Norris, Cindy

asu

There are 4 item/s.

TitleDateViewsBrief Description
Improving Student Comprehension Through Interactive Microarchitecture Simulation and Visualization 2013 2028 The curricula of most Computer Science departments include at least one course on computer organization and assembly language. The seminal concepts covered by such courses bridge the gap between hardware and software by introducing multiple layers o...
Feat: A Facebook Extraction And Analysis Toolkit 2016 1102 Social media usage has become mainstream. According to a recent study done by Edison Research in 2016, 78% of the U.S. population has a social media profile [8]. The number of active Facebook users is over one billion. In addition, 71% of adults use ...
Modernizing Password Usage In Computing 2017 1391 A study of password usage and crypotography in computing culminates in the development of a password manager that improves users' password security. PassMan offers two-factor encrypted storage of user passwords and account information via the Yubike...
An Analysis Of Tools, Techniques, And Mathematics Involved In A Penetration Test 2017 2170 In the security arena, there are two main approaches to carrying out security measures, namely offensive and defensive. Penetration testing combines these two methodologies to help detect and eliminate vulnerabilities. Penetration testing simulates r...