Convocation Years: 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007
2018 Convocation
Peer‐reviewed research publications in the academic year 2017 ‐ 2018 coauthored by students of the MISAM and MISSM graduate programs
In the academic year 2017‐2018, students of the Master of Information Systems Assurance Management (MISAM) and Master of Information Systems Security Management (MISSM) at Concordia University of Edmonton published in journals and at international conferences, workshops and symposia, together with their research supervisors, the following 35 research papers. In the list, names of students are underlined.
- Oluwaseun Akeju, Sergey Butakov, Shaun Aghili, “Main factors and good practices for managing BYOD and IoT risks in a K‐12 environment“, Int. Journal of Internet of Things and Cyber‐Assurance, Vol.1, No.1, pp. 22‐39, 2018
- Amavey Tamunobarafiri, Shaun Aghili, Sergey Butakov, “Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers”, Int. Journal of Monitoring and Surveillance Technologies Research (IJMSTR), 5(4), 1‐22, 2017
- Manmeet Singh Gill, Dale Lindskog, Pavol Zavarsky, “Profiling Network Traffic Behavior for the purpose of Anomaly‐based Intrusion Detection“, 17th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom 18) New York, USA, Aug. 1‐3, 2018
- Hajredin Daku, Pavol Zavarsky, Yasir Malik, “Behavioral‐based Classification and Identification of Ransomware Variants Using Machine Learning“, 17th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom 18) New York, USA, Aug. 1 ‐ 3, 2018
- Jasleen Kaur Oberoi, Hamman Samuel, Pavol Zavarsky, “How Much Web Security is Just Enough? Analysis of Granulated Web Application Firewall Rules on Web Server Performance“, 17th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom 18), New York, USA, August 1 ‐ 3, 2018
- Ashish Kalra, Pavol Zavarsky, Neelam Memon, “Requirements on Access Management Systems for Compliance with Personal Health Information Protection Laws in Canada“, 12th IFIP Int. Conf. on Trust Management (IFIPTM 2018), Toronto, ON, July 9 ‐ 13, 2018
- Pooja Rajendra Prasad, Sergey Butakov, Fehmi Jaafar, “Information Security Considerations for Wireless Infusion Pumps“, IEEE Int. Conf. on Software Quality, Reliability, and Security, Lisbon, Portugal, July 2018
- Gagandeep Singh, Fehmi Jaafar, Pavol Zavarsky, “An Analysis of Android Malware Behavior“, 18th IEEE Int. Conf. on Software Security and Reliability, Lisbon, Portugal, July 16‐18, 2018
- Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik, “Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms?“, IEEE Int. Conf. on Software Quality, Reliability, and Security, Lisbon, Portugal, July 2018
- Adegboyega Ogundokun, Pavol Zavarsky, Booby Swar, “Cybersecurity Assurance Control Baselining for Smart Grid Communication Systems“, 14th IEEE Int. Workshop on Factory Communication Systems (WFCS 2018), Imperia, Italy, 13 ‐ 15 June, 2018
- Davison Zvabva, Pavol Zavarsky, Sergey Butakov, John Luswata, “Evaluation of Industrial Firewall Performance Issues in Automation and Control Networks”, 29th IEEE Biennial Symposium on Communications (BSC 2018), Ryerson University, Toronto, Canada, June 6‐9, 2018
- John Luswata, Pavol Zavarsky, Bobby Swar, Davison Zvabva, “Analysis of SCADA Security using Penetration Testing: A case study on Modbus TCP Protocol“, 29th IEEE Biennial Symposium on Communications (BSC 2018), Ryerson University, Toronto, Canada, June 6‐9, 2018
- Mohammad Mirheydari, Pavol Zavarsky, Sergey Butakov, “Single Packet Authorization in a Multi‐layered Security Architecture”, 29th IEEE Biennial Symposium on Communications (BSC 2018), Ryerson University, Toronto, Canada, June 6‐9, 2018
- Jasmeen Kaur, Fehmi Jaafar, Pavol Zavarsky, “Experimental Analysis of Behavior of Crypto Ransomware”, 13th IEEE Int. Conf. on Systems (ICONS 2018), Athens, Greece, Apr. 22‐26, 2018
- Damilola Murtala, Yasir Malik, Pavol Zavarsky, “Link Aggregation in Private Virtual LAN using OpenFlow for Cloud Environment”, Communications and Networking Symposium 2018 (CNS 2018), Baltimore, Maryland, Apr. 15‐18, 2018
- Gurjot Singh, Sergey Butakov, Fehmi Jaafar, “Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud”, 5th Int. Conf. on Control, Decision and Information Technologies (CoDIT’18), Thessaloniki, Greece, April 10‐13, 2018
- Shivani Modi, Sergey Butakov, Pavol Zavarsky, “Using Fault Tree Analysis with Cobit 5 Scenarios”, 5th Int. Conf. on Control, Decision and Information Technologies (CoDIT’18), Thessaloniki, Greece, April 10‐13, 2018
- Hasan Turaev, Pavol Zavarsky, Bobby Swar, “Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions”, IEEE Int. Conf. on Data Intelligence and Security (ICDIS‐2018), South Padre Island, TX, USA, Apr. 8‐10, 2018
- Jatesh Singh, Hamman Samuel, Pavol Zavarsky, “Study of the Impact of Paranoia Levels on Effectiveness of ModSecurity Web Application Firewall Configured with CRS 3.0”, 1st Int. Conf. on Data Intelligence and Security, South Padre Island, TX, United States, April 8‐10, 2018
- Mayank Jaiswal, Yasir Malik, Fehmi Jaafar, “Android Gaming Malware Detection Using System Call Behaviour Analysis“, IEEE Int. Sym. on Digital Forensic and Security (ISDFS), Antalya, Turkey, March 2018
- Oluwadamilola Ogunyebi, Bobby Swar, Shaun Aghili, “An Incident Handling Guide for Small Organizations in the Hospitality Sector“, In: Rocha Á., Adeli H., Reis L.P., Costanzo S. (eds) Trends and Advances in Information Systems and Technologies. WorldCIST’18, Naples, Italy, March 27‐29, 2018
- Tolulope Mabo, Bobby Swar, Shaun Aghili, “A Vulnerability Study of Mhealth Chronic Disease Management Applications“, In: Rocha Á., Adeli H., Reis L.P., Costanzo S. (eds) Trends and Advances in Information Systems and Technologies. WorldCIST’18, Naples, Italy, March 27‐29, 2018
- Akinbobola Adetunji, Sergey Butakov, Pavol Zavarsky, “Automated Security Configuration Checklist for Apple iOS Devices using SCAP v1.2”, Int. Conf. on Platform Technology and Service (PlatCon‐2018), Jeju, Korea, Jan. 29‐31, 2018
- Manjinder Singh, Sergey Butakov, Fehmi Jaafar, “Analyzing Overhead from Security and Administrative Functions in Virtual Environment”, Int. Conf. on Platform Technology and Service (PlatCon‐2018), Jeju, Korea, Jan. 29‐31, 2018
- Braham Tasha‐Gaye, Sergey Butakov, Ron Ruhl, “Reference Security Architecture for Body Area Networks in Healthcare Applications”, Int. Conf. on Platform Technology and Service (PlatCon‐2018), Jeju, Korea, Jan. 29‐31, 2018
- Manpreet Kaur, Dale Lindskog, Pavol Zavarsky, “Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture”, In: Zhou Y., Kunz T. (eds) Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 223. Springer, Cham, ISBN 978‐3‐319‐74438‐4, Jan. 2018
- Dilpreet Singh, Ron Ruhl, Hamman Samuel, “Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals“, 4th Int. Conf. on Information Systems Security and Privacy, Funchal, Portugal, Jan. 22‐24, 2018
- Abin Joy, Ron Ruhl, Hamman Samuel, “Denial of Service (DoS) on 4G LTE M2M Networks Using Attack Tree Methodology“, Int. Conf. on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), Chettiyappanur, India, Jan. 28‐29, 2018
- Harjot Kaur, Pavol Zavarsky, Fehmi Jaafar, “Unauthorised Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability”, IEEE World Congress on Internet Security (WorldCIS) 2017, University of Cambridge, Dec. 11‐14, 2017
