Suggested Topics within your search.
- tietoturva
- verkkohyökkäykset
- kyberturvallisuus 8
- cyber attacks 5
- cyber security 5
- data security 5
- palvelunestohyökkäys 4
- algoritmit 3
- anomaly detection 3
- intrusion detection 3
- klusterianalyysi 3
- salaus 3
- clustering (unsupervised) 2
- koneoppiminen 2
- machine learning 2
- monitorointi 2
- network security 2
- reaaliaikaisuus 2
- safety and security 2
- simulointi 2
- tiedonsiirto 2
- tietoliikenneverkot 2
- tietoverkot 2
- tunkeilijan havaitsemisjärjestelmät 2
- turvallisuus 2
- Android 1
- Linux 1
- Windows 1
- big data 1
- boards of directors 1
-
1
-
2
Transport layer DDoS attack types and mitigation methods in networks
Published 2015JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
3
Detection of distributed denial-of-service attacks in encrypted network traffic
Published 2016JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
4
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
Published 2015Linkki verkkoaineistoon
Doctoral dissertation -
5
Intrusion detection applications using knowledge discovery and data mining
Published 2014JYX-julkaisuarkisto / JYX Digital Archive
Doctoral dissertation -
6
Reporting cyber security to management and board of directors
Published 2022Get full text Get full textMaster's thesis -
7
The use of CVE -related databases in improving the cybersecurity of embedded systems
Published 2021Get full text Get full textMaster's thesis -
8
Digital signing process automation and optimization
Published 2020Get full text Get full textMaster's thesis -
9
Windows technical hardening against the most prevalent threats
Published 2023Get full text Get full textMaster's thesis -
10
Literature review of information security practice survey reports
Published 2018Get full text Get full textMaster's thesis -
11
Detection of distributed denial-of-service attacks in encrypted network traffic
Published 2016Get full text Get full textMaster's thesis -
12
Transport layer DDoS attack types and mitigation methods in networks
Published 2015Get full text Get full textMaster's thesis