Research by subject

Show details for Applied Health Technology: GeneralApplied Health Technology: General
Show details for Business Administration: InformationBusiness Administration: Information
Show details for Business Administration: International BusinessBusiness Administration: International Business
Show details for Business Administration: Management ControlBusiness Administration: Management Control
Show details for Business Administration: MarketingBusiness Administration: Marketing
Show details for Business Administration: OrganizationBusiness Administration: Organization
Show details for Computer Science: Artificial IntelligenceComputer Science: Artificial Intelligence
Show details for Computer Science: ComputersystemsComputer Science: Computersystems
Show details for Computer Science: Distributed ComputingComputer Science: Distributed Computing
Show details for Computer Science: Effects on SocietyComputer Science: Effects on Society
Hide details for Computer Science: Electronic securityComputer Science: Electronic security
Accurate Adware Detection using Opcode Sequence ExtractionShahzad, Raja Khurram; Lavesson, Niklas; Johnson, Henric
Automated static code analysis - A tool for early vulnerability detectionBaca, Dejan
Classification of Potentially Unwanted Programs Using Supervised LearningShahzad, Raja Muhammad Khurram
Comparative Analysis of Voting Schemes for Ensemble-based Malware DetectionShahzad, Raja Khurram; Lavesson, Niklas
Compiler Assisted MaskingMoss, Andrew; Oswald, Elisabeth; Page, dan; Tunstall, Michael
Computer Forensic Timeline Visualization ToolOlsson, Jens; Boldt, Martin
Confidentiality Aspects within Road User Charging Systems: the Swedish CaseBoldt, Martin; Carlsson, Bengt
Design and maintenance of trustworthy e-services: Introducing a trust management cycleRindebäck, Christer; Gustavsson, Rune
Designing and Maintaining Trustworthy Online ServicesRindebäck, Christer
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine LearningAxelsson, Stefan; Baca, Dejan; Feldt, Robert; Sidlauskas, Darius; Kacan, Denis
Detecting Scareware by Mining Variable Length Instruction SequencesShahzad, Raja Khurram; Lavesson, Niklas
Detection of Spyware by Mining Executable FilesShahzad, Raja Khurram; Haider, Syed Imran; Lavesson, Niklas
Developing Secure Software - in an Agile ProcessBaca, Dejan
Dynamic Protection of Software Execution EnvironmentsMellstrand, Per; Gustavsson, Rune
E-mail Classification using Social Network InformationBorg, Anton; Lavesson, Niklas
E-Mail Prioritization using Online Social Network Profile DistanceRezaee, Shaliz; Lavesson, Niklas; Johnson, Henric
An Electronic Voting System Supporting Vote WeightsEliasson, Charlott; Zúquete, André
The empowered user - The critical interface to critical infrastructuresGustavsson, Rune; Ståhl, Björn
Evaluating the Cost Reduction of Static Code Analysis for Software SecurityBaca, Dejan; Carlsson, Bengt; Lundberg, Lars