- Lois Odilinye, Sergey Butakov, Shaun Aghili, “Audit Plan for Patch Management of Enterprise Applications”, In: Kim K., Kim H., Baek N. (eds) IT Convergence and Security 2017, ICITS 2017 Dec. 2017, In: Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore, 2018
- Babu Khadiranaikar, Pavol Zavarsky, Yasir Malik, “Improving Android application security for Intent Based Attacks“, 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conf. (IEEE IEMCON 2017), University of British Columbia, Vancouver, BC, Canada, October, 3‐5, 2017
- Nithin R. Aenugu, Sergey Butakov, Pavol Zavarsky, Shaun Aghili, “A Security Perspective in Comparative Study of Platform‐Based and Platform‐Less BYOD Systems“, 7th Int. Conf. on IT Convergence and Security, Seoul, Korea, Sept. 25‐28, 2017
- Adeyemi Aladeokin, Pavol Zavarsky, Neelam Memon, “Analysis and Compliance Evaluation of Cookies‐Setting Websites with Privacy Protection Laws“, 12th IEEE Int. Conf. on Digital Information Management (ICDIM 2017), Kyushu University, Fukuoka, Japan, Sept. 12‐14, 2017
- Amarachi Chinwendu Nwaeze, Pavol Zavarsky, Ron Ruhl, “Compliance Evaluation of Information Privacy Protection in Anglophone West Africa Using ISO/IEC 29100:2011 A Case of E‐Government Systems”, 12th IEEE Int. Conf. on Digital Information Management (ICDIM 2017), Kyushu University, Fukuoka, Japan, Sept. 12‐14, 2017
- Ibrahim Rukayat Oluwakemi, Dale Lindskog, Pavol Zavarsky, “An Enhanced Watchdog Mechanism for detecting Selfish Nodes in a Mobile Ad hoc Network”, Int. Conf. on Ad Hoc Networks (AdHocNets 2017), Niagara Falls, ON, Canada, Sept. 28 ‐ 29, 2017
2017 Convocation
Gurjot Balraj
Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud
Ruchi Mishra
Behavioural Study of Malwares Impacting Financial Institutions
Jagvinder Singh
Enhanced Security of Fingerprint Using System-on-Card Biometric Technology Using Multiple Hardened Templates and Random Challenges
Harshkumar Patel
Smart Rack Temperature Management System with Advanced Scanning Mechanism for Hot Spot Detection P
Gurvinder Singh
Prevention of thermal print scanning on retail payment terminals
Shawn Thompson
National Cybersecurity Strategy
Amaka Uchendu
An Improvement On Group Based Authentication In Machine-Type Communication Over 4G LTE-Advanced
2016 Convocation
Anu Sudevan:
A Compendium of CAATT-based Audit Tests for the Detection of a Fraudulent Disbursement
Chukwunenye Lois Odilinye:
Audit Plan for Patch Management of Enterprise Applications
Julia Onchieku:
Development of an Audit Plan for CRM Systems based on COBIT 5 Framework
Muhammad Ali Sujjad:
A Compendium of CAATT-based Audit Tests for Detection of Financial Statement Fraud
Temitayo Kosemani:
The Use of Predictive Analytics Technology to Detect Credit Card Fraud in Canada
Rajbhooshan Bhakte:
Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework
Blandine Nzouonta:
Application of COBIT 5 Implementation of NIST Framework for Critical Infrastructure Cybersecurity in the Banking Industry
Kamlapati Choubey:
A Method for Detection of Packed Executable using Entropy Difference
Jagjot Kaur:
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks
Gaurav Sharma:
Implementation Guide to Disaster Recovery for Mid-Size Businesses using ITIL® Framework
Chit Nyi Nyi Hlyne
SCAP benchmark for Cisco router security configuration compliance
Rameez Ali:
Analysis of Performance of State-of-the-Art Web Application Firewalls
Nickkisha Farrell:
Verification of the Memory Image Acquisition Process
Manbrinder Ghumman:
Assessment of Effectiveness of Black-Box Vulnerability Scanners in Detection of SQL Injection in Web Services Environment.
Parul Khanna:
Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect Against Doxing Attacks.
