Defended thesis cyber

Allikas: Kursused
Redaktsioon seisuga 18. veebruar 2019, kell 12:56 kasutajalt Siiri (arutelu | kaastöö) (→‎2018)
Mine navigeerimisribale Mine otsikasti

Defended thesis

2019

  • Demesa, Ephrem Implementation of a Hands-on Attack and Defense Lab on Insecure Direct Object References Supervisor: Ernits, Margus
  • Romulus, Mikk Security Testing Estonian Contactless Bank Cards Supervisor: Maennel, Olaf
  • Tšikul, Pavel Encrypted Data Identification by Information Entropy Fingerprinting Supervisor: Laptev, Pavel

2018

  • Silvia Väli, Analysis of Electron-based Applications to Identify XSS Flaws Escalating to Code Execution in Open-Source Applications. Supervisor: Olaf Manuel Maennel LINK
  • Tiiu Mamers, The Art and Science of Information Security Investments for Small Enterprises. Supervisor: Olaf Manuel Maennel LINK
  • Ahmed Ali Abdelrahim Ali Elazazy, HoneyProxy Implementation in Cloud Environment with Docker HoneyFarm. Supervisor: Anton Vedešin; Raimundas Matulevicius LINK
  • Karina Magdalena Filipczak, Testing the Security Awareness Using Open-Source Tools - Spear Phishing. Supervisor: Raimundas Matulevicius; Sten Mäses LINK
  • Ghada Zakaria Ahmed Rashad Mohamed, Detecting Social Spamming on Facebook Platform. Supervisor: Innar Liiv; Raimundas Matulevicius LINK
  • Tufail, Taimur, COMPARING THE NATIONAL CYBER SECURITY FRAMEWORK OF PAKISTAN WITH INDIA AND UNITED KINGDOM Supervisor: Bahsi, Hayretdin LINK
  • Tabuyo Benito, Raquel FORENSIC ANALYSIS OF A STEAM BASED ONLINE GAME Supervisor: Bahsi, Hayretdin LINK
  • Danny Lopez Murillo A BALANCED LAB FOR TEACHING ETHICAL HACKING TO UNDERGRADUATE AND GRADUATE STUDENTS Supervisor: Bahsi, Hayretdin [
  • Vahturov, Kim Using indicators of compromise to automate incident triage. Proof of concept. Supervisor: Lepik, Toomas ; Palkmets, Lauri LINK
  • Baum, Hindrek Detection of VLAN Hopping Attacks in LAN Environment Supervisor: Priisalu, Jaan LINK
  • Koha, Aleks IMPACT ASSESSMENT OF AN EU GDPR SELF-ASSESSMENT QUESTIONNAIRE ON ENTREPRENEURS Supervisor: Mäses, Sten; Baum, Anu LINK
  • Akbari, Amirhossein A NOVEL APPROACH FOR SECURING HTML5 CLIENT-SIDE DATABASE, INDEXEDDB Supervisor: Maennel, Olaf M. LINK
  • Luik, Artur The design and implementation of automated vulnerability application framework Supervisor: Tetlov, Tanel LINK
  • Rauschecker, Andres User-oriented privacy enhancements for web-browsers Supervisor: Maennel, Olaf LINK
  • Mucci, Daniele TED - The ELF Doctor. A container based tool to perform security risk assessment for ELF binaries Supervisor: Blumbergs, Bernhards LINK
  • Asadli Javid PROPOSING ACTION PLAN IN CYBER SECURITY CAPACITY BUILDING FOR AZERBAIJAN Supervisor: Tiia Somer ; Leyla Aliyeva LINK
  • Verma, Nishaant Comparative Analysis of Oniline Privacy and Security Concerns between Generation Y and Generation Z in North India: A Pilot Study Supervisor: Bahsi, Hayretdin; Teichmann, Mare LINK
  • Garcia-Granados, Fernando CYBERSECURITY KNOWLEDGE REQUIREMENTS FOR NON-IT STRATEGIC LEVEL DECISION MAKERS Supervisor: Bahsi, Hayretdin LINK
  • Saaliste, Romet ESTONIAN GOVERNMENT RELATED CHALLENGES IN PROTECTION OF PERSONAL DATA Supervisor: Maennel, Olaf Manuel LINK
  • Jääger, Mari Developing Records of processing Activities in a Small Enterprise Supervisor: Raspel, Priit LINK
  • Panarese, Stefano Nessuno: A friend-to-friend anonymous communication protocol Supervisor: Maennel, Olaf LINK
  • Hurttila, Simo FROM INFORMATION SECURITY TO CYBER SECURITY MANAGEMENT – ISO 27001 & 27032 APPROACH Supervisor: Kull, Andro LINK
  • Friberg, Even Langfeldt The Cyber-Insurance Market in Norway: An Empirical Study of the Supply-side and a Small Sample of the Maritime Demand-side Supervisor: Bahşi, Hayretdin; Franke, Ulrik LINK
  • Laks, Sille Basic cyber security awareness training in a paramilitary organization Supervisor: Mäses, Sten; Liutkevičius, Markko LINK
  • Guerra Manzanares, Alejandro APPLICATION OF FULL MACHINE LEARNING WORKFLOW FOR MALWARE DETECTION IN ANDROID ON THE BASIS OF SYSTEM CALLS AND PERMISSIONS Supervisor: Bahsi, Hayretdin; Nõmm, Sven LINK
  • Elliku, Andres SCALABLE COURSE ON CYBER ATTACK DETECTION Supervisor: Ernits, Margus LINK

