Examensarbeten efter program/Theses by program


Klicka på blå triangel för att expandera/minimera/Click on the blue triangle to expand/minimize.


ProgramAuthorTitleYear
Show details for Magisterprogram i psykologi för lärande, utveckling och kommunkationMagisterprogram i psykologi för lärande, utveckling och kommunkation
Show details for Magisterprogram i vårdvetenskap/Master of nursing scienceMagisterprogram i vårdvetenskap/Master of nursing science
Show details for Magisterprogram Programvaruteknik, 40 poäng/Masters programme Software EngineeringMagisterprogram Programvaruteknik, 40 poäng/Masters programme Software Engineering
Show details for Magisterprogram Telekommunikation och Signalbehandling/Masters progr. Telecom & Signal Proc.Magisterprogram Telekommunikation och Signalbehandling/Masters progr. Telecom & Signal Proc.
Show details for Magisterprogrammet i Entreprenörskap/Master programme in EntrepreneurshipMagisterprogrammet i Entreprenörskap/Master programme in Entrepreneurship
Show details for Maskiningenjör med datavetenskap/Mechanical engineer with computer scienceMaskiningenjör med datavetenskap/Mechanical engineer with computer science
Show details for Master of Business Administration (MBA)Master of Business Administration (MBA)
Show details for Master of Science in InformaticsMaster of Science in Informatics
Show details for Master of Science in Intelligent Software SystemsMaster of Science in Intelligent Software Systems
Hide details for Master of Science in Security EngineeringMaster of Science in Security Engineering
Ahmed, AdnanMeta-Model of Resilient information System2007
Akhtar, Muhammad FaheemValidation of Machine Learning and Visualization based Static Code Analysis Technique2009
Andersson, FredrikDynamic identities for flexible access control2005
Atangana, Jules LazareCountering Privacy-Invasive Software (PIS) by End User License Agreement Analysis2007
Dathathri, ArvindCountering Privacy-Invasive Software (PIS) by End User License Agreement Analysis2007
Erlandsson, FredrikS-UDDI - using Web services, the Secure and Trustworthy way2005
Evertsson, DanielS-UDDI - using Web services, the Secure and Trustworthy way2005
Garapati, BalakrishnaPrevention of Spyware by Runtime Classiication of End User License Agreements 2009
Hagström, StefanDynamic identities for flexible access control2005
Haider, Syed ImranDetection of Spyware by Mining Executable Files2009
Homaidi, Omar AlData Remanence: Secure Deletion of Data in SSDs2009
Hussain, Faisal Mateen & IrfanAutomated Analysis of End User License Agreements2011
Hussain, MusharrifSecure Software and Communication on Handheld Devices2007
Hussain, Syed ShahramMeta-Model of Resilient information System2007
Ivarsson, SamuelMobile payment with customer controlled connection - Can it be constructed to be safe enough?2008
Karlsson, RobertHAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart2004
Larsson, TobiasBlocking Privacy-Invasive Software Using a Specialized Reputation System2007
Lindén, NiklasBlocking Privacy-Invasive Software Using a Specialized Reputation System2007
Mahmood, SulmanSecure Software and Communication on Handheld Devices2007
Mahmood, WaqasValidation of Machine Learning and Visualization based Static Code Analysis Technique2009


 

Akademiskt skrivande/Academic writing -

Länk till Skrivguiden

Link to the writingguide

 

Refero - om plagiering/ about plagiarism -

Refero

 

BTH research searchable in  DART Europe e-theses portal -

Dart

 

BTH forskningsdatabas/ BTH electronic research archive -

Forskningsdatabasen