Hae
Aineistot 31-40 / 69
Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security
(2020-06-04)
Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard ...
Secure Messaging with in-app user defined schemes
(2020-06-08)
Cryptography has been the culmination of human trials and mistrials in an attempt to
keep information safe from unintended access. We have learned from our mistakes in
the past, and today with the help of both academician ...
Assessing performance overhead of Virtual Machine Introspection and its suitability for malware analysis
(2020-06-25)
Virtual Machine Introspection is the process of introspecting guest VM’s memory and reconstructing the state of the guest operating system. Due to its isolation, stealth and full visibility of the monitored target, VMI ...
Autonomous object mapping using UAV-based remote sensing
(2020-05-28)
Safety plays a huge role in our world. As technology advances, we can harness it to negate risks in our everyday life. This thesis is made for a project by Työtehoseura, who are responsible for Finland's yearly warehouse ...
Achieving native-like experience on the web with progressive web apps
(2020-08-19)
For long developing applications for mobile has required developing a separate app for each platform that the developer wants the app to support. Apple has App store, Google has Play store and Microsoft has Microsoft store. ...
Google dorks: Use cases and adoption study
(2020-10-13)
The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets ...
Enhancing and integration of security testing in the development of a microservices environment
(2020-10-28)
In the last decade, web application development is moving toward the adoption of Service-Oriented Architecture (SOA). Accordingly to this trend, Software as a Service (SaaS) and Serverless providers are embracing DevOps ...
Modern Data Mining for Software Engineer, A Machine Learning PaaS Review
(2020-11-18)
Using data mining methods to produce information from the data has been proven to be valuable for individuals and society. Evolution of technology has made it possible to use complicated data mining methods in different ...
Deployment of Next Generation Intrusion Detection Systems against Internal Threats in a Medium-sized Enterprise
(2020-10-29)
In this increasingly digital age, companies struggle to understand the origin of cyberattacks. Malicious actions can come from both the outside and the inside the business, so it is necessary to adopt tools that can reduce ...
A*-algoritmin variantit
(2020-12-23)
Yksittäistä agenttia käsitteleviä paras ensin -hakualgoritmeja on käytetty vuosikymmenien ajan ratkaisuina hyvin monentyyppisiin ja monia aloja koskettaviin ongelmiin. Yksi tärkeimmistä on jo vuonna 1968 esitelty A*-algoritmi ...