Cyber Security Hub

MSc thesis

MSc thesis on Cyber Security related topics defended at the University of Tartu:


2019:

  • Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System"
  • Mammadzada. K., "Blockchain Oracles"
  • Matsalu. M., "The Development of Digital Forensics Workforce Competency on the Example of Estonian Defence League"
  • Padur. K., "Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution"
  • Puniani. R., "Conceptualization of a Blockchain Based Voting Ecosystem in Estonia"
  • Pure. I., "An Automated Methodology for Validating Web Related Cyber Threat Intelligence by Implementing a Honeyclient"
  • Produit. B.D., "Optimization of the ROCA (CVE-2017-15361) Attack"
  • Sarapuu. D., "Penetration Testing of Glia’s Web Application"
  • Seeba. M., "A Specification of Layer-Based Information Security Management System for the Issue Tracking System"
  • Simisker. M., "Security of Health Information Databases"
  • Tõnisson. R., "Tighter Post-quantum Secure Encryption Schemes Using Semi-classical Oracles"
  • Yerokhin. M., "Multi-level Policy-aware Privacy Analysis"

See more at the thesis database.


2018:

  • Abbasi A., GDPR Implementation in an Airline’s Contact Center
  • Akande A., Disruptive Power of Blockchain on the Insurance Industry
  • Avramenko V., Cost-Benefit Analysis of a Hybrid Terrorist Attack on a Power Plant

  • Affia A-A. O., Security Risk Management of E-commerce Systems
  • Çelebi I., 
Privacy Enhanced Secure Tropos:
 A Privacy Modeling Language for GDPR Compliance
  • Cherednychenko O., Designing Visually Effective and Intuitive Modelling Notations for Security Risk Management
  • Elazazy A. A. A. A., HoneyProxy Implementation in Cloud Environment with Docker Container HoneyFarm
  • Filipczak K. M., Testing the Security Awareness using Open-Source Tools: Spear Phishing
  • Islami L., Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations
  • Jüristo K., How to Conduct Email Phishing Experiments
  • Kaasik M., A Tool for Supporting Multi-perspective System Development Through Security Risk Management
  • Kopylash V., An Ethereum-Based Real Estate Application with Tampering-Resilient Document Storage
  • Luomala M., Evaluation of Efficiency of Cybersecurity
  • Mendelman K., Fingerprint Organization Using Metadata of Public Documents
  • Mitt S., Blockchain Application - Case Study on Hyperledger Fabric
  • Mohamed G. Z. A. R., Detecting Social Spamming on Facebook Platform
  • Nugis R., Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
  • Orange A., Blockchain-based Provenance Solution for Handcrafted Jewellery
  • Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists’ Cyber Incident Reporting Skills
  • Rebane R.-M., Post-Quantum Secure Time-Stamping
  • Ristikivi A., Ensuring the Integrity of Electronic Health Records
  • Räni E., Prediction Model for tendencies in Cybercesurity
  • Sing E., A Meta-Model Driven Method for Establishing Business Process Compliance to GDPR
  • Shapaval R., Security Risk Management for the IoT systems
  • Soonberg M., The Employee-Based Information Security Risks on the Example of the Estonian Literary Museum
  • Sõgel K., Distributed Ledger Technology and External Mandatory Reporting in Banking Industry
  • Velázquez J. A. S., ''Securing openHAB Smart Home Through User Authentication and Authorization'
  • Värva I., Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application
  • Zaitsev A., Comparison of STS and ArchiMate Risk and Security Overlay

See more at the thesis database.


2017:

  • AbuSeada W. M. F. A., Alternative Approach to Automate Detection of DOM-XSS Vulnerabilities
  • Bascuñana G. F., Method for Effective PDF Files Manipulation Detection
  • Brodar G., Analysis of Exploit-kit Incidents and Campaigns Through a Graph Database Framework
  • Djagilev V., Android Chat Application Forensic Process Improvement & XRY Support
  • Ellervee A., A Reference Model for Blockchain-Based Distributed Ledger Technology
  • Jõgi M., Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance
  • Kinger M., Enterprise Cloud Security Guidance and Strategies for Enterprises
  • Kuldmaa A., On Secure Bulletin Boards for E-Voting
  • Lahesoo P., The Electronic Evidence Examination Reporting System by the Example of West Prefecture
  • Lashkarara S., Managing Security Risks Using Attack-Defense Trees
  • Maennel K., Improving and Measuring Learning Effectiveness at Cyber Defence Exercises
  • Nafies A., A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver
  • Sivalingapandi D., Comparison and Alignment of Access Control Models
  • Oksvort R., A Prototype for Learning Privacy-Preserving Data Publishing
  • Pappas S., Investigation of JTAG and ISP Techniques for Forensic Procedures
  • Proskurin A., Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application
  • Treier D., Research and Proof of Concept of Selected ISKE Highest Level Integrity Requirements
  • Tschida C., The Way to the Specialist and Management Level of Cyber Hygiene Initiative
  • Tsintsabadze L., A Prototype to Analyze Role- and Attribute-Based Access Control Models
  • Vallaots A., Federation of Cyber Ranges
  • Vunk M., A Framework for Assessing Organisational IT Governance Risk and Compliance