Monika:
Experimental Analysis of Ransomware on Windows and Android Platforms
Amarachi Nwaeze:
Compliance Evaluation of Information Privacy Protection in Anglophone West Africa using ISO/IEC 29100:2011
Ekene Okoye:
Enhanced User Security and Privacy Protection in 4G LTE Network
Sachdeva Deepanshu:
Comparative Analysis of Recommendations of ISO/IEC 31000:2009 and ISO/IEC 27005:2011 for ISO/IEC 27001:2013-based Information Security Management System
Devanshu Trivedi:
Enhancing Relational Database Security by Metadata Segregation
Veerareddy Vaka:
Enhancing of biometric authentication with pass strings and cryptographic checksums
Christine Wagoner:
Study of Public Perception of Risks to De-identified Information
Gabriel Biedima Peterside
Automated Security Configuration Checklist for a Cisco IPsec VPN Router using SCAP 1.2
Shireesha Katam
Applicability of Domain Based Security Risk Modelling to SCADA Systems
Vimal Kumar SathiyaBalan:
Study of Applicability of Chinese Remainder Theorem based Group Key Management for Cloud Environment
Muhammad Parvez:
Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities
Rohit Beniwal:
Study of Compliance of Apple’s Location Based APIs with Recommendations of the IETF Geopriv
Subhash C. Satyal
A Study on the Use and Applicability of Social Network Analysis (SNA) Tools and Technologies to Detect Fraudulent Automobile Insurance Claims
Zain Abbas
A Proposed Data Breach Prevention Framework Based on a Lifecycle and Layered Defense Approach
Oluwaseun Opeyemi Akeju
Main factors and good practices for managing BYOD and IoT risks in a K-12 environment.
Tutu Oyebanjo-Odofin
Using COBIT 5 to recommend mitigation strategies to Smart device companies (SDMCs) while sharing data/information in outsourcing process in Supply Chain Management
Muhammad Aleem
Analysis of Security Weaknesses in Optical Burst Switching
Sai Krishna Yellanki
Compliance of Wi-Fi Positioning System APIs with RFC 6280
Navneet Sing
A Training Program to Address Insider Threats within Banks or Financial Institutions
Kushbhai Jayeshkumar Soneji
Password Pattern Recognition in Honeyword Systems
Bhoomika Sheladiya
Enhancement of watchdog mechanism to overcome weaknesses caused by insertion attacks
Saket Pansare
Study of Compliance of the Android System API with IETF Common Policy RFC 4745
Adeyemi Aladeokin
Analysis and Compliance Evaluation of Cookies-Setting Websites with Privacy Protection Laws
Aramide Ishola
Identification of Over-declaration of Dangerous Permissions in Android mHealth Applications
Nnaji Cinderella
A Risk Model and Checklist for Outsourcing Cloud Big data Storage and Analytics
Jasjit Singh Sidhu
Study of potential attacks on rubber PIN pads based on mobile thermal imaging
Igbape Ikhade Maro
Modelling and Simulation of Node Capture Attack in Wireless Sensor Networks for Railway Monitoring and Control Systems
Fetuga Michael Adedoyin
Recommended Areas of Improvement in the Cloud Security Alliance Cloud Control Matrix v3.0.1 for Improved Security and Privacy of PII in Cloud
Shadi Abunada
Securing Virtualized Internetworks Using FreeBSD Jails
Shivani Modi
Cobit 5 Risk Scenarios Study With Fault Tree Analysis
Temitope Runsewe
Tailoring of NIST SP 800-53 Rev 4 Privacy Controls to Satisfy the 1974 Privacy Act in Cloud Services
Naga Venkata Vijay Vallabhaneni
SCAP Automated Secure Configuration Checklist for VMware VCenter Server
Samuel Alonge
Varying Privacy Risk Impact and Consequences: The Case of M-Pesa Business and Customers
2015 Convocation
Master of Information Systems Security
Ajijola, Akinola
Comparative Evaluation of Forensics Guidelines of NIST SP 800-101 Rev.1:2014 and ISO/IEC 27037:2012, World Congress on Internet Security (WorldCIS 2014), London, U.K. Dec. 2014.
Alade, David
Privacy Protection in Nigerian E-Government Systems. In review.
Mostafa, Mohammed
An Analytic Comparison between The Effectiveness of Anti-rootkits and Antivirus Tools in Removing Rootkits from Windows 7 Environments.10th Annual ADFSL Conference on Digital Forensics, Security and Law
Nnadi, Moses
A Comparative Analysis of High Assurance Cybersecurity Plan Templates for Nuclear Facilities
Podiyan, Pradeep
Study of compliance of Android location APIs with Geopriv. Accepted for 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Pryde, Nubea Sema
A critical review of attack scenarios in the IAEA Technical Guidance NSS No.17 World Congress on Internet Security (WorldCIS 2014), London, U.K., Dec. 2014.
