Erinevus lehekülje "Defended thesis cyber" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
 
(ei näidata sama kasutaja 29 vahepealset redaktsiooni)
1. rida: 1. rida:
  
 
=== Defended thesis ===
 
=== Defended thesis ===
 +
 +
== 2019 ==
 +
 +
* Demesa, Ephrem Implementation of a Hands-on Attack and Defense Lab on Insecure Direct Object References  Supervisor: Ernits, Margus
 +
* Romulus, Mikk Security Testing Estonian Contactless Bank Cards  Supervisor: Maennel, Olaf
 +
* Tšikul, Pavel Encrypted Data Identification by Information Entropy Fingerprinting  Supervisor: Laptev, Pavel
  
 
== 2018 ==
 
== 2018 ==
 
+
* Silvia Väli, Analysis of Electron-based Applications to Identify XSS Flaws Escalating to Code Execution in Open-Source Applications. Supervisor: Olaf Manuel Maennel [https://digi.lib.ttu.ee/i/?9890 LINK]
 +
* Tiiu Mamers, The Art and Science of Information Security Investments for Small Enterprises. Supervisor: Olaf Manuel Maennel [https://digi.lib.ttu.ee/i/?9889 LINK]
 +
* Ahmed Ali Abdelrahim Ali Elazazy, HoneyProxy Implementation in Cloud Environment with Docker HoneyFarm. Supervisor: Anton Vedešin; Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=60622&year=2018 LINK]
 +
* Karina Magdalena Filipczak, Testing the Security Awareness Using Open-Source Tools - Spear Phishing. Supervisor: Raimundas Matulevicius; Sten Mäses [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=60626&year=2018 LINK]
 +
* Ghada Zakaria Ahmed Rashad Mohamed, Detecting Social Spamming on Facebook Platform. Supervisor: Innar Liiv; Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=60618&year=2018 LINK]
 +
* Tufail, Taimur, COMPARING THE NATIONAL CYBER SECURITY FRAMEWORK OF PAKISTAN WITH INDIA AND UNITED KINGDOM Supervisor: Bahsi, Hayretdin [https://digi.lib.ttu.ee/i/?10767 LINK]
 +
* Tabuyo Benito, Raquel FORENSIC ANALYSIS OF A STEAM BASED ONLINE GAME Supervisor: Bahsi, Hayretdin  [https://digi.lib.ttu.ee/i/?10768 LINK]
 +
* Danny Lopez Murillo A BALANCED LAB FOR TEACHING ETHICAL HACKING TO UNDERGRADUATE AND GRADUATE STUDENTS Supervisor: Bahsi, Hayretdin
 +
* Vahturov, Kim Using indicators of compromise to automate incident triage. Proof of concept. Supervisor: Lepik, Toomas ; Palkmets, Lauri [https://digi.lib.ttu.ee/i/?10769 LINK]
 +
* Baum, Hindrek Detection of VLAN Hopping Attacks in LAN Environment Supervisor: Priisalu, Jaan [https://digi.lib.ttu.ee/i/?10786 LINK]
 +
* Koha, Aleks IMPACT ASSESSMENT OF AN EU GDPR SELF-ASSESSMENT QUESTIONNAIRE ON ENTREPRENEURS Supervisor: Mäses, Sten; Baum, Anu [https://digi.lib.ttu.ee/i/?10777 LINK]
 +
* Akbari, Amirhossein A NOVEL APPROACH FOR SECURING HTML5 CLIENT-SIDE DATABASE, INDEXEDDB Supervisor: Maennel, Olaf M.  [https://digi.lib.ttu.ee/i/?10773  LINK]
 +
* Luik, Artur The design and implementation of automated vulnerability application framework Supervisor: Tetlov, Tanel [https://digi.lib.ttu.ee/i/?10775 LINK]
 +
* Rauschecker, Andres User-oriented privacy enhancements for web-browsers Supervisor: Maennel, Olaf [https://digi.lib.ttu.ee/i/?10774 LINK]
 +
* Mucci, Daniele TED - The ELF Doctor.  A container based tool to perform security risk assessment for ELF binaries Supervisor: Blumbergs, Bernhards  [https://digi.lib.ttu.ee/i/?10776  LINK]
 +
* Asadli Javid PROPOSING ACTION PLAN IN CYBER SECURITY CAPACITY BUILDING FOR AZERBAIJAN Supervisor: Tiia Somer ; Leyla Aliyeva [https://digi.lib.ttu.ee/i/?10782 LINK]
 +
* Verma, Nishaant Comparative Analysis of Oniline Privacy and Security Concerns between Generation Y and Generation Z in North India: A Pilot Study Supervisor: Bahsi, Hayretdin; Teichmann, Mare  [https://digi.lib.ttu.ee/i/?10784 LINK]
 +
* Garcia-Granados, Fernando CYBERSECURITY KNOWLEDGE REQUIREMENTS FOR NON-IT STRATEGIC LEVEL DECISION MAKERS Supervisor: Bahsi, Hayretdin  [https://digi.lib.ttu.ee/i/?10785  LINK]
 +
* Saaliste, Romet ESTONIAN GOVERNMENT RELATED CHALLENGES IN PROTECTION OF PERSONAL DATA Supervisor: Maennel, Olaf Manuel [https://digi.lib.ttu.ee/i/?10771 LINK]
 +
* Jääger, Mari Developing Records of processing Activities in a Small Enterprise Supervisor: Raspel, Priit [https://digi.lib.ttu.ee/i/?10778 LINK]
 +
* Panarese, Stefano Nessuno: A friend-to-friend anonymous communication protocol Supervisor: Maennel, Olaf  [https://digi.lib.ttu.ee/i/?10772 LINK]
 +
* Hurttila, Simo FROM INFORMATION SECURITY TO CYBER SECURITY MANAGEMENT – ISO 27001 & 27032 APPROACH Supervisor: Kull, Andro [https://digi.lib.ttu.ee/i/?10779 LINK]
 +
* Friberg, Even Langfeldt The Cyber-Insurance Market in Norway: An Empirical Study of the Supply-side and a Small Sample of the Maritime Demand-side Supervisor: Bahşi, Hayretdin;  Franke, Ulrik [https://digi.lib.ttu.ee/i/?10783 LINK]
 +
* Laks, Sille Basic cyber security awareness training in a paramilitary organization Supervisor: Mäses, Sten; Liutkevičius, Markko [https://digi.lib.ttu.ee/i/?10780  LINK]
 +
* Guerra Manzanares, Alejandro APPLICATION OF FULL MACHINE LEARNING WORKFLOW FOR MALWARE DETECTION IN ANDROID ON THE BASIS OF SYSTEM CALLS AND PERMISSIONS Supervisor: Bahsi, Hayretdin; Nõmm, Sven  [https://digi.lib.ttu.ee/i/?10770 LINK]
 +
* Elliku, Andres SCALABLE COURSE ON CYBER ATTACK DETECTION Supervisor: Ernits, Margus  [https://digi.lib.ttu.ee/i/?10781 LINK]
  
