Skip to main content

Research Repository

Advanced Search

All Outputs (7)

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. (2012). Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

Data quality and data cleaning in database applications (2012)
Thesis
Li, L. Data quality and data cleaning in database applications. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5788

Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems and customer relationship management systems (CRM), useful information or knowledge could be derived from l... Read More about Data quality and data cleaning in database applications.

A holistic semantic based approach to component specification and retrieval (2012)
Thesis
Li, C. A holistic semantic based approach to component specification and retrieval. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5677

Component-Based Development (CBD) has been broadly used in software development as it enhances the productivity and reduces the costs and risks involved in systems development. It has become a well-understood and widely used technology for developing... Read More about A holistic semantic based approach to component specification and retrieval.

An Investigation into Visual Graph Comparison (2012)
Thesis
Melville, A. G. An Investigation into Visual Graph Comparison. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/7560

Information Visualisation is extensively used in single graph analysis. However, relatively little work has been done in the field of graph comparison. This work examines and compares the use of two standard graph representations in this area, the No... Read More about An Investigation into Visual Graph Comparison.

User-Centric Biometrics: Authentication in a Self-Service Environment (2012)
Thesis
Riley, C. W. User-Centric Biometrics: Authentication in a Self-Service Environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4914

Biometric authentication is the process of establishing an individual's identity based on measurable characteristics of their anatomy, physiology or behavior. Biometrics do not share many of the limitations of traditional authentication mechanisms, a... Read More about User-Centric Biometrics: Authentication in a Self-Service Environment.

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments (2012)
Thesis
Jaroucheh, Z. An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5348

The concept of context-awareness is widely used in mobile and pervasive computing to reduce explicit user input and customization through the increased use of implicit input. It is considered to be the corner stone technique for developing pervasive... Read More about An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments.