Examensarbeten efter ämne/Theses by subject - Datavetenskap - Computer Science: Electronic Security


TitleAuthor
Enhancing Information Security in Cloud Computing Services using SLA based metricsNia,
Ramadianti Putri; Mganga,
Medard Charles
Enhancing Security and Usability Features of NFCÖmer Kerem Beygo,
Cihan Eraslan
Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.Stephen Ekhator
Evaluation of Idempotency & Block Size of Data on the Performance of Normalized Compression Distance AlgorithmVenkata Srikanth Mandhapati,
Kamran Ali Bajwa
Evaluation of the CSF FirewallAhmad Mudhar
Facebook Blocket with Unsupervised Learning Khizer Amin ,
Mehmood ul haq Minhas
Fildelning över Peer-2-Peer. En fara för hemanvändare?Andreas Nilsson,
Daniel Mallenberg
Functional Approach towards Approximation ProblemMuhammmad Imran Shafi,
Muhammad Akram
Futuristic TeleconfernecingHaritha Mallavarapu
Growth factors of Service based internet commerce in South Asian marketsAsif Iqbal Mohammed
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepartRobert Karlsson,
Aron Rydquist
Identifiering och analys av botnät med hjälp av aktiva säkerhetssystemPawel Mynarski,
Oscar Carlsson
Innovation inom Digital Rights ManagementCamrie Agushi
Invasion of Privacy: Spam - one result of bad privacy protectionAnnicka Gunnarsson,
Siri Ekberg
Investigating Spyware in Peer-to-Peer ToolsMartin Boldt,
Johan Wieslander
LANGUAGE LEARNING VIA AN ANDROID AUGMENTED REALITY SYSTEMPaweł Beder
Mobile payment with customer controlled connection - Can it be constructed to be safe enough?Samuel Ivarsson
Nomadic Computing - Security assessment of remote access to workplace systemsJohanna Karlsson
Peer-to-peer - time to lock the doorLinus Petersson
peer2peer - hur dyrt är gratis?Björn Folbert,
Magnus Persson,
Henrik Svensson
Prevention of Spyware by Runtime Classiication of End User License Agreements Muhammad Usman Rashid,
Balakrishna Garapati
Protection of System Layer AffordancesPer Mellstrand
Requirement Specification for Information Security to Health Systems, Case Study - IMISMalin Almström,
Christina Olsson
Response Time Effects on Quality of Security ExperienceWajahat Ali,
Asad Muhammad
Reviewing Security and Privacy Aspects in Combined Mobile Information System (CMIS) for health care systemsRamesh Kunwar,
Mustafa Al-Leddawi
Riskanalys inom intrångsäkerhet på webbplatserAlexander Gustafsson
Runtime Analysis of MalwareMuhammad Shahid Iqbal,
Muhammad Sohail
S-UDDI - using Web services, the Secure and Trustworthy wayFredrik Erlandsson,
Daniel Evertsson
Secure Identification in Social Wireless NetworksOmer Nawaz
Securing a wireless local area network - using standard security techniquesDan Ekström

Föregående | Nästa