Hae
Aineistot 1-10 / 22
Analysis of Black hole Attack in Ad hoc On-Demand Distance Vector (AODV) Routing Protocol : Vehicular Ad-hoc Networks (VANET) Context
(2019-07-01)
In past years, popularity of Mobile Ad hoc Networks has led to the conception of Vehicular Ad hoc Networks. These networks must be highly secure before their implementation in real world. One of the vital aspects of these ...
Design and implementation of UHF RFID smart readers
(2019-12-17)
The traditional process of integrating RFID technology into business processes can be very costly and tedious. The readers were only capable of doing a single task which is listen for requests from a client application, ...
Ensuring the integrity of nodes under the context of container live migration in a secure network
(2019-12-17)
The amount of data generated in our hyper-connected networks is rising exponentially. More and more consumer electronic devices rely on the internet to provide users with seamless access to services. Cloud computing has ...
Security First approach in development of Single-Page Application based on Angular
(2019-10-04)
Recently a Single-Page Application (SPA) approach is getting attention even though this is based on JavaScript is not considered to be a safe programming language. In the SPA ecosystem developers often have to use many ...
Detecting of Maritime Anomalies and Security Issues Using AIS Data
(2019-12-19)
The maritime environment has suffered from high marine traffic. High marine traffic has caused many problems and risks in the maritime and its surrounding environments. The primary objective of this thesis is to analyze ...
FACTORS AFFECTING PHISHING SUSCEPTIBILITY OF THE STUDENTS
(2018-11-20)
The purpose of this study is to identify and examine the factors that may affect phishing susceptibility of the students. Using a role-play task in an online survey, data were collected from students of the University of ...
An anti-malware product test orchestration solution for multiple pluggable environments
(2018-12-03)
The term automation gets thrown around a lot these days in the software industry. However, the recent change in test automation in the software engineering process is driven by multiple factors such as environmental factors, ...
Real time Learning State Evaluation System for Elearning
(2019-10-30)
In the information age, the popularity of the Internet is profoundly changing the way people live. In this context, the online classrooms, which are spawned as a supplement to traditional classroom teaching, ...
Factors Affecting Password Manager Adoption among European University Students
(2019-10-11)
Password is the most common method of proving the identity on various online services. More and more sensitive information gets stored online: banking details, healthcare data, educational and corporate data. Due to the ...
Studies on Category Prediction of Ovarian Cancers Based on Magnetic Resonance Images
(2020-01-29)
Ovarian cancer is the gynecological malignant tumor with low early diagnosis rate and high mortality. Ovarian epithelial cancer (OEC) is the most common subtype of ovarian cancer. Pathologically, OEC is divided into two ...