Hae
Aineistot 1-10 / 52
Hollow-core anti-resonant double-ring nested negative-curvature fiber for 0.3THz-0.5THz transmission
(2021-10-01)
The terahertz (THz) domain is an electromagnetic wave with a frequency in the range of 0.1THz to 10THz lying between microwave and infrared spectra, which have great potential in public security and communication. Although ...
BMS software reliability prediction as a function of residual defect density using SIL dynamic metrics
(2022-03-19)
The continuously increasing complexity and computerization of automotive systems
correlate directly to increased expectations from customers on the reliability of the
system. Especially for battery management systems, ...
Design and implementation of data ingestion extensions for threat intelligence platforms
(2022-05-18)
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The extensions were created for ingestion of contextualized indicators of compromise (IoCs) from an external data source, to ...
Implementing a gamified web application for educating parents on the dangers of social media towards children
(2022-06-23)
Social networking is reported to be one of the most popular digital activities in the world. In 2020, over 3.6 billion people were using social media worldwide. The increasing usage of mobile devices has contributed into ...
Using Microservices to Modernize a Monolithic Webservice
(2022-06-27)
Software modernization is a topic of discussion in companies around the world. Instead of being a single project, modernization should be an ongoing project but that might not always be possible. Microservice architecture ...
A Rapid Approach To Web Application Security
(2022-06-10)
After using and developing a web application tool at a company, it is now time for this tool to be productised and made available for use to external customers. Initially, as this was the company’s R&D internal tool, the ...
Adaptive Web UI for Modular diagnostics service
(2022-04-26)
To do a Web-based service, there are several architectures and software tools for choose from. Also, nearly as many frameworks that can implement a graphical user interface for the service. This thesis involves studying ...
DevOps in regulated environment
(2022-05-07)
This thesis is done to examine the suitability, advantages and challenges of DevOps working model within Wallac Oy software units. The company designs and manufactures analysis equipment, instruments, reagents, assay ...
LS - JA3 Client Fingerprinting Comparisons for Applications running on Windows, Linux and Android Operating Systems
(2022-05-04)
TLS fingerprinting has evolved in response to growing cybersecurity concerns. The need for a mechanism that can detect malicious activity in the encrypted traffic during communication between server and client without ...
From Standards to Practice : Implementing ISA/IEC 62443-4-1 Secure by Design in a Smart Lighting Company
(2022-07-13)
The customer requirements for smart lighting solutions related to cybersecurity are increasing. To be able to produce more secure products efficiently as well as to be able to verify the competencies of the customers ...