 
== 2017 ==
 
== 2017 ==
 +
* Jens Getreu, Forensic-Tool Development with Rust. Supervisor: Olaf Maennel [https://digi.lib.ttu.ee/i/?7680 LINK]
 +
* Christian Ponti, Use of ICMPv6 in a scenario-based experiment for computer network exfiltration and infiltration operations. Supervisor: Bernhards Blumbergs [https://digi.lib.ttu.ee/i/?7678 LINK]
 +
* Gvantsa Grigolia, Evaluation of data ownership solutions in remote storage. Supervisor: Ahto Buldas [https://digi.lib.ttu.ee/i/?7681 LINK]
 
* Kristjan Oja, Cyber Security Awareness For IT Students Through Practical Assignments. Supervisor: Sten Mäses [https://digi.lib.ttu.ee/i/?8454 LINK]
 
* Kristjan Oja, Cyber Security Awareness For IT Students Through Practical Assignments. Supervisor: Sten Mäses [https://digi.lib.ttu.ee/i/?8454 LINK]
 
* Sander Arnus, Providing guaranteed log delivery and proof value of logs. Supervisor: Risto Vaarandi [https://digi.lib.ttu.ee/i/?8455 LINK]
 
* Sander Arnus, Providing guaranteed log delivery and proof value of logs. Supervisor: Risto Vaarandi [https://digi.lib.ttu.ee/i/?8455 LINK]
 
* Bolaji Ayoola Ladokun, An Analytical Approach to Characterization of Targeted and Untargeted Attack in Critical Infrastructure Honeypot. Supervisor: Hayretdin Bahsi [https://digi.lib.ttu.ee/i/?8456 LINK]
 
* Bolaji Ayoola Ladokun, An Analytical Approach to Characterization of Targeted and Untargeted Attack in Critical Infrastructure Honeypot. Supervisor: Hayretdin Bahsi [https://digi.lib.ttu.ee/i/?8456 LINK]
* Iryna Bondar, LUDROID: Evaluation of Android Malware Detection Tools and Techniques and Development of a First Line of Defense For the User. Supervisor: Emin Caliskan [https://digi.lib.ttu.ee/i/?8457 LINK]
 
 
* Seifollah Akbari, A New Method for the SYNful Knock Attack Implementation. Supervisor: Truls Ringkjob [https://digi.lib.ttu.ee/i/?8458 LINK]
 
* Seifollah Akbari, A New Method for the SYNful Knock Attack Implementation. Supervisor: Truls Ringkjob [https://digi.lib.ttu.ee/i/?8458 LINK]
 
* Safak Tarazan, GPS Spoofing/Jamming Resilient Mini UAV Implementation Strategy. Supervisor: Truls Ringkjob [https://digi.lib.ttu.ee/i/?8459 LINK]
 
* Safak Tarazan, GPS Spoofing/Jamming Resilient Mini UAV Implementation Strategy. Supervisor: Truls Ringkjob [https://digi.lib.ttu.ee/i/?8459 LINK]
 
* Danielle Morgan, Security of Loyalty Cards Used in Estonia. Supervisor: Rain Ottis, Arnis Parovš [https://digi.lib.ttu.ee/i/?8452 LINK]
 
* Danielle Morgan, Security of Loyalty Cards Used in Estonia. Supervisor: Rain Ottis, Arnis Parovš [https://digi.lib.ttu.ee/i/?8452 LINK]
* Katrin Kukk, Mapping the Best Practices for Designing Multi-Level Cyber Security Exercises in Estonia. Supervisor: Rain Ottis [https://digi.lib.ttu.ee/i/?8453 LINK]
 