2017

  • Jens Getreu, Forensic-Tool Development with Rust. Supervisor: Olaf Maennel LINK
  • Christian Ponti, Use of ICMPv6 in a scenario-based experiment for computer network exfiltration and infiltration operations. Supervisor: Bernhards Blumbergs LINK
  • Gvantsa Grigolia, Evaluation of data ownership solutions in remote storage. Supervisor: Ahto Buldas LINK
  • Kristjan Oja, Cyber Security Awareness For IT Students Through Practical Assignments. Supervisor: Sten Mäses LINK
  • Sander Arnus, Providing guaranteed log delivery and proof value of logs. Supervisor: Risto Vaarandi LINK
  • Bolaji Ayoola Ladokun, An Analytical Approach to Characterization of Targeted and Untargeted Attack in Critical Infrastructure Honeypot. Supervisor: Hayretdin Bahsi LINK
  • Seifollah Akbari, A New Method for the SYNful Knock Attack Implementation. Supervisor: Truls Ringkjob LINK
  • Safak Tarazan, GPS Spoofing/Jamming Resilient Mini UAV Implementation Strategy. Supervisor: Truls Ringkjob LINK
  • Danielle Morgan, Security of Loyalty Cards Used in Estonia. Supervisor: Rain Ottis, Arnis Parovš LINK
  • Christopher David Raastad, Euro 2.0 - Securing an Ethereum Crypto Fiat Currency System. Supervisor: Alex Norta LINK
  • Mobolarinwa Taofeek Balogun, Comparative Analysis of Industrial IoT and HealthCare System IoT for Cyberterrorism. Supervisor: Hayretdin Bahsi LINK
  • Chengxiang Wang, Classification of Black-Box Security Reductions and Oracle Separation Techniques. Supervisor: Ahto Buldas LINK
  • Celik Neslisah, Anomaly Detection Using Locked Shields Logs. Supervisor: Olaf   Maennel LINK
  • Sophio Sakhokia, Developing a Cyber Security Master Programme for Georgia. Supervisor: Tiia Sõmer LINK
  • Zaghum Awan, Analytical Comprehensive Approach to  Cyber Laundering and its Solutions. Supervisor: Tiia Sõmer LINK
  • Martin Jõgi, Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance. Supervisor: Raimundas Matulevicius; Truls Ringkjob LINK
  • Mohit Kinger, Enterprise Cloud Security Guidance and Strategies for Enterprises. Supervisor: Andro Kull LINK
  • Kaie Maennel, Improving and Measuring Learning at Cyber Defence Exercises. Supervisor: Liina Randmann; Raimundas Matulevicius LINK
  • Terézia Mézešová, Attack Path Difficulty - An Attack Graph-based Security Metric. Supervisor: Hayretdin Bahsi LINK
  • Stefanos Pappas, Investigation of JTAG and ISP Techniques for Forensic Procedures, Supervisor: Pavel Laptev LINK
  • Kaspar Prei, Measuring Personnel Cybersecurity Awareness Level Through Phishing Assessment. Supervisor: Olaf   Maennel; Bernhards Blumbergs

