_version_ 1799744418618540032
annif_keywords_txtF_mv Internet of things quantitative analysis (chemical analysis) vulnerability data security quantitative research
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p27206 http://www.yso.fi/onto/yso/p8183 http://www.yso.fi/onto/yso/p25011 http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p18834
author Jokela, Patrik
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kyberturvallisuus 601
author_facet Jokela, Patrik Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Kyberturvallisuus 601 Jokela, Patrik
author_sort Jokela, Patrik
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2023-05-03T20:11:26Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices</title><creator>Jokela, Patrik</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Kyberturvallisuus</contributor><contributor type="oppiaine" lang="en">Kyberturvallisuus</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">Penetration testing</subject><subject type="other">Vulnerabilities</subject><subject type="other">Exploit</subject><subject type="other">Denial-of-Service</subject><subject type="other">Amplification attack</subject><subject type="other">Response size amplification</subject><subject type="yso">esineiden internet</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">turvallisuus</subject><subject type="yso">verkkohy&#xF6;kk&#xE4;ykset</subject><subject type="yso">Internet of things</subject><subject type="yso">cyber security</subject><subject type="yso">safety and security</subject><subject type="yso">cyber attacks</subject><available>2023-05-03T04:57:15Z</available><issued>2023</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/86729</identifier><identifier type="urn">URN:NBN:fi:jyu-202305032824</identifier><language type="iso">en</language><rights>In Copyright</rights><rights type="copyright">&#xA9; The Author(s)</rights><rights type="accesslevel">openAccess</rights><rights type="url">https://rightsstatements.org/page/InC/1.0/</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202305032824</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/86729/1/URN%3aNBN%3afi%3ajyu-202305032824.pdf" name="URN:NBN:fi:jyu-202305032824.pdf" type="application/pdf" length="2550339" sequence="1"/><recordID>123456789_86729</recordID></qualifieddc>
id jyx.123456789_86729
language eng
last_indexed 2024-05-13T20:05:11Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/86729\/1\/URN%3aNBN%3afi%3ajyu-202305032824.pdf","text":"URN:NBN:fi:jyu-202305032824.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2023-05-03T20:11:26Z
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Jokela, Patrik A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices Penetration testing Vulnerabilities Exploit Denial-of-Service Amplification attack Response size amplification esineiden internet kyberturvallisuus turvallisuus verkkohyökkäykset Internet of things cyber security safety and security cyber attacks
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_86729&index=0&size=large
title A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
title_full A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
title_fullStr A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
title_full_unstemmed A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
title_short A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
title_sort quantitative analysis of vulnerabilities and exploits in home iot devices
title_txtP A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
topic Penetration testing Vulnerabilities Exploit Denial-of-Service Amplification attack Response size amplification esineiden internet kyberturvallisuus turvallisuus verkkohyökkäykset Internet of things cyber security safety and security cyber attacks
topic_facet Amplification attack Denial-of-Service Exploit Internet of things Penetration testing Response size amplification Vulnerabilities cyber attacks cyber security esineiden internet kyberturvallisuus safety and security turvallisuus verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/86729 http://www.urn.fi/URN:NBN:fi:jyu-202305032824
work_keys_str_mv AT jokelapatrik aquantitativeanalysisofvulnerabilitiesandexploitsinhomeiotdevices AT jokelapatrik quantitativeanalysisofvulnerabilitiesandexploitsinhomeiotdevices