 
* Christopher David Raastad, Euro 2.0 - Securing an Ethereum Crypto Fiat Currency System. Supervisor: Alex Norta [https://digi.lib.ttu.ee/i/?8460 LINK]
 
* Christopher David Raastad, Euro 2.0 - Securing an Ethereum Crypto Fiat Currency System. Supervisor: Alex Norta [https://digi.lib.ttu.ee/i/?8460 LINK]
 
* Mobolarinwa Taofeek Balogun, Comparative Analysis of Industrial IoT and HealthCare System IoT for Cyberterrorism. Supervisor: Hayretdin Bahsi [https://digi.lib.ttu.ee/i/?8461 LINK]
 
* Mobolarinwa Taofeek Balogun, Comparative Analysis of Industrial IoT and HealthCare System IoT for Cyberterrorism. Supervisor: Hayretdin Bahsi [https://digi.lib.ttu.ee/i/?8461 LINK]
20. rida: 52. rida:
 
* Sophio Sakhokia, Developing a Cyber Security Master Programme for Georgia. Supervisor: Tiia Sõmer [https://digi.lib.ttu.ee/i/?8464 LINK]
 
* Sophio Sakhokia, Developing a Cyber Security Master Programme for Georgia. Supervisor: Tiia Sõmer [https://digi.lib.ttu.ee/i/?8464 LINK]
 
* Zaghum Awan, Analytical Comprehensive Approach to  Cyber Laundering and its Solutions. Supervisor: Tiia Sõmer [https://digi.lib.ttu.ee/i/?8465 LINK]
 
* Zaghum Awan, Analytical Comprehensive Approach to  Cyber Laundering and its Solutions. Supervisor: Tiia Sõmer [https://digi.lib.ttu.ee/i/?8465 LINK]
 +
* Martin Jõgi, Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance. Supervisor: Raimundas Matulevicius; Truls Ringkjob [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=58341&year=2017 LINK]
 +
* Mohit Kinger, Enterprise Cloud Security Guidance and Strategies for Enterprises. Supervisor: Andro Kull [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=56920&year=2017 LINK]
 +
* Kaie Maennel, Improving and Measuring Learning at Cyber Defence Exercises. Supervisor: Liina Randmann; Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=58410&year=2017 LINK]
 +
* Terézia Mézešová, Attack Path Difficulty - An Attack Graph-based Security Metric. Supervisor: Hayretdin Bahsi [https://digi.lib.ttu.ee/i/?7679 LINK]
 +
* Stefanos Pappas, Investigation of JTAG and ISP Techniques for Forensic Procedures, Supervisor: Pavel Laptev [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=58378&year=2017 LINK]
 +
* Kaspar Prei, Measuring Personnel Cybersecurity Awareness Level Through Phishing Assessment. Supervisor: Olaf   Maennel; Bernhards Blumbergs
  
 
== 2016 ==
 
== 2016 ==
 
*  Alexandria Elaine Farár, A Deceptive Methodology Towards Early Detection of Advanced Cyber Threats. Supervisor: Bahsi, Hayretdin; Blumbergs, Bernhards  [https://digi.lib.ttu.ee/i/?7123 LINK]
 
*  Alexandria Elaine Farár, A Deceptive Methodology Towards Early Detection of Advanced Cyber Threats. Supervisor: Bahsi, Hayretdin; Blumbergs, Bernhards  [https://digi.lib.ttu.ee/i/?7123 LINK]
 
* Florian Gasteiger, R3AD - an Architecture to Include UAVs in National Airspace. Supervisor: Olaf Manuel Maennel [https://digi.lib.ttu.ee/i/?7117 LINK]
 
* Florian Gasteiger, R3AD - an Architecture to Include UAVs in National Airspace. Supervisor: Olaf Manuel Maennel [https://digi.lib.ttu.ee/i/?7117 LINK]
* Allyson Ivy Hauptman, Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises. Supervisor: Rain Ottis
+
* Allyson Ivy Hauptman, Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises. Supervisor: Rain Ottis [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=54201&year=2016 LINK]
* Luis Carlos Herrera Velasquez, A Comprehensive Instrument for Identifying Critical Information Infrastructure Services. Supervisor: Olaf Manuel Maennel
+
* Luis Carlos Herrera Velasquez, A Comprehensive Instrument for Identifying Critical Information Infrastructure Services. Supervisor: Olaf Manuel Maennel [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=54261&year=2016 LINK]
 
* Eve Naomi Hunter, A Comparative Analysis of Cybersecurity Guidelines and Standards for Nuclear Power Plants. Supervisor: Rain Ottis, Harry Kantola [https://digi.lib.ttu.ee/i/?7113 LINK]
 
* Eve Naomi Hunter, A Comparative Analysis of Cybersecurity Guidelines and Standards for Nuclear Power Plants. Supervisor: Rain Ottis, Harry Kantola [https://digi.lib.ttu.ee/i/?7113 LINK]
 
* Rando Kulla, Migrating PDF Signing to New KSI Format. Supervisor: Jaan Priisalu; Ahto Truu [https://digi.lib.ttu.ee/i/?7119 LINK]
 
