Examensarbeten efter program/Theses by program


Klicka på blå triangel för att expandera/minimera/Click on the blue triangle to expand/minimize.


ProgramAuthorTitleYear
Hide details for IT-säkerhet/Security EngineeringIT-säkerhet/Security Engineering
Andersson, LarsInblick i fenomenet webbskrapning2013
Arenas, Miguel TamesSocial Engineering and Internal Threats in Organizations2008
Carlsson, OscarIdentifiering och analys av botnät med hjälp av aktiva säkerhetssystem2012
Charles, MedardEnhancing Information Security in Cloud Computing Services using SLA based metrics2011
Husin, AzlanBluetooth and security2012
Kazi, ShehabAnomaly based Detection of Attacks on Security Protocols2010
Mattsson, JoelDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Mattsson, JoelDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Mganga, Ramadianti Putri;Enhancing Information Security in Cloud Computing Services using SLA based metrics2011
Mynarski, PawelIdentifiering och analys av botnät med hjälp av aktiva säkerhetssystem2012
Nilsson, DanielHTML5 Web application security with OWASP2013
Norling, SebastianEn säkerhetsgranskning av Secure Application Framework2013
Persson, EmilDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Persson, EmilDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Pettersson, AlexanderBluetooth and security2012
Smirnov, SergeyDecision Making for Finding an Adequate: Providing trade-off between Performance and Security2007
Wanderydz, KristofferWEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT2012
Åberg, HampusHTML5 Web application security with OWASP2013
, Enhancing Information Security in Cloud Computing Services using SLA based metrics2011
Hide details for kultur och digitala medierkultur och digitala medier
Agadagba, EfeogheneIdentity Construction on Social Network Sites: Facebook2011
Chohan, Imran RiazIdentity, hyperreality and Science fiction: Matrix and Neuromancer2012
Erel, SarperFrom 2001 A Space Odyssey to Minority Report: Reflections of Imagining Future on Science Fiction 2012
Ghazouani, Anas ElHow Meta-Films Can Serve Cinema2012
Jansson, RobinSilence in Adventure Games and Space2012
Kiraly, ThomAn Angel Passes By: Posthuman and Acousmatic Voices in Digitally Mediated Contemporary Live Poetry2012
Mahzoon, AlirezaManipulated Private and Public Spheres: The Use of Control Technologies by Totalitarian Regimes 2012
Ogungbemi, Funke Jaiyeola neeCollaborative Virtual Environments: Identity Construction in Online Environments with a Focus on Facebook2011
Wu, DiWhat Distinguishes Humans from Artificial Beings in Science Fiction World2012