Date


School

Output Type

Download Available

23 results

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society

Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...

Novel Hyper-heuristics Applied to the Domain of Bin Packing

Thesis
Sim, K. Novel Hyper-heuristics Applied to the Domain of Bin Packing. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7563
Principal to the ideology behind hyper-heuristic research is the desire to increase the level of generality of heuristic procedures so that they can be easily applied to a wid...

Implementation and evaluation of a botnet analysis and detection method in a virtual environment

Thesis
Waheed, S. (2012)
Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667
Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a...

Data quality and data cleaning in database applications

Thesis
Li, L. Data quality and data cleaning in database applications. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5788
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems and customer relationship manage...

A holistic semantic based approach to component specification and retrieval

Thesis
Li, C. A holistic semantic based approach to component specification and retrieval. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5677
Component-Based Development (CBD) has been broadly used in software development as it enhances the productivity and reduces the costs and risks involved in systems development...

An Investigation into Visual Graph Comparison

Thesis
Melville, A. G. An Investigation into Visual Graph Comparison. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7560
Information Visualisation is extensively used in single graph analysis. However, relatively little work has been done in the field of graph comparison. This work examines and ...

Wild networks: the articulation of feedback and evaluation in a creative inter-disciplinary design studio

Thesis
Joel, S. Wild networks: the articulation of feedback and evaluation in a creative inter-disciplinary design studio. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4578
It is argued that design exists within a collective social network of negotiation, feedback sharing and reflection that is integral to the design process. To encourage this, r...

An evaluation of the power consumption and carbon footprint of a cloud infrastructure

Thesis
Yampolsky, V. (2010)
An evaluation of the power consumption and carbon footprint of a cloud infrastructure. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3973
The Information and Communication Technology (ICT) sector represent two to three percents of the world energy consumption and about the same percentage of GreenHouse Gas(GHG) ...

Forensic verification of operating system activity via novel data, acquisition and analysis techniques

Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6699
Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific dis...

An integrated firewall policy validation tool

Thesis
Macfarlane, R. (2009)
An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3971
Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manual...