* Rando Kulla, Migrating PDF Signing to New KSI Format. Supervisor: Jaan Priisalu; Ahto Truu [https://digi.lib.ttu.ee/i/?7119 LINK]
 
* Teet Laeks, Raising the Awareness of Cyber Security Based on Estonian Defence Forces. Supervisor: Tiia Sõmer; Danel Apse
 
* Teet Laeks, Raising the Awareness of Cyber Security Based on Estonian Defence Forces. Supervisor: Tiia Sõmer; Danel Apse
* Kevin Kamugisha Lwakatare, Understanding And Defending Against Social Engineering Attacks. Supervisor: Anton Vedešin [https://digi.lib.ttu.ee/i/?7127 LINK]
 
 
* Karl Kristjan Raik, Improving Web Attack Campaign Overview in Cyber Defense Exercises. Supervisor: Rain Ottis; Elar Lang [https://digi.lib.ttu.ee/i/?7112 LINK]
 
* Karl Kristjan Raik, Improving Web Attack Campaign Overview in Cyber Defense Exercises. Supervisor: Rain Ottis; Elar Lang [https://digi.lib.ttu.ee/i/?7112 LINK]
* Juan Manuel Rodríguez López, Security Risk Assessment to the Use of Digital Charting in Colombia. Supervisor: Alexander Horst Norta [https://digi.lib.ttu.ee/i/?7116 LINK]
 
 
* Andres Sumin, Evaluation Method for Cyber Awareness Course. Supervisor: Sten mäses; Liina Randmann [https://digi.lib.ttu.ee/i/?7121 LINK]
 
* Andres Sumin, Evaluation Method for Cyber Awareness Course. Supervisor: Sten mäses; Liina Randmann [https://digi.lib.ttu.ee/i/?7121 LINK]
 
* Ferenc Szalai, Does Cyber Security Exercise Information Sharing Work? Review and Analysis of Technical Cyber Security Exercises and Their Information Sharing. Supervisor: Olaf Manuel Maennel [https://digi.lib.ttu.ee/i/?7110 LINK]
 
* Ferenc Szalai, Does Cyber Security Exercise Information Sharing Work? Review and Analysis of Technical Cyber Security Exercises and Their Information Sharing. Supervisor: Olaf Manuel Maennel [https://digi.lib.ttu.ee/i/?7110 LINK]
39. rida: 75. rida:
  
 
== 2015 ==
 
== 2015 ==
 
+
* Rainer Aavik, Optimization of Information Technology Security Costs of Enterprise Estonia Based on ISKE and the Graded Security Model. Supervisor: Jüri Kivimaa
 +
* Olga Dalton, An Automated Framework for Securing iOS Applications. Supervisor: Roger Kerse [https://digi.lib.ttu.ee/i/?3583 LINK]
 +
* Tiit Hallas, Logging Requirement Analysis and Specification for Development Based on Governmental Institutions of Estonia. Supervisor: Toomas Lepik [https://digi.lib.ttu.ee/i/?1926 LINK]
 +
* Karl Kolk, An Empirical Comparison of Approaches for Security Requirements Elicitation. Supervisor: Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=45571&year=2015 LINK]
 +
* Sergei Komarov, Choosing Open-Source Flow-Based Network Monitoring Solution. Supervisor: Risto Vaarandi
 +
* Ragnar Kreis, Smart Contracts and Digital Identities. Supervisor: Olaf Manuel Maennel
 +
* Aleksandra Kurbatova, Security of Medical Devices in Estonian Health Care Institutions. Supervisor: Truls Tuxen Ringkjob
 +
* Xiao Liu, Design and Testing an Malware Detection System for Android. Supervisor: Toomas Lepik
 +
* Mohamed Alaaeldin Ahmed Mohamed Ali, Analysis of Malware Protection Solutions in a Bring Your Own Device (BYOD) Environment. Supervisor: Truls Tuxen Ringkjob
 +
* Triin Muulmann, Information Security Management Learning Object for Vocational Schools. Supervisor: Rain Ottis; Silver Püvi
 +
* Sten Mäses, Evaluation Method for Human Aspects in Information Security. Supervisor: Rain Ottis; Aare Klooster [https://digi.lib.ttu.ee/i/?3582 LINK]
 +
* Anti Räis, Hands-on Laboratory on Web Content Injection Attacks. Supervisor: Rain Ottis; Elar Lang [https://digi.lib.ttu.ee/i/?3584 LINK]
 +
* Vladimeri Tskhakaia, IT Security Cost Optimization Model for ProVoiceHolding AB. Supervisor: Jüri Kivimaa
 +
* Sarbar Tursunova, Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks. Supervisor: Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=46981&year=2015 LINK]
 +
* Meril Vaht, The Analysis and Design of a Privacy-Preserving Survey System. Supervisor: Dan Bogdanov [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=46921&year=2015 LINK]
  
 
== 2014 ==
 
== 2014 ==
* Mohammed Abulamddi, Developing Secure and Safe Systems with Knowledge Acquisition for Automated Specification. Supervisor: Raimundas Matulevicius
+
* Mohammed Abulamddi, Developing Secure and Safe Systems with Knowledge Acquisition for Automated Specification. Supervisor: Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=41311&year=2014 LINK]
 
