

Siddiqi, Abid
Study of BGP Security Issues and Technique for AS Route Validation

Verma, Vivek
Assessments of Security and Privacy Risks of Google Health Portal

Master of Information Systems Security Research 2008 Convocation

Dari, Bashar
Expanding OCTAVE to facilitate SysTrust

DesForges, Benoit
Low Assurance Protection Profile for Network Access Control

Diop, Mame
Information Security Management in France: Perceptions and Influence of Culture

Fiogbe, Jose
Modeling Information Security Governance in the ECOWAS Zone: The Maturity Model Revisited

Gichohi, Francis
Information Security Implication of E-learning Implementation in Kenya

Iddrisu, Fuad
Information Security Awareness Issues and Proposed Solutions

Janot, Etienne
SQLDOM4J: Preventing SQL Injections in Object-Oriented Applications – a Java solution based on the SQL DOM  Conference

Nji, Lionel
Statistical Analysis of Software Design Error Vulnerability Data

Viegas, Edwina
Privacy Classification of Health Information in Alberta – Issues, Proposed Solution and Benefits

Master of Information Systems Security Research 2007 Convocation

CHOL, Emmanuel
Study of the Enterprise Security Manager / Security Incident Manager (ESM / SIM) Commercial and Open Source Solutions

LINDSKOG, Dale
A Novel Strategy for Internetwork Segmentation and Zoning

MAMOS, Jakub
SCADA Information Security Management Guide