Examensarbeten efter ämne/Theses by subject - Datavetenskap - Computer Science: Electronic Security


TitleAuthor
Engineering of Context Dependent Quality of Service (QoS) Khan H M Farooq
Enhancing Information Security in Cloud Computing Services using SLA based metricsNia,
Ramadianti Putri; Mganga,
Medard Charles
Enhancing Security and Usability Features of NFCÖmer Kerem Beygo,
Cihan Eraslan
Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.Stephen Ekhator
Evaluation of Idempotency & Block Size of Data on the Performance of Normalized Compression Distance AlgorithmVenkata Srikanth Mandhapati,
Kamran Ali Bajwa
Evaluation of the CSF FirewallAhmad Mudhar
Facebook Blocket with Unsupervised Learning Khizer Amin ,
Mehmood ul haq Minhas
Fildelning över Peer-2-Peer. En fara för hemanvändare?Andreas Nilsson,
Daniel Mallenberg
Functional Approach towards Approximation ProblemMuhammmad Imran Shafi,
Muhammad Akram
Futuristic TeleconfernecingHaritha Mallavarapu
Growth factors of Service based internet commerce in South Asian marketsAsif Iqbal Mohammed
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepartRobert Karlsson,
Aron Rydquist
Identifiering och analys av botnät med hjälp av aktiva säkerhetssystemPawel Mynarski,
Oscar Carlsson
Improving DLP system securitySara Ghorbanian,
Glenn Fryklund
Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected DevicesMarcus Andersson,
Alexander Nilsson
Innovation inom Digital Rights ManagementCamrie Agushi
Invasion of Privacy: Spam - one result of bad privacy protectionAnnicka Gunnarsson,
Siri Ekberg
Investigating Spyware in Peer-to-Peer ToolsMartin Boldt,
Johan Wieslander
LANGUAGE LEARNING VIA AN ANDROID AUGMENTED REALITY SYSTEMPaweł Beder
Mobile payment with customer controlled connection - Can it be constructed to be safe enough?Samuel Ivarsson
Modelling and Simulation of a Resonant ConverterSrinivasa Kranthi Kiran Kolachina,
Nishu Reddy
Möjligheter och begränsningar i molnetSanna Widell,
Linnéa Levin
Nomadic Computing - Security assessment of remote access to workplace systemsJohanna Karlsson
Peer-to-peer - time to lock the doorLinus Petersson
peer2peer - hur dyrt är gratis?Björn Folbert,
Magnus Persson,
Henrik Svensson
Prevention of Spyware by Runtime Classiication of End User License Agreements Muhammad Usman Rashid,
Balakrishna Garapati
Protection of System Layer AffordancesPer Mellstrand
Requirement Specification for Information Security to Health Systems, Case Study - IMISMalin Almström,
Christina Olsson
Response Time Effects on Quality of Security ExperienceWajahat Ali,
Asad Muhammad
Reviewing Security and Privacy Aspects in Combined Mobile Information System (CMIS) for health care systemsRamesh Kunwar,
Mustafa Al-Leddawi

Föregående | Nästa


 

Akademiskt skrivande/Academic writing -

Länk till Skrivguiden

Link to the writingguide

 

Refero - om plagiering/ about plagiarism -

Refero

 

BTH research searchable in  DART Europe e-theses portal -

Dart

 

BTH forskningsdatabas/ BTH electronic research archive -

Forskningsdatabasen