Nithin Reddy
A Security Perspective in Comparative Study Of Platform-Based And Platform-Less BYOD Systems
Master of Information Systems Assurance
Tebug, Techoro
Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit.Mobile and Secure Services (MOBISECSERV), 2015 First Conference on , vol., no., pp.1,6, 20-21 Feb. 2015 doi: 10.1109/MOBISECSERV.2015.7072875
Master of Information Systems Security Research 2014 Convocation
Adedayo, Love
E-Government Web Services and Security of Personally Identifiable Information in Developing Nations a Case of Some Nigerian Embassies, International Conference for Internet Technology and Secured Transactions, Pg. 623-629 Link
Privacy, Security and Trust Issues Arising from Outsourcing PII Data Collection in Developing Nations, International Journal Multimedia and Image Processing (IJMIP), Volume 4, Issues 1/2/3/4, March/June/September/December 2014.
Alghamdi, Mazen Magbool
A Risk Assessment Study Of Children Privacy Of The Mobile Apps
Anayit, Mumtaz
Forensics as a Service Interface in Cloud Computing
Bashir, Hamid
Securing VoIP Transmission Against Eavesdropping Attack
Boparai, Anujot Ambala
The Behavioural Study of Low Interaction Honeypots: Dshield and Glastopf In Various Web Attacks
Ekechukwu, Chikaodili
“A Notary Extension for the Online Certificate Status Protocol’, proceedings of the 2013 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2013) Conference
Ghebreslassie, Fitsum Kidane
A Comparative Case Study on Cloud Service Providers, Their Service Level Agreements, and Loss of Availability Due to Security Breach: Amazon EC2 and S3, and Microsoft Windows Azure Compute and Storage
Ghuman, Jashandeep Kaur
Analysis of Effectiveness of CORE Watchdog Mechanism in Mobile Ad Hoc Networks
Gilady, Erez
Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems
Hanaysha, Tareq
Using open source tools to investigate malware in the Android Operating System
Moradmand Badie, Azin
Responding to intrusions in mobile ad hoc networks
Nagy, Tamer
Analytic Comparison between Live Memory Analysis and Memory Image Analysis in Android Environment. 2015 International Conference on Computer Information Systems (ICCIS 2015) [in press]
Najjar, Karim Moufid
Mid-size Canadian Businesses Investment in BCM
Nyaketcho, Doreen
STK Implementation In SMS Banking In M-Pesa – Kenya, Exploits And Feasible Solutions
Odilinye, Chukwudinma Sarah
Evaluation Criteria for Selecting a BYOD Platform
Ordor, Ngowari
Guidelines for Achieving Balance between Corporate Dataveillance and Employee Privacy Concerns (under review for a chapter of a book)
Pan, Jun
Suggestion of Security Audit Framework for Virtual Desktop Infrastructure
Shi, Lu
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems
Simon Mathews, Roney
A Study of Doxing, its Security Implications and Mitigation Strategies for Organizations
Zhang, Ting
Full function Firewalls on MANETs: A routing storage and query mechanism for ROFL
Full Function Firewalls and Fast Routing Query on MANETs’, Journal of Internet Technology and Secured Transactions (JITST), Volume 3, Issues 1/2
Master of Information Systems Assurance Research 2014 Convocation
Illoh, Onyeka Uchemdi
Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates, LNCS
Wankah, Colin Neba
Leveraging COBIT 5 in Selecting Governance, Risk Management and Compliance Tools
Master of Information Systems Security Research 2013 Convocation
Al-Shaheri, Sami
A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against SSSDT Hooking Rootkits
Kyei, Kwaku
A Review and Comparative Study of Digital Forensic Investigation Models
Olajide, Peter
PCI DSS Compliance Validation of Different Levels of Merchants in a Multi-tenant Private Cloud
Olanrewaju, Temitope
Security Modeling Of Mobile Payment System Architecture
Patil, Pallavi
Fault Tree Analysis of Accidental Insider Security Events Conference
Umair Saeed
Two techniques for detecting packed portable executable files Conference
Anwar, Waqar
Redesigning secure element access control for NFC enabled android smartphones using mobile trusted computing Conference
An Alternate Secure Element Access Control for NFC Enabled Android Smartphones. International Journal for Information Security Research (IJISR), Volume 3
Issues 1/2
Master of Information Systems Security Research 2012 Convocation
Alasiri, Ahmed
Comparative Analysis of Operational Malware Dynamic Link Library (DLL) Injection Live Response vs. Memory Image Conference
Alassmi, Shafi
An Analysis of the Effectiveness of Black-Box Web Application Scanners in Detection of Stored XSSI Vulnerabilities Conference
Almari, Fares
Performance Analysis of Oracle Database in Virtual Environments Conference
Alzaidi, Muteb
The Study of SSDT Hook through Comparative Analysis between Live Response and Memory Image MAlzaidi.
