Norris, Cindy

asu

There are 5 item/s.

TitleDateViewsBrief Description
An Analysis Of Tools, Techniques, And Mathematics Involved In A Penetration Test 2017 3221 In the security arena, there are two main approaches to carrying out security measures, namely offensive and defensive. Penetration testing combines these two methodologies to help detect and eliminate vulnerabilities. Penetration testing simulates r...
Feat: A Facebook Extraction And Analysis Toolkit 2016 1293 Social media usage has become mainstream. According to a recent study done by Edison Research in 2016, 78% of the U.S. population has a social media profile [8]. The number of active Facebook users is over one billion. In addition, 71% of adults use ...
Improving Student Comprehension Through Interactive Microarchitecture Simulation and Visualization 2013 2332 The curricula of most Computer Science departments include at least one course on computer organization and assembly language. The seminal concepts covered by such courses bridge the gap between hardware and software by introducing multiple layers o...
Modernizing Password Usage In Computing 2017 2075 A study of password usage and crypotography in computing culminates in the development of a password manager that improves users' password security. PassMan offers two-factor encrypted storage of user passwords and account information via the Yubike...
Blockchain Elections: Smart Contract Electoral System Design And Implementation 2021 175 Proponents of Internet-based voting systems suggest that it might offer solutions to alleviate shortcomings that democratic institutions have fallen victim to. This has become especially relevant as governments and societies wrestle with the COVID-19...