Selaus oppiaineen mukaan kokoelmassa Pro gradu -tutkielmat ja diplomityöt sekä syventävien opintojen opinnäytetyöt (rajattu näkyvyys) Tietotekniikka
Aineistot 1-20 / 121
-
2.4GHz RF Front-end Module Based on 0.18μm CMOS Process
(06.05.2020)With the increasing number of wireless communication applications, the demand for low-power and low-cost radio frequency (RF) wireless transceiver chips is increasing. Therefore, the idea of using complementary metal oxide ...suljettu -
A Comprehensive View on MFA Fatigue : Techniques and Mitigation Strategies
(27.07.2023)Multi-Factor Authentication (MFA) can be bypassed by overwhelming users with fraudulent MFA prompts until they accept. This tactic is called MFA fatigue. Several renowned organizations have been compromised with this attack ...suljettu -
A Dive in Incident Handling and Digital Forensics: Using Automation to improve Response to APT Incidents
(25.09.2023)Over the last few years, companies have grown enormously in terms of IT; their structure has expanded, and consequently, they have been facing cybersecurity incidents more frequently. The entry of governments into so-called ...suljettu -
A Model For Measuring Improvement Of Security In Continuous Integration pipelines : Metrics and Four-Axis Maturity Driven DevSecOps (MFAM)
(19.10.2021)This Thesis researches the effect of adding security tools into CI pipelines. The thesis is based on "security by design" within the software development cycle. The CI pipeline is based on a relatively new topic area ...suljettu -
A Rapid Approach To Web Application Security
(10.06.2022)After using and developing a web application tool at a company, it is now time for this tool to be productised and made available for use to external customers. Initially, as this was the company’s R&D internal tool, the ...suljettu -
A Review of the Current Methods and Challenges of Facial EMG Based Gesture Recognition
(15.03.2021)Advances in technology related to the Internet-of-Things and wearable health technology has lead new research in the field of surface EMG based gesture recognition in different fields of study such as medical rehabilitation, ...suljettu -
A Software Re-engineering Perspective of a Development Process : Case Korpi ForRest
(17.06.2021)Software re-engineering is about taking an existing system and examining it or making changes to it in order to improve it. User experience is about a user’s observable and measurable interaction with a system. Usability ...suljettu -
A Study of Familiar Strangers in Temporal Interaction Networks
(20.01.2021)There are rich and varied social ties between people in our daily lives. The familiar stranger is one of those social ties, and has attracted a lot of attention since the concept was proposed. Using knowledge of network ...suljettu -
A Study of Organization Level E-mail Phishing Awareness
(07.06.2023)Phishing is, without a doubt, one of the most widespread cyber attacks that organizations worldwide are facing. It is unfortunate, however, that many companies overlook the importance of implementing security measures to ...suljettu -
A Study of Ransomware Countermeasures
(16.05.2024)With the significant rise in ransomware attacks in the last decade, the amount of research on mitigating these attacks has also increased. This thesis presents a comprehensive analysis of recent studies on ransomware ...suljettu -
A Study on Awareness of AI-Driven Attacks and Dark Web-Generated Threats
(09.07.2024)A Study on Awareness of AI-Driven Attacks and Dark Web-Generated Threats is a master´s research conducted to study the awareness of employees and students of AI-generated attacks and dark web originated threats. The study ...suljettu -
A wireless closed-loop optogenetic neurostimulation system with 32-channel neural recording
(17.05.2023)A brain-machine interface is an interactive interface that communicates between the brain and a machine. A closed-loop brain-machine interface collects and analyzes neural signals from the brain and modulates the nervous ...suljettu -
Achieving ISO 27001 Certification by implementing an Information Security Management System
(04.12.2018)Information security is intended to protect the confidentiality, integrity and availability of information assets within an organisation. In recent times, there has been a significant trend in increasing cyber-attacks, ...suljettu -
Activating children through exergaming – A case study
(01.03.2024)This thesis examines exergaming as a possibility to increase activity in children. Aim of this thesis is to research exergaming and motivational ways used in exergaming and based on the research to design and implement ...suljettu -
Adaptive Web UI for Modular diagnostics service
(26.04.2022)To do a Web-based service, there are several architectures and software tools for choose from. Also, nearly as many frameworks that can implement a graphical user interface for the service. This thesis involves studying ...suljettu -
An Open Source Intelligence (OSINT) Framework for Online Investigations
(06.06.2019)Cybersecurity is an immense issue nowadays because of the damaging consequences instigated by cyber-attacks which could lead to the outflow of classified documents, infrastructure breakdown and revenues deficit. It is ...suljettu -
Analysis of agile software development skills by analysing product backlogs using INVEST and DEEP
(28.06.2019)The transparency of processes and rapid reaction to changing customer requirements can be enhanced by adapting agile software development methods. The agile methods provide many different tools for improving management of ...suljettu -
Antecedents of Continued Use Intention in the Era of Data Breaches: An Empirical Study of Pakistani Online Banking Users
(14.04.2020)Data breaches are a rising threat to the banking sector in which the customer’s information is accessed by unauthorized persons leading to reduced trust and reputation. The reduction in trust and satisfaction may result ...suljettu -
API Management Platforms
(19.06.2023)Goals of the thesis are to introduce reader to APIs and API management and core concepts within those. These concepts help reader to understand the benefits of having an API management platform to control APIs in an ...suljettu -
Application of Machine Learning-Based Classifier for AS-Sets to Enhance the Security within the Border Gateway Protocol
(01.08.2023)The internet has precipitated a revolutionary transformation across multiple dimensions of human existence, encompassing communication, work, and education. With its intricate mechanisms, the internet relies on the functioning ...suljettu