Hae
Aineistot 21-30 / 83
OpenID Connect Provider Certification
(2019-02-27)
The thesis looks into authentication and authorization theory and reviews some protocols used for identity management. The most important protocols in the thesis are OAuth 2.0 and OpenID Connect.
The method of research ...
Raising Cybersecurity Awareness on Employees Through Serious Games
(2019-12-04)
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage of computers, smartphones and other smart devices has become the norm. More specifically, businesses need to pay additional ...
Deep Learning Based Abnormal Gait Classification System Study with Heterogeneous Sensor Network
(2020-01-20)
Gait is one of the important biological characteristics of the human body. Abnormal gait is mostly related to the lesion site and has been demonstrated to play a guiding role in clinical research such as medical diagnosis ...
Improving a New Digital Content Creation Line of Study in Adult Education College
(2020-06-16)
The topic of the research is digitalization and digital competence frameworks and
competence in the digitalized world and programming. Research methods in the
thesis are the qualitative research, the review of literature ...
Building business driven IaaS services with third party software components
(2020-05-28)
The current cloud landscape is dominated by the major cloud service providers, such as
Google Cloud, Amazon Web Services and Microsoft Azure. When the company wants to
build its own cloud, there are some matters one needs ...
Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security
(2020-06-04)
Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard ...
Secure Messaging with in-app user defined schemes
(2020-06-08)
Cryptography has been the culmination of human trials and mistrials in an attempt to
keep information safe from unintended access. We have learned from our mistakes in
the past, and today with the help of both academician ...
Assessing performance overhead of Virtual Machine Introspection and its suitability for malware analysis
(2020-06-25)
Virtual Machine Introspection is the process of introspecting guest VM’s memory and reconstructing the state of the guest operating system. Due to its isolation, stealth and full visibility of the monitored target, VMI ...
Autonomous object mapping using UAV-based remote sensing
(2020-05-28)
Safety plays a huge role in our world. As technology advances, we can harness it to negate risks in our everyday life. This thesis is made for a project by Työtehoseura, who are responsible for Finland's yearly warehouse ...
Fabrication and Pseudo-Analog Characteristics of Ta2O5 -Based ReRAM Cell
(Turun yliopisto, 2016-08-15)
Memristori on yksi elektroniikan peruskomponenteista vastuksen, kondensaattorin ja kelan lisäksi. Se on passiivinen komponentti, jonka teorian kehitti Leon Chua vuonna 1971. Kesti kuitenkin yli kolmekymmentä vuotta ennen ...