Selaus laitoksen mukaan kokoelmassa 1. Kirjat ja opinnäytteetTietotekniikan laitos
Aineistot 1-20 / 347
-
5G standalone network's reliability, one-way latency and packet loss rate analysis for URLLC implementation
(11.08.2022)5G is the fifth generation technology standard for cellular networks. It has three main application demands, which are Enhanced Mobile Broadband (EMBB), Massive Machine-Type Communications (MMTC) and Ultra-Reliable Low-Latency ...avoin -
A Case Study on Cloud Migration and Improvement of Twelve-Factor App
(28.06.2021)The Twelve-Factor app methodology was introduced in 2011, intending to raise awareness, provide shared vocabulary and offer broad conceptual solutions. In this thesis, a case study was done on two software implementations ...avoin -
A case study on low-code integration platforms
(20.12.2023)The low-code approach has been gaining popularity among integration platforms. Low-code aims to make software development so intuitive that regular citizens could build applications. However, there is little research on ...avoin -
A Comprehensive View on MFA Fatigue : Techniques and Mitigation Strategies
(27.07.2023)Multi-Factor Authentication (MFA) can be bypassed by overwhelming users with fraudulent MFA prompts until they accept. This tactic is called MFA fatigue. Several renowned organizations have been compromised with this attack ...suljettu -
A Dive in Incident Handling and Digital Forensics: Using Automation to improve Response to APT Incidents
(25.09.2023)Over the last few years, companies have grown enormously in terms of IT; their structure has expanded, and consequently, they have been facing cybersecurity incidents more frequently. The entry of governments into so-called ...suljettu -
A Dual-Modality Emotion Recognition System of EEG and Facial Images and its Application in Educational Scene
(22.12.2022)With the development of computer science, people's interactions with computers or through computers have become more frequent. Some human-computer interactions or human-to-human interactions that are often seen in daily ...avoin -
A Framework of DevSecOps for Software Development Teams
(05.07.2023)This master's thesis explores a broad evaluation of automated security testing in the context of DevOps practices. The primary objective of this study is to propose a framework that facilitates the seamless integration of ...avoin -
A Fuzz Testing Approach for Embedded Avionic Software
(20.12.2023)Fuzz testing is a technique that can be used to test software in order to discover potential flaws and vulnerabilities. This particular approach is receiving a quick widespread adoption to test also embedded software ...avoin -
A Model For Measuring Improvement Of Security In Continuous Integration pipelines : Metrics and Four-Axis Maturity Driven DevSecOps (MFAM)
(19.10.2021)This Thesis researches the effect of adding security tools into CI pipelines. The thesis is based on "security by design" within the software development cycle. The CI pipeline is based on a relatively new topic area ...suljettu -
A modern approach for Threat Modelling in agile environments: redesigning the process in a SaaS company
(09.10.2023)Dealing with security aspects has become one of the priorities for companies operating in every sector. In the software industry building security requires being proactive and preventive by incorporating requirements right ...avoin -
A multifunctional nerve stimulator used for nerve localization and muscle relaxant monitoring
(04.06.2023)The use of a peripheral nerve stimulator (PNS) can help an anesthesiologist accurately locate the nerve, reduce risks of accidents, and the dose of anesthesia. The muscle relaxation monitor (MRM) can monitor the residual ...suljettu -
A Rapid Approach To Web Application Security
(10.06.2022)After using and developing a web application tool at a company, it is now time for this tool to be productised and made available for use to external customers. Initially, as this was the company’s R&D internal tool, the ...suljettu -
A reduced precision hardware accelerated convolution engine
(24.05.2021)Technological solutions are used in increasing manner in automating production and supporting everyday life. These solutions often require specialized devices that are controlled by microprocessors. The size and energy ...suljettu -
A Review of the Current Methods and Challenges of Facial EMG Based Gesture Recognition
(15.03.2021)Advances in technology related to the Internet-of-Things and wearable health technology has lead new research in the field of surface EMG based gesture recognition in different fields of study such as medical rehabilitation, ...suljettu -
A Software Re-engineering Perspective of a Development Process : Case Korpi ForRest
(17.06.2021)Software re-engineering is about taking an existing system and examining it or making changes to it in order to improve it. User experience is about a user’s observable and measurable interaction with a system. Usability ...suljettu -
A Study of Automotive Security : CAN Bus Intrusion detection Systems, Attack Surface, and Regulations
(19.07.2022)The innovation in the automotive sector enhanced the technology implemented in vehicles by the manufacturers. Consequently, the overall driving experience improved, thanks to the introduction of better safety, utility, and ...avoin -
A Study of Organization Level E-mail Phishing Awareness
(07.06.2023)Phishing is, without a doubt, one of the most widespread cyber attacks that organizations worldwide are facing. It is unfortunate, however, that many companies overlook the importance of implementing security measures to ...suljettu -
A Study of Scams and Frauds using Social Engineering in “The Kathmandu Valley” of Nepal
(07.07.2023)Social Engineering scams are common in Nepal. Coupled with inability of government to enforce policies over technology giants and large swaths of population that are uneducated, social engineering scams and frauds are a ...avoin -
A wireless closed-loop optogenetic neurostimulation system with 32-channel neural recording
(17.05.2023)A brain-machine interface is an interactive interface that communicates between the brain and a machine. A closed-loop brain-machine interface collects and analyzes neural signals from the brain and modulates the nervous ...suljettu -
Access Management in Lightweight IoT: A Comprehensive review of ACE-OAuth framework
(21.12.2023)With the expansion of Internet of Things (IoT), the need for secure and scalable authentication and authorization mechanism for resource-constrained devices is becoming increasingly important. This thesis reviews the ...avoin