* Irakli Gagoshidze, Identification of Appropriate Standard for ISMS Implementation at Public Organiziation. Supervisor: Jüri Kivimaa
 
* Irakli Gagoshidze, Identification of Appropriate Standard for ISMS Implementation at Public Organiziation. Supervisor: Jüri Kivimaa
* Christopher Helbig, An Experience Report of Eliciting Security Requirements from Business Processes. Supervisor: Raimundas Matulevicius
 
 
* Erkko Isok, IT Security Suggestions for the Specific Healthcare Service Provider Company. Supervisor: Indrek Rokk
 
* Erkko Isok, IT Security Suggestions for the Specific Healthcare Service Provider Company. Supervisor: Indrek Rokk
 
* Martin Kiigemaa, Automated Security Testing Solution for Web Applications in Skype. Supervisor: Rain Ottis; Elar Lang
 
* Martin Kiigemaa, Automated Security Testing Solution for Web Applications in Skype. Supervisor: Rain Ottis; Elar Lang
 
* Markus Kont, Event Management and Active Defense Framework for Small Companies. Supervisor: Risto Vaarandi
 
* Markus Kont, Event Management and Active Defense Framework for Small Companies. Supervisor: Risto Vaarandi
 
* Mai Kraft, Performance Analysis of Attacker Profiling in Quantitative Security Risk Assessment. Supervisor: Aleksandr Lenin
 
* Mai Kraft, Performance Analysis of Attacker Profiling in Quantitative Security Risk Assessment. Supervisor: Aleksandr Lenin
* Ivo Kubjas, Set Reconciliation. Supervisor: Vitaly Skachek
+
* Ivo Kubjas, Set Reconciliation. Supervisor: Vitaly Skachek [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=41471&year=2014 LINK]
 
* Piret Lattikas, Test Automation for Web Applications with Authentication. Supervisor: Andres Ojamaa
 
* Piret Lattikas, Test Automation for Web Applications with Authentication. Supervisor: Andres Ojamaa
 
* Erki Naumanis, Centrally Managed Network Traffic Generation for Cyber Security Exercises. Supervisor: Rain Ottis; Margus Ernits
 
* Erki Naumanis, Centrally Managed Network Traffic Generation for Cyber Security Exercises. Supervisor: Rain Ottis; Margus Ernits
 
* Akeem Toyese Oyegoke, Awareness Program to Mitigate Social Engineering Attacks on the Elderly. Supervisor: Truls Tuxen Ringkjob
 
* Akeem Toyese Oyegoke, Awareness Program to Mitigate Social Engineering Attacks on the Elderly. Supervisor: Truls Tuxen Ringkjob
 
* Dyan Permata Sari, Attacker Profiling in Quantitative Security Assessment. Supervisor: Ahto Buldas;  Aleksandr Lenin
 
* Dyan Permata Sari, Attacker Profiling in Quantitative Security Assessment. Supervisor: Ahto Buldas;  Aleksandr Lenin
* Anna Preobraženskaja, Development of Security Risk Measurement Model within Misuse Cases and BPMN. Supervisor: Raimundas Matulevicius
+
* Anna Preobraženskaja, Development of Security Risk Measurement Model within Misuse Cases and BPMN. Supervisor: Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=41331&year=2014 LINK]
 
* Tiia Sõmer, Educational Computer Game for Cyber Security: Game Concept. Supervisor: Rain Ottis
 
* Tiia Sõmer, Educational Computer Game for Cyber Security: Game Concept. Supervisor: Rain Ottis
 
* Tanel Tetlov, Antivirus Evasion in the Context of Locked Shields 2014. Supervisor: Rain Ottis
 
* Tanel Tetlov, Antivirus Evasion in the Context of Locked Shields 2014. Supervisor: Rain Ottis
 
* Eerik Till, ICT Risk Assessment of Smart Electricity Meters. Supervisor: Jüri Vain; Kristjan Kuhi
 
* Eerik Till, ICT Risk Assessment of Smart Electricity Meters. Supervisor: Jüri Vain; Kristjan Kuhi
 
* Tanel Torn, Security Analysis of the Estonian I-Voting System Using Attack Tree Methodologies. Supervisor: Vahur Kotkas
 
* Tanel Torn, Security Analysis of the Estonian I-Voting System Using Attack Tree Methodologies. Supervisor: Vahur Kotkas
* Iuliia Tovstukha, Management of Security Risks in the Enterprise Architecture Using ArchiMate and Mal-activities. Supervisor: Raimundas Matulevicius
+
* Iuliia Tovstukha, Management of Security Risks in the Enterprise Architecture Using ArchiMate and Mal-activities. Supervisor: Raimundas Matulevicius [https://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=41461&year=2014 LINK]
 
* Kazuaki Tsuchimoto, Detecting Malware by Machine Learning. Supervisor: Toomas Lepik
 
* Kazuaki Tsuchimoto, Detecting Malware by Machine Learning. Supervisor: Toomas Lepik
 
* Kristjan Vask, Remotely Exploiting Estonian ID-Card Functionality Through Client Side Vulnerabilities. Supervisor: Tanel Tammet
 
