Now showing items 1-4 of 4

    • Analysis of Security Vulnerabilities in Web Applications using Threat Modeling 

      Kondamarri, Samuel Sudhakar (North Dakota State University, 2011)
      Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ...
    • K-Anonymization Implementation Using Apache Spark 

      Tortikar, Pratik (North Dakota State University, 2019)
      This experiment attempts on data which can reveal a person’s identity to anonymize with k-1 anonymity principle. "Given person-specific field-structured data, produce a release of the data with scientific guarantees that ...
    • A Software Agent System for Private Email 

      Mukka, Hari K. (North Dakota State University, 2010)
      The primary concerns in existing Email and instant messaging systems are authentication processes, privacy and security issues. These messaging systems transfer the message content through servers using protocols like ...
    • Threat Identification from Access Logs Using Elastic Stack 

      Vethanayagam, Suhanthan (North Dakota State University, 2020)
      Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...