Search

Your search keyword '"tietoturva"' showing total 29 results

Search Constraints

Start Over You searched for: Descriptor "tietoturva" Remove constraint Descriptor: "tietoturva" Language undetermined Remove constraint Language: undetermined
29 results on '"tietoturva"'

Search Results

1. Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions

2. Enhancing the user authentication process with colour memory cues

3. APT Cyber-attack Modelling: Building a General Model

4. Citizens’ Cybersecurity Behavior: Some Major Challenges

5. Protection Motivation Theory in Information Systems Security Research

6. Examining the side effects of organizational Internet monitoring on employees

7. Towards a Secure DevOps Approach for Cyber-Physical Systems

8. HyperIO: A Hypervisor-Based Framework for Secure IO

9. Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools

10. Towards a Security Competence of Software Developers

11. Method Framework for Developing Enterprise Architecture Security Principles

12. Hypervisor-Based White Listing of Executables

13. Hypervisor-assisted dynamic malware analysis

14. Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach

15. Young People and the Dark Side of Social Media: Possible Threats to National Security

16. ISAdetect

17. Keeping secure to the end: a long-term perspective to understand employees’ consequence-delayed information security violation

18. Too many passwords? How understanding our memory can increase password memorability

19. Shall we follow? Impact of reputation concern on information security managers’ investment decisions

20. Hypervisor-assisted Atomic Memory Acquisition in Modern Systems

21. A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki

22. State of the Art Literature Review on Network Anomaly Detection

23. Can individuals’ neutralization techniques be overcome? A field experiment on password policy

24. On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

25. System for Executing Encrypted Java Programs

26. Cybersecurity Safeguards for the Automotive Emergency Response Vehicles

27. Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware

28. Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment

Catalog

Books, media, physical & digital resources