Suggested Topics within your search.
- esineiden internet
- Internet of things 3
- cyber security 2
- kyberturvallisuus 2
- pilvipalvelut 2
- tietoturva 2
- Access control 1
- Amplification attack 1
- Arm 1
- Authorized Authentication 1
- Bluetooth 1
- Cloud 1
- Constrained Environments 1
- Denial-of-Service 1
- Exploit 1
- Internet 1
- Internet of Things 1
- Penetration testing 1
- Response size amplification 1
- Security model 1
- UTAUT2 1
- Vulnerabilities 1
- Web Bluetooth API 1
- Web technologies 1
- computer programmes 1
- cyber attacks 1
- emerging technologies 1
- eudaimonic well-being 1
- internet of things 1
- legacy systems 1
-
1
Authorized authentication evaluation framework for constrained environments
Published 2016JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
2
Explaining organizational adoption of technology : the case of cloud platforms
Published 2015JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
3
RD Velho IoT Security model : secure technology, process and tools
Published 2019Get full text Get full textMaster's thesis -
4
-
5
A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
Published 2023Get full text Get full textMaster's thesis -
6
Explaining organizational adoption of technology : the case of cloud platforms
Published 2015Get full text Get full textMaster's thesis