Hae
Aineistot 11-20 / 83
Virtual environments for penetration testing of IoT devices
(2020-03-11)
The aim of this thesis is to build a virtual penetration testing environment in order to test cyber security of IoT devices and provide material for teaching penetration testing in cyber security courses at the University ...
A SystemC Simulator for Secure Data Transfer in Healthcare Internet of Things
(2019-06-20)
In this thesis, a simulator for secure data transfer between medical sensors and end-users is developed using smart e-health gateways in medical environments like hospitals, healthcare centers and old-age homes. The rate ...
LEVERAGING USERS TO BREAK CYBER KILL CHAIN
(2019-12-20)
Cyber kill chain defined the chronological strategies that attackers follow in invading information system with the hope of reducing the exponential increase in attacks by equipping organizations and technological stakeholders ...
Data Integrity and Privacy in an Electronic Case Report Form
(2018-12-02)
Health records are used to map the overall health of a patient and most information related
to their current status such as existing diseases and medication are usually entered into
these records. These records are ...
Developing Best Practices for Securing VoIP Communication for a non-profit Organization
(2018-12-13)
Voice over Internet Protocol (VoIP) is the most widely used service around the world. The proficiency of it utilizing the web has increased awesome ubiquity in the current years. With this notoriety, there is expanding ...
Ohjelmistorobotiikan testauksen hyödylliset menetelmät
(2019-11-06)
Ohjelmistorobotiikka on muutaman vuoden aikana kehittynyt huomattavasti ja se on otettu osaksi monen yrityksen toimintaa. Ohjelmistorobotiikalla tarkoitetaan ohjelmaa, joka käyttää toista ohjelmaa sen käyttöliittymän ...
Validating Game Design with Game Analytics in a Location-based Game
(2018-12-20)
Game analytics has grown from a trend to a norm in almost all types of games, and with the availability of tools and information, leveraging benefits has never been easier. Additionally, mobile location-based games are a ...
A User-Centric Access Control Framework for Cloud Computing
(2019-02-18)
A huge amount of data is generated due to the growth of advanced information technology, online availability and easy access to cloud computing. In cloud computing, user can easily store and share their information across ...
Smartphone-based Indoor Positioning Using Wi-Fi Fine Timing Measurement Protocol
(2019-09-30)
Location-based services have grown popular since GPS and other satellite navigation systems became available for consumers. However, because satellite signals are absent inside buildings, other means of positioning need ...
Acoustic data transmission for embedded software platforms: an empirical study
(2019-10-08)
As microcontrollers become increasingly powerful at a lower cost, they continue to expand
to new fields of applications, in particular those under the process of a digital transformation.
These systems are often packed ...