Examensarbeten efter program/Theses by program


Klicka på blå triangel för att expandera/minimera/Click on the blue triangle to expand/minimize.


ProgramAuthorTitleYear
Hide details for InternetsystemsInternetsystems
Adolfsson, HenrikDesign and implementation of the MMS portal2006
Ali, Muhammad UsmanCloud Computing as a Tool to Secure and Manage Information Flow in Swedish Armed Forces Networks 2012
Chane, MekidesEvaluation of Smartphone Network Performance 2012
Ejaz, MohammadModel for conflict resolution in aspects within Aspect Oriented Requirement engineering2008
Hameed, FaysalModel for conflict resolution in aspects within Aspect Oriented Requirement engineering2008
Hylander, BjörnAnalys, design och implementering av Orbit ones dokumenthanteringssystem2005
Håkansson, JohanAnalys, design och implementering av Orbit ones dokumenthanteringssystem2005
Ikram, ImranTraffic Engineering with MPLS and QOS2009
Johansson, MartinAnalys, design och implementering av Orbit ones dokumenthanteringssystem2005
Ojaide, Christopher LuckyINFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM: Election and Census Fraud Solution 2010
Rubin, AndreasIF Trions hemsida2005
Svensson, PeterDesign and implementation of the MMS portal2006
Tekelmariam, HailayEvaluation of Smartphone Network Performance 2012
Hide details for IT-säkerhet/Security EngineeringIT-säkerhet/Security Engineering
Andersson, LarsInblick i fenomenet webbskrapning2013
Arenas, Miguel TamesSocial Engineering and Internal Threats in Organizations2008
Carlsson, OscarIdentifiering och analys av botnät med hjälp av aktiva säkerhetssystem2012
Charles, MedardEnhancing Information Security in Cloud Computing Services using SLA based metrics2011
Husin, AzlanBluetooth and security2012
Kazi, ShehabAnomaly based Detection of Attacks on Security Protocols2010
Mattsson, JoelDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Mattsson, JoelDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Mganga, Ramadianti Putri;Enhancing Information Security in Cloud Computing Services using SLA based metrics2011
Mynarski, PawelIdentifiering och analys av botnät med hjälp av aktiva säkerhetssystem2012
Nilsson, DanielHTML5 Web application security with OWASP2013
Norling, SebastianEn säkerhetsgranskning av Secure Application Framework2013
Persson, EmilDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Persson, EmilDebug register rootkits - A study of malicious use of the IA-32 debug registers2012
Pettersson, AlexanderBluetooth and security2012


 

Akademiskt skrivande/Academic writing -

Länk till Skrivguiden

Link to the writingguide

 

Refero - om plagiering/ about plagiarism -

Refero

 

BTH research searchable in  DART Europe e-theses portal -

Dart

 

BTH forskningsdatabas/ BTH electronic research archive -

Forskningsdatabasen