Browsing by Supervisor "Ko, Ryan K.L."

Now showing items 1-12 of 12

  • Cyber security visualization effectiveness

    Garae, Jeffery (The University of Waikato, 2019)
    Security visualization utilises predefined data attributes and translates them into visual nodes to form images for the purpose of communicating critical security information to targeted audiences. It is commonly used for ...
  • Privacy-preserving encoding for cloud computing

    Will, Mark Antony (The University of Waikato, 2019)
    Information in the cloud is under constant attack from cyber criminals as profitability increases; user privacy is also at risk with data being mined for monetary value – the new gold. A single leak could have devastating ...
  • Detecting relay attacks against Bluetooth communications on Android

    Symon, Jeremy (The University of Waikato, 2018)
    The widespread usage of mobile devices has lead to mobile devices being used to replace existing solutions, including smart cards for authentication in access control systems. While this can be convenient, there are security ...
  • Key factors in building a Secure Web Gateway

    Yeh, Jeffrey (University of Waikato, 2017)
    A Secure Web Gateway, according to Gartner’s definition, is a solution that provides URL filtering, malicious code detection and blocking, and application controls for cloud applications to filter out objectionable ...
  • Reconstructing Data Provenance from Log Files

    Tan, Yu Shyang (The University of Waikato, 2017)
    Data provenance describes the derivation history of data, capturing details such as the entities involved and the relationships between entities. Knowledge of data provenance can be used to address issues, such as data ...
  • The Waikato Data Privacy Matrix

    Scoon, Craig (University of Waikato, 2017)
    Data privacy is an expected right of most citizens around the world, but there are many legislative challenges within boundary-less cloud computing and World Wide Web environments. Despite its importance, there is limited ...
  • Implementing Internet topology analysis with emphasis on load balancers and using large numbers of vantage points

    Eichler, Stephen John (University of Waikato, 2016)
    This thesis describes a study of load balancing and topology discovery in the Internet. Topology data was collected using variants of Traceroute including Traceroute MDA which provides topology information about load ...
  • Secure Storage Guideline for Android Devices

    de Feijter, Sjoerd (University of Waikato, 2016)
    The sudden surge in the mobile market has given developers the ability to create applications that reach millions of potential users. Many applications store sensitive data, which makes them potential targets for malicious ...
  • Tamper-Evident Data Provenance

    Bany Taha, Mohammad Mustafa Mousa (University of Waikato, 2015)
    Data Provenance describes what has happened to a users data within a ma- chine as a form of digital evidence. However this type of evidence is currently not admissible in courts of law, because the integrity of data ...
  • Document DNA: Distributed Content-Centered Provenance Data Tracking

    Rinck, Michael (University of Waikato, 2015)
    This thesis presents a new content-centered approach to provenance data tracking: the Document DNA. Knowledge workers are overwhelmed as they find it hard to structure, maintain, and find re-used content within their ...
  • An Extensible Web Application Vulnerability Assessment and Testing Framework

    Delamore, Baden (University of Waikato, 2014)
    The process of identifying vulnerabilities in web services plays an integral role in reducing risk to an organisation that seeks to protect their intellectual property and data. The process itself generally involves an ...
  • User-centric Visualization of Data Provenance

    Garae, Jeffery (University of Waikato, 2015)
    The need to understand and track files (and inherently, data) in cloud computing systems is in high demand. Over the past years, the use of logs and data representation using graphs have become the main method for tracking ...