Hae
Aineistot 1-10 / 11
Analysis of Black hole Attack in Ad hoc On-Demand Distance Vector (AODV) Routing Protocol : Vehicular Ad-hoc Networks (VANET) Context
(2019-07-01)
In past years, popularity of Mobile Ad hoc Networks has led to the conception of Vehicular Ad hoc Networks. These networks must be highly secure before their implementation in real world. One of the vital aspects of these ...
Security First approach in development of Single-Page Application based on Angular
(2019-10-04)
Recently a Single-Page Application (SPA) approach is getting attention even though this is based on JavaScript is not considered to be a safe programming language. In the SPA ecosystem developers often have to use many ...
Detecting of Maritime Anomalies and Security Issues Using AIS Data
(2019-12-19)
The maritime environment has suffered from high marine traffic. High marine traffic has caused many problems and risks in the maritime and its surrounding environments. The primary objective of this thesis is to analyze ...
An anti-malware product test orchestration solution for multiple pluggable environments
(2018-12-03)
The term automation gets thrown around a lot these days in the software industry. However, the recent change in test automation in the software engineering process is driven by multiple factors such as environmental factors, ...
Factors Affecting Password Manager Adoption among European University Students
(2019-10-11)
Password is the most common method of proving the identity on various online services. More and more sensitive information gets stored online: banking details, healthcare data, educational and corporate data. Due to the ...
Studies on Category Prediction of Ovarian Cancers Based on Magnetic Resonance Images
(2020-01-29)
Ovarian cancer is the gynecological malignant tumor with low early diagnosis rate and high mortality. Ovarian epithelial cancer (OEC) is the most common subtype of ovarian cancer. Pathologically, OEC is divided into two ...
Google dorks: Use cases and adoption study
(2020-10-13)
The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets ...
Formation Control Algorithms With Limited or No Communication
(2020-07-10)
Formation control refers to a collective behaviour of multi-agent systems where individual agents come together to form a pattern, often geometric. These formations can enable multi-agent systems to function more effectively ...
Data Reduction Methods of Audio Signals for Embedded Sound Event Recognition
(2020-06-23)
Sound event detection is a typical Internet of Things (IoT) application task, which could be used in many scenarios like dedicated security application, where cameras might be unsuitable due to the environment variations ...
Strong Customer Authentication : Security Issues and Solution Evaluation
(2020-06-10)
In October 2015 PSD2 first adopted by the European Parliament to initiate a new method of payment system. Since then, it receives several amendment time to time. Strong Customer Authentication (SCA), one of the major ...