See more at the thesis database.


2016:

  • Allyson I. H., Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises
  • Duran S. A. U., Organizational Interaction Mechanisms Affecting Strategic Decision-Making During Cybercrime Investigations
  • Herrera V. L. C., A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
  • Martínez F. C. A., Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding and Development
  • Pantoja V. C. A., Analysis of the Cyber Attacks against ADS-B Perspective of Aviation Experts
  • Pinto R. Y. A., Development of National Cyber Security Strategies (NCSSs), and an Application of Perspective to the Colombian Case
  • Rozario V. I. D. J., Model-based Role Based Access Control for RESTful Spring applications
  • Samarütel S., Revision of Security Risk-oriented Patterns for Distributed Systems
  • Sarmiento B. S. A., Detection Solution Analysis for Simplistic Spoofing Attacks in Commercial Mini and Micro UAVs
  • Sergeev A., Role Based Access Control as SecureUML Model in Web Applications Development with Spring Security
  • Siim J., Secure and Efficient Mix-Nets
  • Siim S., A Comprehensive Protocol Suite for Secure Two-Party Computation
  • Sokk V., An Improved Type System for a Privacy-aware Programming Language and its Practical Applications
  • Suarez M. D. D., Assessment of Web-based Information Security Awareness Courses
  • Velasquez H. L. A., Colombia and the Intelligence Cycle in the 21st Century, the Digital Age

See more at the thesis database.


2015:

  • Guler S., Secure Bitcoin Wallet
  • Kiiver J., NFC Security Solution for Web Applications
  • Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation
  • Rao S. P. Analysis and Mitigation of Recent Attacks on Mobile Communication Backend
  • Rrenja A., Pattern Based Security Requirements Derivation with Security Risk-aware Secure Tropos
  • Tursunova S., Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks
  • Vaht M., The Analysis and Design of a Privacy-Preserving Survey System

See more at the thesis database.


2014:

  • AbuLamddi M., Safety and Security Dependability Analysis
  • Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes
  • Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools
  • Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis
  • Okugbeni J., Security Implementation of Mission Control System for ESTCube-1 Satellite
  • Pikma T., Auditing of Secure Multiparty Computations
  • Preobrazenskaja A., Development of Security Risk Measurement Model within Misuse Cases and BPMN
  • Teder T. Extracting Bole-based Access Control Models from Business Process Event Logs
  • Tovstukha I., Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities
  • Turban T., A Secure Multi-Party Computation Protocol Suite Inspired by Shamir’s Secret Sharing Scheme

2013:

  • Altuhhova O., Developing System Security through Business Process Modelling
  • Onchukova A., Transformation rules between MUC and MAD
  • Pankova A., Insecurity of Transformation-Based Privacy-Preserving Linear Programming
  • Pullonen P., Actively Secure Two-Party Computation: Efficient Beaver Triple Generation
  • Rebane R., A Feasibility Analysis of Secure Multiparty Computation Deployments
  • Tark K., Role Based Access Model in XML based Documents

2012:

  • Cakabey O., Role-based Access Control Using Knowledge Acquisition in Automated Specification
  • Khan N. H., A Pattern-based Development of Secure Business Processes
  • Lakk H., Model-driven Role-based Access Control for Databases
  • Soomro I. U., Alignment of Misuse Cases to ISSRM
  • Turan Y., Extension and Application of Event-driven Process Chain for Information System Security Risk Management

2011:

  • Chowdhury M. J. M., Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
  • Seeba I., Adding a transformation language to the Cryptoanalyser
  • Talviste R., Deploying secure multiparty computation for joint data analysis - a case study

See more at the thesis database.