Browsing by Subject "Computer security."
Now showing items 1-4 of 4
-
Analysis of Security Vulnerabilities in Web Applications using Threat Modeling
(North Dakota State University, 2011)Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ... -
K-Anonymization Implementation Using Apache Spark
(North Dakota State University, 2019)This experiment attempts on data which can reveal a person’s identity to anonymize with k-1 anonymity principle. "Given person-specific field-structured data, produce a release of the data with scientific guarantees that ... -
A Software Agent System for Private Email
(North Dakota State University, 2010)The primary concerns in existing Email and instant messaging systems are authentication processes, privacy and security issues. These messaging systems transfer the message content through servers using protocols like ... -
Threat Identification from Access Logs Using Elastic Stack
(North Dakota State University, 2020)Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...