Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

University: KTH

You searched for subject:( security). Showing records 1 – 30 of 152 total matches.

[1] [2] [3] [4] [5] [6]

Search Limiters

Last 2 Years | English Only

Languages

▼ Search Limiters


KTH

1. Farnian, Adnan. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.

Degree: Industrial Information and Control Systems, 2010, KTH

  Today the extent and value of electronic data is constantly growing. Dealing across the internet depends on how secure consumers believe their personal data… (more)

Subjects/Keywords: Information Technology; Information Security; Information Security Governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farnian, A. (2010). Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Farnian, Adnan. “Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.” 2010. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Farnian, Adnan. “Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.” 2010. Web. 14 Oct 2019.

Vancouver:

Farnian A. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. [Internet] [Thesis]. KTH; 2010. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Farnian A. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. [Thesis]. KTH; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

2. Orchi, Tommaso Galassi De. A Security Study for Non-Internet Connected Managed Software.

Degree: CoS, 2012, KTH

This master thesis project aims to improve the security of managed software developed at SCANIA's research and development group NEVE. The thesis will present… (more)

Subjects/Keywords: .Net Security; Reverse Engineering; Cryptography; C#; Information Security; zero-knowledge

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Orchi, T. G. D. (2012). A Security Study for Non-Internet Connected Managed Software. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99047

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Orchi, Tommaso Galassi De. “A Security Study for Non-Internet Connected Managed Software.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99047.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Orchi, Tommaso Galassi De. “A Security Study for Non-Internet Connected Managed Software.” 2012. Web. 14 Oct 2019.

Vancouver:

Orchi TGD. A Security Study for Non-Internet Connected Managed Software. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99047.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Orchi TGD. A Security Study for Non-Internet Connected Managed Software. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99047

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

3. Annamalai, Neelambari. Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing.

Degree: DSV, 2012, KTH

  Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems.… (more)

Subjects/Keywords: Cloud computing; outsourcing; cloudsourcing; information security risks; cloudsourcing information security guidelines

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Annamalai, N. (2012). Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155453

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Annamalai, Neelambari. “Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155453.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Annamalai, Neelambari. “Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing.” 2012. Web. 14 Oct 2019.

Vancouver:

Annamalai N. Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155453.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Annamalai N. Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155453

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

4. Desta, Girmay. Security for Mobile Payment Transaction.

Degree: Information and Communication Technology (ICT), 2012, KTH

  The advancement of ICT in a variety of sectors helped in improving the time consuming and rigid service into fast and flexible service that… (more)

Subjects/Keywords: Strong Authentication; mobile security; PIV; mobile PKI; payment privacy; EMV security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Desta, G. (2012). Security for Mobile Payment Transaction. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Desta, Girmay. “Security for Mobile Payment Transaction.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Desta, Girmay. “Security for Mobile Payment Transaction.” 2012. Web. 14 Oct 2019.

Vancouver:

Desta G. Security for Mobile Payment Transaction. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Desta G. Security for Mobile Payment Transaction. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Tuhin, RASHEDUL AMIN. Securing GNSS Receivers with a Density-based Clustering Algorithm.

Degree: Communication Networks, 2015, KTH

  Global Navigation Satellite Systems (GNSS) is in widespread use around the world for numerous purposes. Even though it was first developed for military purposes,… (more)

Subjects/Keywords: security; positioning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tuhin, R. A. (2015). Securing GNSS Receivers with a Density-based Clustering Algorithm. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182117

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tuhin, RASHEDUL AMIN. “Securing GNSS Receivers with a Density-based Clustering Algorithm.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182117.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tuhin, RASHEDUL AMIN. “Securing GNSS Receivers with a Density-based Clustering Algorithm.” 2015. Web. 14 Oct 2019.

Vancouver:

Tuhin RA. Securing GNSS Receivers with a Density-based Clustering Algorithm. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182117.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tuhin RA. Securing GNSS Receivers with a Density-based Clustering Algorithm. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182117

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

6. Muthu, Arun. Emulating Trust zone feature in Android emulator by extending QEMU.

Degree: Information and Communication Technology (ICT), 2013, KTH

  The arrival of smart phones has created the new era in communication between users and internet. Smart phone users are able to run their… (more)

Subjects/Keywords: Trust zone; Emulator; Android; Virtualization; and Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muthu, A. (2013). Emulating Trust zone feature in Android emulator by extending QEMU. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muthu, Arun. “Emulating Trust zone feature in Android emulator by extending QEMU.” 2013. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muthu, Arun. “Emulating Trust zone feature in Android emulator by extending QEMU.” 2013. Web. 14 Oct 2019.

Vancouver:

Muthu A. Emulating Trust zone feature in Android emulator by extending QEMU. [Internet] [Thesis]. KTH; 2013. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muthu A. Emulating Trust zone feature in Android emulator by extending QEMU. [Thesis]. KTH; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

7. Dashtinejad, Pejman. Security System for Mobile Messaging Applications.

Degree: Information and Communication Technology (ICT), 2015, KTH

  Instant messaging (IM) applications are one of the most popular applications for smartphones. The IMs have the capability of sending messages or initiating voice… (more)

Subjects/Keywords: Mobile; Application; messaging; Chat; Encryption; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dashtinejad, P. (2015). Security System for Mobile Messaging Applications. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-167125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dashtinejad, Pejman. “Security System for Mobile Messaging Applications.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-167125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dashtinejad, Pejman. “Security System for Mobile Messaging Applications.” 2015. Web. 14 Oct 2019.