* Kristjan Vask, Remotely Exploiting Estonian ID-Card Functionality Through Client Side Vulnerabilities. Supervisor: Tanel Tammet

Viimane redaktsioon: 18. veebruar 2019, kell 12:57

Defended thesis

2019

  • Demesa, Ephrem Implementation of a Hands-on Attack and Defense Lab on Insecure Direct Object References Supervisor: Ernits, Margus
  • Romulus, Mikk Security Testing Estonian Contactless Bank Cards Supervisor: Maennel, Olaf
  • Tšikul, Pavel Encrypted Data Identification by Information Entropy Fingerprinting Supervisor: Laptev, Pavel

2018

  • Silvia Väli, Analysis of Electron-based Applications to Identify XSS Flaws Escalating to Code Execution in Open-Source Applications. Supervisor: Olaf Manuel Maennel LINK
  • Tiiu Mamers, The Art and Science of Information Security Investments for Small Enterprises. Supervisor: Olaf Manuel Maennel LINK
  • Ahmed Ali Abdelrahim Ali Elazazy, HoneyProxy Implementation in Cloud Environment with Docker HoneyFarm. Supervisor: Anton Vedešin; Raimundas Matulevicius LINK
  • Karina Magdalena Filipczak, Testing the Security Awareness Using Open-Source Tools - Spear Phishing. Supervisor: Raimundas Matulevicius; Sten Mäses LINK
  • Ghada Zakaria Ahmed Rashad Mohamed, Detecting Social Spamming on Facebook Platform. Supervisor: Innar Liiv; Raimundas Matulevicius LINK
  • Tufail, Taimur, COMPARING THE NATIONAL CYBER SECURITY FRAMEWORK OF PAKISTAN WITH INDIA AND UNITED KINGDOM Supervisor: Bahsi, Hayretdin LINK
  • Tabuyo Benito, Raquel FORENSIC ANALYSIS OF A STEAM BASED ONLINE GAME Supervisor: Bahsi, Hayretdin LINK
  • Danny Lopez Murillo A BALANCED LAB FOR TEACHING ETHICAL HACKING TO UNDERGRADUATE AND GRADUATE STUDENTS Supervisor: Bahsi, Hayretdin
  • Vahturov, Kim Using indicators of compromise to automate incident triage. Proof of concept. Supervisor: Lepik, Toomas ; Palkmets, Lauri LINK
  • Baum, Hindrek Detection of VLAN Hopping Attacks in LAN Environment Supervisor: Priisalu, Jaan LINK
  • Koha, Aleks IMPACT ASSESSMENT OF AN EU GDPR SELF-ASSESSMENT QUESTIONNAIRE ON ENTREPRENEURS Supervisor: Mäses, Sten; Baum, Anu LINK
  • Akbari, Amirhossein A NOVEL APPROACH FOR SECURING HTML5 CLIENT-SIDE DATABASE, INDEXEDDB Supervisor: Maennel, Olaf M. LINK
  • Luik, Artur The design and implementation of automated vulnerability application framework Supervisor: Tetlov, Tanel LINK
  • Rauschecker, Andres User-oriented privacy enhancements for web-browsers Supervisor: Maennel, Olaf LINK
  • Mucci, Daniele TED - The ELF Doctor. A container based tool to perform security risk assessment for ELF binaries Supervisor: Blumbergs, Bernhards LINK
  • Asadli Javid PROPOSING ACTION PLAN IN CYBER SECURITY CAPACITY BUILDING FOR AZERBAIJAN Supervisor: Tiia Somer ; Leyla Aliyeva LINK
  • Verma, Nishaant Comparative Analysis of Oniline Privacy and Security Concerns between Generation Y and Generation Z in North India: A Pilot Study Supervisor: Bahsi, Hayretdin; Teichmann, Mare LINK
  • Garcia-Granados, Fernando CYBERSECURITY KNOWLEDGE REQUIREMENTS FOR NON-IT STRATEGIC LEVEL DECISION MAKERS Supervisor: Bahsi, Hayretdin LINK
  • Saaliste, Romet ESTONIAN GOVERNMENT RELATED CHALLENGES IN PROTECTION OF PERSONAL DATA Supervisor: Maennel, Olaf Manuel LINK
  • Jääger, Mari Developing Records of processing Activities in a Small Enterprise Supervisor: Raspel, Priit LINK
  • Panarese, Stefano Nessuno: A friend-to-friend anonymous communication protocol Supervisor: Maennel, Olaf LINK
  • Hurttila, Simo FROM INFORMATION SECURITY TO CYBER SECURITY MANAGEMENT – ISO 27001 & 27032 APPROACH Supervisor: Kull, Andro LINK
  • Friberg, Even Langfeldt The Cyber-Insurance Market in Norway: An Empirical Study of the Supply-side and a Small Sample of the Maritime Demand-side Supervisor: Bahşi, Hayretdin; Franke, Ulrik LINK
  • Laks, Sille Basic cyber security awareness training in a paramilitary organization Supervisor: Mäses, Sten; Liutkevičius, Markko LINK
  • Guerra Manzanares, Alejandro APPLICATION OF FULL MACHINE LEARNING WORKFLOW FOR MALWARE DETECTION IN ANDROID ON THE BASIS OF SYSTEM CALLS AND PERMISSIONS Supervisor: Bahsi, Hayretdin; Nõmm, Sven LINK
  • Elliku, Andres SCALABLE COURSE ON CYBER ATTACK DETECTION Supervisor: Ernits, Margus LINK

