Hae
Aineistot 11-20 / 69
Detecting of Maritime Anomalies and Security Issues Using AIS Data
(2019-12-19)
The maritime environment has suffered from high marine traffic. High marine traffic has caused many problems and risks in the maritime and its surrounding environments. The primary objective of this thesis is to analyze ...
An Intelligent Circular Economy Upstream Monitoring & Optimization System Based on Industrial Internet of Things
(2019-11-24)
Industrial Internet of Things (IIoT) has many beneficial applications upon the industry of
Oil and Gas (O&G) and renewable energy production. Renewable energy production is
already growing faster than traditional fossil ...
On the Effects of Forced Trust on Implementations of Small Smart Cities
(2020-03-14)
As an increasing number of cities pursue the idea of becoming smart cities, the variety in different approaches to reach this goal also grows. They cover the use of a spectrum of implementations for, inter alia, information ...
Virtual environments for penetration testing of IoT devices
(2020-03-11)
The aim of this thesis is to build a virtual penetration testing environment in order to test cyber security of IoT devices and provide material for teaching penetration testing in cyber security courses at the University ...
An anti-malware product test orchestration solution for multiple pluggable environments
(2018-12-03)
The term automation gets thrown around a lot these days in the software industry. However, the recent change in test automation in the software engineering process is driven by multiple factors such as environmental factors, ...
A SystemC Simulator for Secure Data Transfer in Healthcare Internet of Things
(2019-06-20)
In this thesis, a simulator for secure data transfer between medical sensors and end-users is developed using smart e-health gateways in medical environments like hospitals, healthcare centers and old-age homes. The rate ...
LEVERAGING USERS TO BREAK CYBER KILL CHAIN
(2019-12-20)
Cyber kill chain defined the chronological strategies that attackers follow in invading information system with the hope of reducing the exponential increase in attacks by equipping organizations and technological stakeholders ...
Data Integrity and Privacy in an Electronic Case Report Form
(2018-12-02)
Health records are used to map the overall health of a patient and most information related
to their current status such as existing diseases and medication are usually entered into
these records. These records are ...
Developing Best Practices for Securing VoIP Communication for a non-profit Organization
(2018-12-13)
Voice over Internet Protocol (VoIP) is the most widely used service around the world. The proficiency of it utilizing the web has increased awesome ubiquity in the current years. With this notoriety, there is expanding ...
Ohjelmistorobotiikan testauksen hyödylliset menetelmät
(2019-11-06)
Ohjelmistorobotiikka on muutaman vuoden aikana kehittynyt huomattavasti ja se on otettu osaksi monen yrityksen toimintaa. Ohjelmistorobotiikalla tarkoitetaan ohjelmaa, joka käyttää toista ohjelmaa sen käyttöliittymän ...