Suggested Topics within your search.
- cyber attacks
- verkkohyökkäykset 15
- cyber security 12
- kyberturvallisuus 12
- data security 5
- tietoturva 5
- threats 4
- uhat 4
- safety and security 3
- turvallisuus 3
- information technology 2
- phishing 2
- verkkourkinta 2
- APT 1
- APT-ryhmät 1
- Active Directory 1
- Advanced Persistent Threat 1
- Amplification attack 1
- Android 1
- Denial-of-Service 1
- European Union 1
- Exploit 1
- Information Security 1
- Internet of things 1
- Linux 1
- NIS Directive 1
- Penetration testing 1
- Response size amplification 1
- SIEM 1
- Social Engineering 1
-
1
Machine learning in intrusion detection : topics from scientific literature
Published 2020Get full text Get full textMaster's thesis -
2
Digital signing process automation and optimization
Published 2020Get full text Get full textMaster's thesis -
3
Detecting cyber attacks in time : combining attack simulation with detection logic
Published 2021Get full text Get full textMaster's thesis -
4
A Quantitative Analysis of Vulnerabilities and Exploits in Home IoT Devices
Published 2023Get full text Get full textMaster's thesis -
5
-
6
Literature review of information security practice survey reports
Published 2018Get full text Get full textMaster's thesis -
7
Rising cyber threats targeting the banking sector
Published 2022Get full text Get full textBachelor's thesis -
8
From moonlight maze to solarwinds : how Russian APT groups operate?
Published 2023Get full text Get full textMaster's thesis -
9
Windows technical hardening against the most prevalent threats
Published 2023Get full text Get full textMaster's thesis -
10
Reporting cyber security to management and board of directors
Published 2022Get full text Get full textMaster's thesis -
11
How organizations can prepare for emerging threats from the dark web
Published 2022Get full text Get full textMaster's thesis -
12
The State of Phishing : An Analysis on The Indicators of Phishing Attacks
Published 2022Get full text Get full textMaster's thesis -
13
The use of CVE -related databases in improving the cybersecurity of embedded systems
Published 2021Get full text Get full textMaster's thesis -
14
-
15