2017

  • Jens Getreu, Forensic-Tool Development with Rust. Supervisor: Olaf Maennel LINK
  • Christian Ponti, Use of ICMPv6 in a scenario-based experiment for computer network exfiltration and infiltration operations. Supervisor: Bernhards Blumbergs LINK
  • Gvantsa Grigolia, Evaluation of data ownership solutions in remote storage. Supervisor: Ahto Buldas LINK
  • Kristjan Oja, Cyber Security Awareness For IT Students Through Practical Assignments. Supervisor: Sten Mäses LINK
  • Sander Arnus, Providing guaranteed log delivery and proof value of logs. Supervisor: Risto Vaarandi LINK
  • Bolaji Ayoola Ladokun, An Analytical Approach to Characterization of Targeted and Untargeted Attack in Critical Infrastructure Honeypot. Supervisor: Hayretdin Bahsi LINK
  • Seifollah Akbari, A New Method for the SYNful Knock Attack Implementation. Supervisor: Truls Ringkjob LINK
  • Safak Tarazan, GPS Spoofing/Jamming Resilient Mini UAV Implementation Strategy. Supervisor: Truls Ringkjob LINK
  • Danielle Morgan, Security of Loyalty Cards Used in Estonia. Supervisor: Rain Ottis, Arnis Parovš LINK
  • Christopher David Raastad, Euro 2.0 - Securing an Ethereum Crypto Fiat Currency System. Supervisor: Alex Norta LINK
  • Mobolarinwa Taofeek Balogun, Comparative Analysis of Industrial IoT and HealthCare System IoT for Cyberterrorism. Supervisor: Hayretdin Bahsi LINK
  • Chengxiang Wang, Classification of Black-Box Security Reductions and Oracle Separation Techniques. Supervisor: Ahto Buldas LINK
  • Celik Neslisah, Anomaly Detection Using Locked Shields Logs. Supervisor: Olaf   Maennel LINK
  • Sophio Sakhokia, Developing a Cyber Security Master Programme for Georgia. Supervisor: Tiia Sõmer LINK
  • Zaghum Awan, Analytical Comprehensive Approach to  Cyber Laundering and its Solutions. Supervisor: Tiia Sõmer LINK
  • Martin Jõgi, Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance. Supervisor: Raimundas Matulevicius; Truls Ringkjob LINK
  • Mohit Kinger, Enterprise Cloud Security Guidance and Strategies for Enterprises. Supervisor: Andro Kull LINK
  • Kaie Maennel, Improving and Measuring Learning at Cyber Defence Exercises. Supervisor: Liina Randmann; Raimundas Matulevicius LINK
  • Terézia Mézešová, Attack Path Difficulty - An Attack Graph-based Security Metric. Supervisor: Hayretdin Bahsi LINK
  • Stefanos Pappas, Investigation of JTAG and ISP Techniques for Forensic Procedures, Supervisor: Pavel Laptev LINK
  • Kaspar Prei, Measuring Personnel Cybersecurity Awareness Level Through Phishing Assessment. Supervisor: Olaf   Maennel; Bernhards Blumbergs

2016

  • Alexandria Elaine Farár, A Deceptive Methodology Towards Early Detection of Advanced Cyber Threats. Supervisor: Bahsi, Hayretdin; Blumbergs, Bernhards  LINK
  • Florian Gasteiger, R3AD - an Architecture to Include UAVs in National Airspace. Supervisor: Olaf Manuel Maennel LINK
  • Allyson Ivy Hauptman, Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises. Supervisor: Rain Ottis LINK
  • Luis Carlos Herrera Velasquez, A Comprehensive Instrument for Identifying Critical Information Infrastructure Services. Supervisor: Olaf Manuel Maennel LINK
  • Eve Naomi Hunter, A Comparative Analysis of Cybersecurity Guidelines and Standards for Nuclear Power Plants. Supervisor: Rain Ottis, Harry Kantola LINK
  • Rando Kulla, Migrating PDF Signing to New KSI Format. Supervisor: Jaan Priisalu; Ahto Truu LINK
  • Teet Laeks, Raising the Awareness of Cyber Security Based on Estonian Defence Forces. Supervisor: Tiia Sõmer; Danel Apse
  • Karl Kristjan Raik, Improving Web Attack Campaign Overview in Cyber Defense Exercises. Supervisor: Rain Ottis; Elar Lang LINK
  • Andres Sumin, Evaluation Method for Cyber Awareness Course. Supervisor: Sten mäses; Liina Randmann LINK
  • Ferenc Szalai, Does Cyber Security Exercise Information Sharing Work? Review and Analysis of Technical Cyber Security Exercises and Their Information Sharing. Supervisor: Olaf Manuel Maennel LINK
  • Kadri Tahsildoost, Usable Security of Two Factor Authentication Methods. Supervisor: Jaan Priisalu
  • Jaan Vahtre, Detection of Ransomware on Windows Operating Systems. Supervisor: Jaan Priisalu LINK
  • Sho Yano, Security Analysis on Healthcare IoT Project. Supervisor: Olaf Manuel Maennel LINK

