Institutional Repository

Browsing FACULTY OF NATURAL & APPLIED SCIENCES by Subject "Computer security"

Browsing FACULTY OF NATURAL & APPLIED SCIENCES by Subject "Computer security"

Sort by: Order: Results:

  • Al Ghandour, Maria Gerges (Notre Dame University-Louaize, 2021)
    In today's world, protecting information has become one of the most difficult tasks. Cyber security events and data breaches continue to be expensive events that affect people and businesses all around the world. A breach occurs when sensitive information is accessed. Moreover, cyber threats are constantly evolving in order to take advantage of online behavior and trends, especially when teleworking has become a necessity due to the global invasion and prevalence of the Coronavirus disease 2019 during the past two years. Therefore, the necessity for cyber insurance, which covers the liability ...
  • Akhras, Chukri (Notre Dame University-Louaize, 2003)
    Administration of access control was and still is a crucial, critical and complex aspect of Security Administration. Many models were developed and used to effect this administration such as Mandatory access Control (MAC), Discretionary Access Control (DAC) and Role Base access Control. the latter, RBAC which is a flexible and policy-independent access control, represents a natural structure of an organization where functions are grouped into roles and users are permitted to one or more of these roles. In large organizations with relatively large systems, with hundreds of roles and users and ...
  • Rammouz, Veronica (Notre Dame University-Louaize, 2021)
    The internet has made room for lots of unwanted activity to propagate through computers. In response, many methods were established to detect a certain computer executable as malicious. However, there were still loopholes for hackers within traditional systems. Some methods use machine learning others use deep learning. There are some drawbacks to each method, such as reverse analysis and restricted simulation on different execution paths, as well as long execution time. Some methods cannot generalize well and cannot scale to large amounts of data. Moreover, anti-viruses, using signature-based ...

Search DSpace


Advanced Search

Browse

My Account