COMPSCI 725 S2C 04 Term Papers
Mingfeng Bao Improved data confidentiality: an overview of NGSCB
Brendan Sean Cervin Review of Security Requirements Engineering Processes
Michael Alan Cochrane VPN Access for mobile users: IPSec or SSL?
Siriwat Karndacharuk Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Corinne Alison Lawrence Intrusion Prevention Systems: The Future of Intrusion Detection?
Cho Hong Ling Internet Firewall Vulnerability Analysis Method
Zheng Liu Microsoft .NET Passport, a solution of single sign on
Zhichao Liu Defenses Against DDoS Attacks With Multiple IDSs Using Network Stream Splitting
Zhengyuan Luo Two SSO Architectures with a Single Set of Credentials
Praveen Mandava E-Voting (in)Security
Paul Richard Mason An Intellectual Property Threat Analysis of a .NET Windows Application
Christopher John Mills Investigation of Defences Against Cross Site Scripting Attacks
Christian Hagensen Mosveen Why VPN Alone Will not Secure your Wireless Network
Sandeep Mudana Security Flaws in Internet Voting System
Richard Allen Paul Verifying the Integrity of Shared Libraries
Teng Teng Analyzing the vulnerability of a certain Reputation-Based Trust Management for P2P Networks
Lei Wang Fight against spyware on two laptops
Yijie Yang Raw Quick Pairs method of detecting Stego-images
Cheung-Ling-Kelly Yu A Case study on PKI: SERVE
Bojan Zdrnja Second-generation (GenII) honeypots