11 results

Framework for network IDS evaluation

Thesis
Lo, O. (2009)
Framework for network IDS evaluation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3981
There are a multitude of threats now faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data stealing and denial of service. A...

RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture

Thesis
Ukwandu, E. A. RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2455031
Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secure, resilient and reliable data sharing method. Several variants of secret s...

Cryptographic privacy-preserving enhancement method for investigative data acquisition

Thesis
Kwecka, Z. (2011)
Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437
The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public autho...

Garmin satnav forensic methods and artefacts: an exploratory study.

Thesis
Arbelet, A. (2014)
Garmin satnav forensic methods and artefacts: an exploratory study. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7334
Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users e...

Network Firewall Dynamic Performance Evaluation and Formalisation

Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...

Speed improvements for the RSA encryption method

Thesis
Wang, H. (2000)
Speed improvements for the RSA encryption method. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4065
This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the o...

An agent-based Bayesian method for network intrusion detection.

Thesis
Pikoulas, J. (2003)
An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4057
Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting...

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

Thesis
Davies, S. (2020)
Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. (Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2875361
Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arm...

MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks

Thesis
Migas, N. (2008)
MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4000
Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full ...

Implementation and evaluation of a botnet analysis and detection method in a virtual environment

Thesis
Waheed, S. (2012)
Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667
Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a...

Date


Date


Date


Date