Research by subject - Computer Science: Electronic security


TitleAuthor
Accurate Adware Detection using Opcode Sequence ExtractionShahzad, Raja Khurram; Lavesson, Niklas; Johnson, Henric
Automated static code analysis - A tool for early vulnerability detectionBaca, Dejan
Classification of Potentially Unwanted Programs Using Supervised LearningShahzad, Raja Muhammad Khurram
Comparative Analysis of Voting Schemes for Ensemble-based Malware DetectionShahzad, Raja Khurram; Lavesson, Niklas
Compiler Assisted MaskingMoss, Andrew; Oswald, Elisabeth; Page, dan; Tunstall, Michael
Computer Forensic Timeline Visualization ToolOlsson, Jens; Boldt, Martin
Confidentiality Aspects within Road User Charging Systems: the Swedish CaseBoldt, Martin; Carlsson, Bengt
Design and maintenance of trustworthy e-services: Introducing a trust management cycleRindebäck, Christer; Gustavsson, Rune
Designing and Maintaining Trustworthy Online ServicesRindebäck, Christer
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine LearningAxelsson, Stefan; Baca, Dejan; Feldt, Robert; Sidlauskas, Darius; Kacan, Denis
Detecting Scareware by Mining Variable Length Instruction SequencesShahzad, Raja Khurram; Lavesson, Niklas
Detection of Spyware by Mining Executable FilesShahzad, Raja Khurram; Haider, Syed Imran; Lavesson, Niklas
Developing Secure Software - in an Agile ProcessBaca, Dejan
Dynamic Protection of Software Execution EnvironmentsMellstrand, Per; Gustavsson, Rune
E-mail Classification using Social Network InformationBorg, Anton; Lavesson, Niklas
E-Mail Prioritization using Online Social Network Profile DistanceRezaee, Shaliz; Lavesson, Niklas; Johnson, Henric
An Electronic Voting System Supporting Vote WeightsEliasson, Charlott; Zúquete, André
The empowered user - The critical interface to critical infrastructuresGustavsson, Rune; Ståhl, Björn
Evaluating the Cost Reduction of Static Code Analysis for Software SecurityBaca, Dejan; Carlsson, Bengt; Lundberg, Lars
Evaluation of Authentication Schemes Based on Security, User-Friendliness and ComplexityEliasson, Charlott; Fiedler, Markus; Jørstad, Ivar
Exploring Privacy Risks in Information NetworksJacobsson, Andreas
Exploring Spyware EffectsBoldt, Martin; Carlsson, Bengt; Jacobsson, Andreas
Exploring Spyware EffectsBoldt, Martin; Carlsson, Bengt; Jacobsson, Andreas
Extended Abstract: Detecting Scareware by Mining Variable Length Instruction SequencesShahzad, Raja Khurram; Lavesson, Niklas
A General Architecture For Developing A Sustainable Elderly Care E-Health SystemGuo, Yang; Bai, Guohua
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code TaintingBaca, Dejan
Implementation and evaluation of NIST biometric image software for fingerprint recognitionMaddala, Sainath; Bartunek, Josef Ström; Nilsson, Mikael
Informatisk forskning om riskanalysprocess applicerad på Apoteket AB:s kundcenterverksamhetBrandt, Patrik; Wennberg, Louise
Informed Software Installation through License Agreement CategorizationBorg, Anton; Boldt, Martin; Lavesson, Niklas
Informed System ProtectionMellstrand, Per

Next