2015

  • Rainer Aavik, Optimization of Information Technology Security Costs of Enterprise Estonia Based on ISKE and the Graded Security Model. Supervisor: Jüri Kivimaa
  • Olga Dalton, An Automated Framework for Securing iOS Applications. Supervisor: Roger Kerse LINK
  • Tiit Hallas, Logging Requirement Analysis and Specification for Development Based on Governmental Institutions of Estonia. Supervisor: Toomas Lepik LINK
  • Karl Kolk, An Empirical Comparison of Approaches for Security Requirements Elicitation. Supervisor: Raimundas Matulevicius LINK
  • Sergei Komarov, Choosing Open-Source Flow-Based Network Monitoring Solution. Supervisor: Risto Vaarandi
  • Ragnar Kreis, Smart Contracts and Digital Identities. Supervisor: Olaf Manuel Maennel
  • Aleksandra Kurbatova, Security of Medical Devices in Estonian Health Care Institutions. Supervisor: Truls Tuxen Ringkjob
  • Xiao Liu, Design and Testing an Malware Detection System for Android. Supervisor: Toomas Lepik
  • Mohamed Alaaeldin Ahmed Mohamed Ali, Analysis of Malware Protection Solutions in a Bring Your Own Device (BYOD) Environment. Supervisor: Truls Tuxen Ringkjob
  • Triin Muulmann, Information Security Management Learning Object for Vocational Schools. Supervisor: Rain Ottis; Silver Püvi
  • Sten Mäses, Evaluation Method for Human Aspects in Information Security. Supervisor: Rain Ottis; Aare Klooster LINK
  • Anti Räis, Hands-on Laboratory on Web Content Injection Attacks. Supervisor: Rain Ottis; Elar Lang LINK
  • Vladimeri Tskhakaia, IT Security Cost Optimization Model for ProVoiceHolding AB. Supervisor: Jüri Kivimaa
  • Sarbar Tursunova, Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks. Supervisor: Raimundas Matulevicius LINK
  • Meril Vaht, The Analysis and Design of a Privacy-Preserving Survey System. Supervisor: Dan Bogdanov LINK

2014

  • Mohammed Abulamddi, Developing Secure and Safe Systems with Knowledge Acquisition for Automated Specification. Supervisor: Raimundas Matulevicius LINK
  • Irakli Gagoshidze, Identification of Appropriate Standard for ISMS Implementation at Public Organiziation. Supervisor: Jüri Kivimaa
  • Erkko Isok, IT Security Suggestions for the Specific Healthcare Service Provider Company. Supervisor: Indrek Rokk
  • Martin Kiigemaa, Automated Security Testing Solution for Web Applications in Skype. Supervisor: Rain Ottis; Elar Lang
  • Markus Kont, Event Management and Active Defense Framework for Small Companies. Supervisor: Risto Vaarandi
  • Mai Kraft, Performance Analysis of Attacker Profiling in Quantitative Security Risk Assessment. Supervisor: Aleksandr Lenin
  • Ivo Kubjas, Set Reconciliation. Supervisor: Vitaly Skachek LINK
  • Piret Lattikas, Test Automation for Web Applications with Authentication. Supervisor: Andres Ojamaa
  • Erki Naumanis, Centrally Managed Network Traffic Generation for Cyber Security Exercises. Supervisor: Rain Ottis; Margus Ernits
  • Akeem Toyese Oyegoke, Awareness Program to Mitigate Social Engineering Attacks on the Elderly. Supervisor: Truls Tuxen Ringkjob
  • Dyan Permata Sari, Attacker Profiling in Quantitative Security Assessment. Supervisor: Ahto Buldas; Aleksandr Lenin
  • Anna Preobraženskaja, Development of Security Risk Measurement Model within Misuse Cases and BPMN. Supervisor: Raimundas Matulevicius LINK
  • Tiia Sõmer, Educational Computer Game for Cyber Security: Game Concept. Supervisor: Rain Ottis
  • Tanel Tetlov, Antivirus Evasion in the Context of Locked Shields 2014. Supervisor: Rain Ottis
  • Eerik Till, ICT Risk Assessment of Smart Electricity Meters. Supervisor: Jüri Vain; Kristjan Kuhi
  • Tanel Torn, Security Analysis of the Estonian I-Voting System Using Attack Tree Methodologies. Supervisor: Vahur Kotkas
  • Iuliia Tovstukha, Management of Security Risks in the Enterprise Architecture Using ArchiMate and Mal-activities. Supervisor: Raimundas Matulevicius LINK
  • Kazuaki Tsuchimoto, Detecting Malware by Machine Learning. Supervisor: Toomas Lepik
  • Kristjan Vask, Remotely Exploiting Estonian ID-Card Functionality Through Client Side Vulnerabilities. Supervisor: Tanel Tammet
  • Liivi Volt, Analysis of Vulnerabilities in Estonian Web Applications. Supervisor: Rain Ottis
  • Yauhen Yakimenka, Optimization of Parity-Check Matrices of LDPC Codes. Supervisor: Vitaly Skachek
  • Levan Zaalishvili, Information Security Management System Development Methodology on the Example of Tbilisi Transport Company. Supervisor: Paul Leis