Suggested Topics within your search.
- tietoturva 81
- kyberturvallisuus 36
- cyber security 25
- data security 24
- verkkohyökkäykset 18
- cyber attacks 12
- information security 9
- safety and security 9
- turvallisuus 9
- koneoppiminen 8
- pääsynvalvonta 8
- salaus 8
- tietojärjestelmät 8
- esineiden internet 7
- käyttäytyminen 7
- päätöksenteko 7
- tietotekniikka 7
- information technology 6
- investoinnit 6
- ohjelmistokehitys 6
- pilvipalvelut 6
- software development 6
- tietokoneohjelmat 6
- tietoverkot 6
- Internet 5
- anomaly detection 5
- asenteet 5
- clustering 5
- haittaohjelmat 5
- hypervisor 5
-
1
On data mining applications in mobile networking and network security
Published 2014JYX-julkaisuarkisto / JYX Digital Archive
Doctoral dissertation -
2
Preventing reverse engineering of native and managed programs
Published 2015Linkki verkkoaineistoon
Doctoral dissertation -
3
Positioning services in different wireless networks : a development and security perspective
Published 2022JYX-julkaisuarkisto / JYX Digital Archive
Linkki verkkoaineistoon
Doctoral dissertation -
4
Applications of hypervisors in security
Published 2019JYX-julkaisuarkisto / JYX Digital Archive
Doctoral dissertation -
5
Transport layer DDoS attack types and mitigation methods in networks
Published 2015JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
6
Exploring determinants of different information security behaviors
Published 2016JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
7
The emergence of mobile electronic commerce : [enabling technologies and usability issues]
Published 1998Master's thesis -
8
-
9
-
10
-
11
-
12
Feature selection in anomaly-based network intrusion detection systems
Published 2010Master's thesis -
13
Detection of distributed denial-of-service attacks in encrypted network traffic
Published 2016JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
14
Case study of why information security investment fail?
Published 2015JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
15
Communication in the software vulnerability reporting process
Published 2003Get full text
Master's thesis -
16
-
17
-
18
Authorized authentication evaluation framework for constrained environments
Published 2016JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
19
-
20
Analysis and semantic description of role based access control models
Published 2004Master's thesis