2016

  • Alexandria Elaine Farár, A Deceptive Methodology Towards Early Detection of Advanced Cyber Threats. Supervisor: Bahsi, Hayretdin; Blumbergs, Bernhards  LINK
  • Florian Gasteiger, R3AD - an Architecture to Include UAVs in National Airspace. Supervisor: Olaf Manuel Maennel LINK
  • Allyson Ivy Hauptman, Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises. Supervisor: Rain Ottis LINK
  • Luis Carlos Herrera Velasquez, A Comprehensive Instrument for Identifying Critical Information Infrastructure Services. Supervisor: Olaf Manuel Maennel LINK
  • Eve Naomi Hunter, A Comparative Analysis of Cybersecurity Guidelines and Standards for Nuclear Power Plants. Supervisor: Rain Ottis, Harry Kantola LINK
  • Rando Kulla, Migrating PDF Signing to New KSI Format. Supervisor: Jaan Priisalu; Ahto Truu LINK
  • Teet Laeks, Raising the Awareness of Cyber Security Based on Estonian Defence Forces. Supervisor: Tiia Sõmer; Danel Apse
  • Karl Kristjan Raik, Improving Web Attack Campaign Overview in Cyber Defense Exercises. Supervisor: Rain Ottis; Elar Lang LINK
  • Andres Sumin, Evaluation Method for Cyber Awareness Course. Supervisor: Sten mäses; Liina Randmann LINK
  • Ferenc Szalai, Does Cyber Security Exercise Information Sharing Work? Review and Analysis of Technical Cyber Security Exercises and Their Information Sharing. Supervisor: Olaf Manuel Maennel LINK
  • Kadri Tahsildoost, Usable Security of Two Factor Authentication Methods. Supervisor: Jaan Priisalu
  • Jaan Vahtre, Detection of Ransomware on Windows Operating Systems. Supervisor: Jaan Priisalu LINK
  • Sho Yano, Security Analysis on Healthcare IoT Project. Supervisor: Olaf Manuel Maennel LINK

2015

  • Rainer Aavik, Optimization of Information Technology Security Costs of Enterprise Estonia Based on ISKE and the Graded Security Model. Supervisor: Jüri Kivimaa
  • Olga Dalton, An Automated Framework for Securing iOS Applications. Supervisor: Roger Kerse LINK
  • Tiit Hallas, Logging Requirement Analysis and Specification for Development Based on Governmental Institutions of Estonia. Supervisor: Toomas Lepik LINK
  • Karl Kolk, An Empirical Comparison of Approaches for Security Requirements Elicitation. Supervisor: Raimundas Matulevicius LINK
  • Sergei Komarov, Choosing Open-Source Flow-Based Network Monitoring Solution. Supervisor: Risto Vaarandi
  • Ragnar Kreis, Smart Contracts and Digital Identities. Supervisor: Olaf Manuel Maennel
  • Aleksandra Kurbatova, Security of Medical Devices in Estonian Health Care Institutions. Supervisor: Truls Tuxen Ringkjob
  • Xiao Liu, Design and Testing an Malware Detection System for Android. Supervisor: Toomas Lepik
  • Mohamed Alaaeldin Ahmed Mohamed Ali, Analysis of Malware Protection Solutions in a Bring Your Own Device (BYOD) Environment. Supervisor: Truls Tuxen Ringkjob
  • Triin Muulmann, Information Security Management Learning Object for Vocational Schools. Supervisor: Rain Ottis; Silver Püvi
  • Sten Mäses, Evaluation Method for Human Aspects in Information Security. Supervisor: Rain Ottis; Aare Klooster LINK
  • Anti Räis, Hands-on Laboratory on Web Content Injection Attacks. Supervisor: Rain Ottis; Elar Lang LINK
  • Vladimeri Tskhakaia, IT Security Cost Optimization Model for ProVoiceHolding AB. Supervisor: Jüri Kivimaa
  • Sarbar Tursunova, Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks. Supervisor: Raimundas Matulevicius LINK
  • Meril Vaht, The Analysis and Design of a Privacy-Preserving Survey System. Supervisor: Dan Bogdanov LINK

