Comparison of software vulnerability auditing tools

Bibliographic Details
Main Author: Eränen, Harri
Other Authors: Tietojenkäsittelytieteiden laitos, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:fin
Published: 2007
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/90258
_version_ 1826225633996308480
author Eränen, Harri
author2 Tietojenkäsittelytieteiden laitos University of Jyväskylä Jyväskylän yliopisto
author_facet Eränen, Harri Tietojenkäsittelytieteiden laitos University of Jyväskylä Jyväskylän yliopisto Eränen, Harri Tietojenkäsittelytieteiden laitos University of Jyväskylä Jyväskylän yliopisto
author_sort Eränen, Harri
datasource_str_mv jyx
description
first_indexed 2024-09-11T08:51:48Z
format Pro gradu
fullrecord [{"key": "dc.contributor.author", "value": "Er\u00e4nen, Harri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-10-19T16:52:49Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-10-19T16:52:49Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2007", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/90258", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Jussi Pajari (jussi.t.pajari@jyu.fi) on 2023-10-19T16:52:49Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-10-19T16:52:49Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "92 sivua", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "software security", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "runtime analysis", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "static analysis", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "security engineering", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "software auditing", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Comparison of software vulnerability auditing tools", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202310196296", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": null, "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietokoneohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "jyx.subject.uri", "value": "http://www.yso.fi/onto/yso/p5479", "language": null, "element": "subject", "qualifier": "uri", "schema": "jyx"}, {"key": "jyx.subject.uri", "value": "http://www.yso.fi/onto/yso/p26592", "language": null, "element": "subject", "qualifier": "uri", "schema": "jyx"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/collections/archival-workstation.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_90258
language fin
last_indexed 2025-02-18T10:56:42Z
main_date 2007-01-01T00:00:00Z
main_date_str 2007
publishDate 2007
record_format qdc
source_str_mv jyx
spellingShingle Eränen, Harri Comparison of software vulnerability auditing tools software security runtime analysis static analysis security engineering software auditing 601 tietokoneohjelmat tietoturva
title Comparison of software vulnerability auditing tools
title_full Comparison of software vulnerability auditing tools
title_fullStr Comparison of software vulnerability auditing tools Comparison of software vulnerability auditing tools
title_full_unstemmed Comparison of software vulnerability auditing tools Comparison of software vulnerability auditing tools
title_short Comparison of software vulnerability auditing tools
title_sort comparison of software vulnerability auditing tools
title_txtP Comparison of software vulnerability auditing tools
topic software security runtime analysis static analysis security engineering software auditing 601 tietokoneohjelmat tietoturva
topic_facet 601 runtime analysis security engineering software auditing software security static analysis tietokoneohjelmat tietoturva
url https://jyx.jyu.fi/handle/123456789/90258 http://www.urn.fi/URN:NBN:fi:jyu-202310196296
work_keys_str_mv AT eränenharri comparisonofsoftwarevulnerabilityauditingtools