_version_ |
1809902378014474240
|
annif_keywords_txtF_mv |
hunting
efficiency (properties)
motivation (mental objects)
threats
independent initiative
|
annif_uris_txtF_mv |
http://www.yso.fi/onto/yso/p3547
http://www.yso.fi/onto/yso/p8329
http://www.yso.fi/onto/yso/p4734
http://www.yso.fi/onto/yso/p21206
http://www.yso.fi/onto/yso/p15870
|
author |
Tams, Roope
|
author2 |
Faculty of Information Technology
Informaatioteknologian tiedekunta
University of Jyväskylä
Jyväskylän yliopisto
Kyberturvallisuus
Cyber Security
|
author_facet |
Tams, Roope
Faculty of Information Technology
Informaatioteknologian tiedekunta
University of Jyväskylä
Jyväskylän yliopisto
Kyberturvallisuus
Cyber Security
Tams, Roope
|
author_sort |
Tams, Roope
|
building |
Jyväskylän yliopisto
JYX-julkaisuarkisto
|
datasource_str_mv |
jyx
|
faculty_txtF |
Informaatioteknologian tiedekunta
|
first_indexed |
2024-05-30T20:00:58Z
|
format |
Pro gradu
|
format_ext_str_mv |
Opinnäyte
Maisterivaiheen työ
|
fullrecord |
<?xml version="1.0"?>
<qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>How to enable efficient threat hunting</title><creator>Tams, Roope</creator><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="yliopisto" lang="en">University of Jyväskylä</contributor><contributor type="yliopisto" lang="fi">Jyväskylän yliopisto</contributor><contributor type="oppiaine" lang="fi">Kyberturvallisuus</contributor><contributor type="oppiaine" lang="en">Cyber Security</contributor><available>2024-05-30T05:19:29Z</available><issued>2024</issued><type>Master's thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/95341</identifier><identifier type="urn">URN:NBN:fi:jyu-202405304104</identifier><language type="iso">eng</language><rights>In copyright</rights><rights type="copyright">© The Author(s)</rights><rights type="accesslevel">restrictedAccess</rights><rights type="url">https://rightsstatements.org/page/InC/1.0/</rights><rights type="accessrights" lang="fi">Tekijä ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyväskylän yliopiston kirjaston arkistotyösemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.</rights><rights type="accessrights" lang="en">The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyväskylä University Library (https://kirjasto.jyu.fi/en/workspaces/facilities/facilities#autotoc-item-autotoc-2).</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202405304104</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/95341/1/URN%3aNBN%3afi%3ajyu-202405304104.pdf" name="URN:NBN:fi:jyu-202405304104.pdf" type="application/pdf" length="1511262" sequence="1"/><recordID>123456789_95341</recordID></qualifieddc>
|
id |
jyx.123456789_95341
|
language |
eng
|
last_indexed |
2024-09-03T10:50:35Z
|
main_date |
2024-01-01T00:00:00Z
|
main_date_str |
2024
|
online_boolean |
1
|
online_urls_str_mv |
{"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/95341\/1\/URN%3aNBN%3afi%3ajyu-202405304104.pdf","text":"URN:NBN:fi:jyu-202405304104.pdf","source":"jyx","mediaType":"application\/pdf"}
|
publication_first_indexed |
2024-05-30T20:00:58Z
|
publishDate |
2024
|
record_format |
qdc
|
source_str_mv |
jyx
|
spellingShingle |
Tams, Roope
How to enable efficient threat hunting
|
subject_txtF |
Kyberturvallisuus
|
thumbnail |
https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_95341&index=0&size=large
|
title |
How to enable efficient threat hunting
|
title_full |
How to enable efficient threat hunting
|
title_fullStr |
How to enable efficient threat hunting
How to enable efficient threat hunting
|
title_full_unstemmed |
How to enable efficient threat hunting
How to enable efficient threat hunting
|
title_short |
How to enable efficient threat hunting
|
title_sort |
how to enable efficient threat hunting
|
title_txtP |
How to enable efficient threat hunting
|
url |
https://jyx.jyu.fi/handle/123456789/95341
http://www.urn.fi/URN:NBN:fi:jyu-202405304104
|
work_keys_str_mv |
AT tamsroope howtoenableefficientthreathunting
|