Vancouver:

Dashtinejad P. Security System for Mobile Messaging Applications. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-167125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dashtinejad P. Security System for Mobile Messaging Applications. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-167125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

8. Qureshi, Muhammad Sohail. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company.

Degree: DSV, 2012, KTH

  Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards… (more)

Subjects/Keywords: Information security policies; ISO27004; KPIs; KRIs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Qureshi, M. S. (2012). Measuring Efficacy of Information Security Policies : A Case Study of UAE based company. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Qureshi, Muhammad Sohail. “Measuring Efficacy of Information Security Policies : A Case Study of UAE based company.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Qureshi, Muhammad Sohail. “Measuring Efficacy of Information Security Policies : A Case Study of UAE based company.” 2012. Web. 14 Oct 2019.

Vancouver:

Qureshi MS. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Qureshi MS. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

9. Bhuiyan, Mohammad Sifatullah. Securing Mobile Payment Protocol based on EMV Standard.

Degree: Information and Communication Technology (ICT), 2012, KTH

  This is an era of communication technology. This era has faced a lot of innovation in technology sector. Mobile phones were once used for… (more)

Subjects/Keywords: Mobile Payment Security; EMV; Magnetic Stripe

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhuiyan, M. S. (2012). Securing Mobile Payment Protocol based on EMV Standard. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bhuiyan, Mohammad Sifatullah. “Securing Mobile Payment Protocol based on EMV Standard.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bhuiyan, Mohammad Sifatullah. “Securing Mobile Payment Protocol based on EMV Standard.” 2012. Web. 14 Oct 2019.

Vancouver:

Bhuiyan MS. Securing Mobile Payment Protocol based on EMV Standard. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bhuiyan MS. Securing Mobile Payment Protocol based on EMV Standard. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

10. Mumtaz, Majid. Security Services for Mobile Applications.

Degree: Information and Communication Technology (ICT), 2012, KTH

  In today's era of technology, information can revolve the whole world within seconds via Internet. Devices such as smartphones, tablets and smart applications running… (more)

Subjects/Keywords: Mobile Applications Security; Authentication; microSD; Secure Element

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mumtaz, M. (2012). Security Services for Mobile Applications. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mumtaz, Majid. “Security Services for Mobile Applications.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mumtaz, Majid. “Security Services for Mobile Applications.” 2012. Web. 14 Oct 2019.

Vancouver:

Mumtaz M. Security Services for Mobile Applications. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mumtaz M. Security Services for Mobile Applications. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

11. KILSTRÖM, THERÉSE. Factors limiting adoption of new technology : a study of drawbacks affecting transition from on-premise systems to cloud computing.

Degree: Sustainability and Industrial Dynamics, 2016, KTH

  Cloud computing has grown from being a business concept to one of the fastest growing segments of modern ICT industry. Cloud computing are addressing… (more)

Subjects/Keywords: Cloud adoption; cloud computing; drawbacks; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

KILSTRÖM, T. (2016). Factors limiting adoption of new technology : a study of drawbacks affecting transition from on-premise systems to cloud computing. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

KILSTRÖM, THERÉSE. “Factors limiting adoption of new technology : a study of drawbacks affecting transition from on-premise systems to cloud computing.” 2016. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

KILSTRÖM, THERÉSE. “Factors limiting adoption of new technology : a study of drawbacks affecting transition from on-premise systems to cloud computing.” 2016. Web. 14 Oct 2019.

Vancouver:

KILSTRÖM T. Factors limiting adoption of new technology : a study of drawbacks affecting transition from on-premise systems to cloud computing. [Internet] [Thesis]. KTH; 2016. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

KILSTRÖM T. Factors limiting adoption of new technology : a study of drawbacks affecting transition from on-premise systems to cloud computing. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

12. Johansson, Fredrik. Deniable Messaging Under Strong Surveillance.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

In today’s society, people are more aware of the need for encryption to keep their private information safe. Therefore chat apps like WhatsApp and… (more)

Subjects/Keywords: Deniable Encryption; Security; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johansson, F. (2018). Deniable Messaging Under Strong Surveillance. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Johansson, Fredrik. “Deniable Messaging Under Strong Surveillance.” 2018. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Johansson, Fredrik. “Deniable Messaging Under Strong Surveillance.” 2018. Web. 14 Oct 2019.

Vancouver:

Johansson F. Deniable Messaging Under Strong Surveillance. [Internet] [Thesis]. KTH; 2018. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Johansson F. Deniable Messaging Under Strong Surveillance. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

13. Karamanos, Emmanouil. Investigation of home router security.

Degree: CoS, 2010, KTH

Home routers are common in every household that has some kind of Internet connectivity. These embedded devices are running services such as web, file… (more)

Subjects/Keywords: Home router; SOHO routers; security; security of embedded devices; CSRF; UPnP hack; TECHNOLOGY; TEKNIKVETENSKAP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karamanos, E. (2010). Investigation of home router security. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91107

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Karamanos, Emmanouil. “Investigation of home router security.” 2010. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91107.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Karamanos, Emmanouil. “Investigation of home router security.” 2010. Web. 14 Oct 2019.

Vancouver:

Karamanos E. Investigation of home router security. [Internet] [Thesis]. KTH; 2010. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91107.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Karamanos E. Investigation of home router security. [Thesis]. KTH; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91107

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

14. Conca, Alexandre Marcos. A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls.

Degree: Electric Power and Energy Systems, 2017, KTH

In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to use increasingly sophisticated security measures, security software amongothers. This has led… (more)

Subjects/Keywords: Information Security; Critical Security Controls; Investigative Method; