Master of Science in Information Security - 2017
Collection home page
Collection's Items (Sorted by Submit Date in Descending order): 1 to 15 of 15
Issue Date | Title | Author(s) |
2017 | Analyze vulnerabilities of source codes published on open forums | Desapriya, S.T.S.T. |
2017 | BYOD Security Enhancement using Log Correlation in Corporate Environments | Gunaratne, G. Y. C. L. |
2017 | A Case Study on Human Tracking through Passive Wi-Fi tomography | ABEYWARDANE, E. H. G. P. N. |
2017 | Defense In-depth security framework for Netflix OSS Micro Services | Walpita, P.A. |
2017 | Open Source IDS/IPS Native Security Rule Migration from IPv4 to IPv6 and their effectiveness and comparison | Pathirana, T.D.K. |
2017 | Enabling an Authentication Mechanism for Docker Remote API | Seneviratne, A. I. D. K. |
2017 | Detecting and Investigating Windows Management Instrumentation (WMI) Based Remote Attacks in Windows Operating Systems | Kulasekera, K.K. |
2017 | An Authentication Security and Governance Frame Work for Near Field Communication in Sri Lankan Context | Perumbuli, S. K. |
2017 | Identity distribution and session handling in microservice architecture | Kumarasingha, S.U. |
2017 | Public Key and Multi Factor Based Centralized SSH Authentication System for a Cloud Based Environment Using LDAP | Asanga, G.D.D. |
2017 | Developer Profiling for Secure Software Development | Hettiarachchi, L. T. |
2017 | DETECT 802.11 MAC LAYER SPOOF BASED DENIAL OF SERVICE ATTACKS AT SERVICE PROVIDER USING RECEIVED SIGNAL STRENGTH | ELALASINGHAM, G.A.R. |
2017 | SECURE TUNNELS IN 4G LTE NETWORKS | WEERASINGHE, CHIRAN ANUPRIYA |
2017 | Investigate Windows Management Instrumentation (WMI)Attacks in Windows Operating Systems | Maduranga, K. A. M. |
2017 | Behavioural and Face Biometric Based Authentication for Mobile Applications | Kumarage, D. D. U. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 15 of 15