Search

Your search keyword '"tietoturva"' showing total 26 results

Search Constraints

Start Over You searched for: Descriptor "tietoturva" Remove constraint Descriptor: "tietoturva" Topic computer Remove constraint Topic: computer
26 results on '"tietoturva"'

Search Results

1. Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2. Hypervisor-Based White Listing of Executables

3. Hypervisor-assisted dynamic malware analysis

4. Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach

5. Strategic leadership in cyber security, case Finland

6. Development of Network Security Education

7. Hypervisor-based Protection of Code

8. ISAdetect

9. Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

10. Hypervisor-assisted Atomic Memory Acquisition in Modern Systems

11. A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki

12. State of the Art Literature Review on Network Anomaly Detection

13. Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration

14. Stopping injection attacks with code and structured data

15. A Network-Based Framework for Mobile Threat Detection

16. DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

17. Anomaly detection approach to keystroke dynamics based user authentication

18. On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

19. Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

20. Lua Code: Security Overview and Practical Approaches to Static Analysis

21. System for Executing Encrypted Java Programs

22. Towards Automated Classification of Firmware Images and Identification of Embedded Devices

23. Cybersecurity Safeguards for the Automotive Emergency Response Vehicles

24. Security Assessment of a Distributed, Modbus-based Building Automation System

25. Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware

26. Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment

Catalog

Books, media, physical & digital resources