Search
Now showing items 1-10 of 10
Synthesis and characterisation of novel astaxanthin metal complexes
(2015-10)
Astaxanthin is produced in a wide range of organisms, its extractability from the native
Irish brown crab (Cancer pagurus) was carried out using glacial acetic acid. The
extractable natural astaxanthin yield is quantified ...
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(2015-05)
In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ...
A comparison between Cloud Solutions with focus on DevOps tooling
(2015-05)
The DevOps philosophy keeps gaining popularity due to its practices that allow
companies to quickly deliver software changes to their customers. Along with this
advent, Cloud Solutions continue to expand their customer ...
Fingerprint watermarking using svd and dwt based steganography to enhance security
(2015-09-15)
Identification of persons by way of biometric features has evolved significantly over the
years. During this time, biometric recognition has received much attention due to its need
for security. Amongst the many existing ...
Stealth analysis of Network Topology using Spanning Tree Protocol
(2015-05)
Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ...
Traffic isolation techniques in securing multi-tenant virtual environments
(2015-01)
A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation ...
An implementation and evaluation of PCI DSS 3.0 for E-Commerce in a testing environment
(2015-03)
Threats to personal payment card information are continually on the rise. To implement a formal process for protecting this information PCI DSS was created. However credit card fraud is still rising. This leads to the ...
Improving compliance with Bluetooth device detection
(2015-05)
Attributed to Joshua Wright (2012) “Security will not get better until tools for practical exploration of the attack surface are made available”.
With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth ...
Malware analysis and antivirus signature creation
(2015-05)
The rapid advances social media, educational tools and communications platforms available today have expanded the attack landscape through which the malicious user can propagate their work can carry out damaging attacks. ...