Anisheh, Mehdi
SCADA Full State Network Intrusion and Malfunction Detection System
Baig, Mirza
The study of evasion of packed PE from static detection Conference
Bogari, Eyad
An analysis of security weaknesses in the evolution of RFID enabled passport Conference
Ekemezie, Emmanuel
Study of Network Instability in VRRP and HSRP sub second timer implementation
Fernando, Desmond
Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phase as needed Conference
Gill, Asif
A Proposed Framework for the Allocation of Security Budgets in Process-based Information Security Management
Nnoli, Henry
The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches Conference
Nwafor, Cyril
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management Conference
Ogundele, Oludele
The implementation of a full EMV smartcard for a point-of-sale transaction Conference Fraud Reduction on EMV Payment Cards by the Implementation of Stringent Security Features Conference The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and its Impact on the PCI DSS Conference
Onabajo, Prince David
The study of civil litigation in data storage environment Conference
Patel , Ajaybhai (Ajay)
Baseline Security Controls for HIA-Compliant EMR Systems Using a Tailored NIST RMF Approach
Sogbesan, Ade
Collusion threat profile analysis: Review and analysis of MERIT model Conference
Syed, Kashif Ahmad
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process Conference
Master of Information Systems Security Research 2011 Convocation
Aljaedi, Amer
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging Conference
Ali, Assad
Analysis of the Effects of Temporal and Environmental Metrics on Overall CVSS v2 Score Conference
Buhr, Andrew
Media Access Control Address Spoofing Attacks against Port Security (WOOT, 2011 – usenix.org) Conference
Chang, Yung Yu
Trend Analysis of the CVE for Software Vulnerability Management Conference
Chen, Boyan
A Study of the Effectiveness of CSRF Guard Conference
Dela Rosa, Leopoldo
Baseline Security Controls for HIA-Compliant EMR Systems Using a Tailored NIST RMF Approach
Edwards, David
eGovernment System Security Model (eGSSM): A Multidimensional, Risk Based Approach to eGovernment Conference
Ejeana, Nonso
A Study on WHOIS Privacy or Proxy Abuse on Domains associated with Harmful Internet Communications
Gahiza, Deo
A Comparison of Australia and the U.S,. Electrical Infrastructure Cyber SecurityStrategies
Gilbert, Vincent
Measuring performance of two Application Servers for Java developed Web Services under heavy loads
Ibidapo, Ayodele
An Analysis of CVSS v2 Environmental Scoring Conference
Ibidokun, Emmanuel
Performance and Scalability Evaluation of Oracle VM Server Virtualization Software in 64 bit Linux Environment Conference
Johnston, Brian
Investigating the Knowledge, Attitudes and Habits of Academic Users Regarding Computer Usage Policy
Khoury, Nidal
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection Conference Testing and Assessing Web Vulnerability Scanners for Persistent SQL Injection Attacks Conference
Kohli, Harpreet
An Enhanced Threat Identification Approach for Collusion Threats Conference
Kyte, Iain
Detection of Hardware Virtualization Based Rootkits by Performance Benchmarking Conference
Enhanced side-channel analysis method to detect hardware virtualization based rootkits Conference
MacDormand, Scott
Biometrics Privacy Impact Assessment Checklist for Public Educational Institutions in Alberta
Patel, Ajay
Baseline Security Controls for HIA-Compliant EMR Systems Using a Tailored NIST RMF Approach
Yearwood, Lisa
A Conceptual Framework for the Prevention and Detection of Occupational Fraud in Small Businesses
Yong, Siew Siao (Sue)
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles Conference
Master of Information Systems Security Research 2010 Convocation
