Suggested Topics within your search.
- arviointimenetelmät 3
- Access control 2
- Authorized Authentication 2
- Cloud products 2
- Constrained Environments 2
- DSM-väline 2
- Enterprise Architecture (EA) 2
- IT Service Management (ITSM) 2
- Internet of Things 2
- Product lifecycle 2
- Product management 2
- elinkaari 2
- esineiden internet 2
- kokonaisarkkitehtuuri 2
- ohjelmistotuotanto 2
- pilvipalvelut 2
- rajoitetut ympäristöt 2
- sovellukset 2
- sovellusaluemallinnus 2
- todentaminen 2
- tuotekehitys 2
- tuotteistus 2
- ATAM 1
- GDPR 1
- GSM 1
- H.323 1
- ISPMA 1
- Java EE 1
- MITRE ATT&CK for ICS 1
- OT security 1
-
1
Evaluation of academic funding system by simulation
Published 2014JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
2
Authorized authentication evaluation framework for constrained environments
Published 2016JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
3
Information system supported project estimation and measurement
Published 2006Get full text
Master's thesis -
4
Cloud product capability assessment method
Published 2015JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
5
Quality evaluation of software architecture with application to OpenH.323 protocol
Published 2006JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
6
Evaluation of web-based implementation for O&M functionality in mobile core network
Published 2006Get full text
Master's thesis -
7
-
8
-
9
-
10
Evaluating the sensitivity of lightweight object detection models against adversarial perturbations
Published 2022Get full text Get full textMaster's thesis -
11
Best practices for and benefits from implementing ISPMA’s SPM framework
Published 2020Get full text Get full textMaster's thesis -
12
Framework for pedagogical learning analytics
Published 2018Get full text Get full textMaster's thesis -
13
Evaluation tool for assessing an organization’s OT security policy
Published 2024Get full text Get full textMaster's thesis -
14
-
15
Cloud product capability assessment method
Published 2015Get full text Get full textMaster's thesis -
16
Authorized authentication evaluation framework for constrained environments
Published 2016Get full text Get full textMaster's thesis -
17