2014

  • Mohammed Abulamddi, Developing Secure and Safe Systems with Knowledge Acquisition for Automated Specification. Supervisor: Raimundas Matulevicius LINK
  • Irakli Gagoshidze, Identification of Appropriate Standard for ISMS Implementation at Public Organiziation. Supervisor: Jüri Kivimaa
  • Erkko Isok, IT Security Suggestions for the Specific Healthcare Service Provider Company. Supervisor: Indrek Rokk
  • Martin Kiigemaa, Automated Security Testing Solution for Web Applications in Skype. Supervisor: Rain Ottis; Elar Lang
  • Markus Kont, Event Management and Active Defense Framework for Small Companies. Supervisor: Risto Vaarandi
  • Mai Kraft, Performance Analysis of Attacker Profiling in Quantitative Security Risk Assessment. Supervisor: Aleksandr Lenin
  • Ivo Kubjas, Set Reconciliation. Supervisor: Vitaly Skachek LINK
  • Piret Lattikas, Test Automation for Web Applications with Authentication. Supervisor: Andres Ojamaa
  • Erki Naumanis, Centrally Managed Network Traffic Generation for Cyber Security Exercises. Supervisor: Rain Ottis; Margus Ernits
  • Akeem Toyese Oyegoke, Awareness Program to Mitigate Social Engineering Attacks on the Elderly. Supervisor: Truls Tuxen Ringkjob
  • Dyan Permata Sari, Attacker Profiling in Quantitative Security Assessment. Supervisor: Ahto Buldas; Aleksandr Lenin
  • Anna Preobraženskaja, Development of Security Risk Measurement Model within Misuse Cases and BPMN. Supervisor: Raimundas Matulevicius LINK
  • Tiia Sõmer, Educational Computer Game for Cyber Security: Game Concept. Supervisor: Rain Ottis
  • Tanel Tetlov, Antivirus Evasion in the Context of Locked Shields 2014. Supervisor: Rain Ottis
  • Eerik Till, ICT Risk Assessment of Smart Electricity Meters. Supervisor: Jüri Vain; Kristjan Kuhi
  • Tanel Torn, Security Analysis of the Estonian I-Voting System Using Attack Tree Methodologies. Supervisor: Vahur Kotkas
  • Iuliia Tovstukha, Management of Security Risks in the Enterprise Architecture Using ArchiMate and Mal-activities. Supervisor: Raimundas Matulevicius LINK
  • Kazuaki Tsuchimoto, Detecting Malware by Machine Learning. Supervisor: Toomas Lepik
  • Kristjan Vask, Remotely Exploiting Estonian ID-Card Functionality Through Client Side Vulnerabilities. Supervisor: Tanel Tammet
  • Liivi Volt, Analysis of Vulnerabilities in Estonian Web Applications. Supervisor: Rain Ottis
  • Yauhen Yakimenka, Optimization of Parity-Check Matrices of LDPC Codes. Supervisor: Vitaly Skachek
  • Levan Zaalishvili, Information Security Management System Development Methodology on the Example of Tbilisi Transport Company. Supervisor: Paul Leis