Suggested Topics within your search.
- Internet of things 5
- cyber security
- esineiden internet
- kyberturvallisuus 5
- Vulnerabilities 2
- Amplification attack 1
- Arm 1
- Asset 1
- BERT 1
- Cloud 1
- Dark Web 1
- Denial-of-Service 1
- Exploit 1
- IP identification 1
- LSTM 1
- NLP 1
- Natural Language Processing 1
- Penetration testing 1
- Response size amplification 1
- SDHASH 1
- SSDEEP 1
- SSL termination proxy 1
- Security model 1
- Siamese network 1
- WAF 1
- binary file matching 1
- cloud services 1
- cyber attacks 1
- data protection 1
- data security 1
-
1
-
2
Architecture-independent matching of stripped binary code files using BERT and a Siamese neural network
Published 2020Get full text Get full textMaster's thesis -
3
RD Velho IoT Security model : secure technology, process and tools
Published 2019Get full text Get full textMaster's thesis -
4
A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
Published 2023Get full text Get full textMaster's thesis -
5
Hardening legacy IoT-devices by retrofitting security measures
Published 2019Get full text Get full textMaster's thesis