Adewusi, Emmanuel
Speech Quality Evaluation of P2P VOIP Applications over IPSEC VPN: Ekiga vs. Sjphone Link
Ake-Johnson, Oluwatoyin Gloria
Comparative Analysis of ccTLD Security Policies Conference. A Game Theoretical Multi-layered Defense Approach Against Phishing Attacks (Link Unavailable)
Ezeude, Kingsley
The Modelling Of An Identity Catching Attack On The Universal Mobile Telecommunication System (UMTS) Using Attack Tree Methodology
Kalu, Etum
Developing a Trust Model for Anti-phishing Web-based Services – Customer Perspective
Murray, Brian
Reverse Discovery of Packet Flooding Hosts with Defense Mechanisms
Ngeno, Caroline
The User Experience: How Should Social Networking Sites Look in 10-15 Years? Conference
Ogundare, Omotayo
An analysis of high availability solutions within the VMWare Infrastructure Architecture Conference
Perez, Luis
An Internet ccTLD Security Governance Framework
Sackey, Ebenezer Panyin
A Framework for Home Wireless Network Security Education Conference
Sherman, C. Mooney
IP Videoconferencing – Issues of Privacy Awareness, Challenges, and Compliance
Umana, Collins
Comparative Analysis of ccTLD Security Policies Conference
Master of Information Systems Security Research 2009 Convocation
Ayonote, Clement
Analysis of the GMPLS Control Plane Security Conference
Gilbert, Vincent
Measuring performance of two Application Servers for Java developed Web Services under heavy loads
Huang, Zhitao
Aligning COBIT 4.1, ITIL and ISO/IEC 27002 for Bill 198 (Canada Sarbanes-Oxley) compliance Conference
Hyacintho, Michael
Internet Security Governance: Comparative Analysis of Country Code Top Level Domain (ccTLD) Administration
Lin, Xiaoli
Threat Modeling for CSRF Attacks Conference
Ma, Billy
An Evaluation of a Government Organization Information Systems Access Control Process
Oladapo, Samuel
Managing Risk of IT Security Outsourcing in the Decision-Making Stage Conference
Pasula, John
Elements of a New Comprehensive Risk Methodology
Perhar, Trish
Scoping ITGC’s for SOx 404 Audits – Combining frameworks and/or methodologies to achieve efficiencies and effectiveness
Rhodes, Donald
The Detection of Operational Malware by its Tactics of Obfuscation
Sachedina, Nisha
Systematic method of achieving Sarbanes-Oxley (SOX) compliance by harmonizing Cobit, ITIL and ISO 27002/17799
Saran, Mandeep
A Study of the Methods for Improving Internet Usage Policy Compliance Conference
Siddiqi, Abid
Study of BGP Security Issues and Technique for AS Route Validation
Verma, Vivek
Assessments of Security and Privacy Risks of Google Health Portal
Master of Information Systems Security Research 2008 Convocation
Dari, Bashar
Expanding OCTAVE to facilitate SysTrust
DesForges, Benoit
Low Assurance Protection Profile for Network Access Control
Diop, Mame
Information Security Management in France: Perceptions and Influence of Culture
Fiogbe, Jose
Modeling Information Security Governance in the ECOWAS Zone: The Maturity Model Revisited
Gichohi, Francis
Information Security Implication of E-learning Implementation in Kenya
Iddrisu, Fuad
Information Security Awareness Issues and Proposed Solutions
Janot, Etienne
SQLDOM4J: Preventing SQL Injections in Object-Oriented Applications – a Java solution based on the SQL DOM Conference
Nji, Lionel
Statistical Analysis of Software Design Error Vulnerability Data
Viegas, Edwina
Privacy Classification of Health Information in Alberta – Issues, Proposed Solution and Benefits
Master of Information Systems Security Research 2007 Convocation
CHOL, Emmanuel
Study of the Enterprise Security Manager / Security Incident Manager (ESM / SIM) Commercial and Open Source Solutions
LINDSKOG, Dale
A Novel Strategy for Internetwork Segmentation and Zoning
MAMOS, Jakub
SCADA Information Security Management Guide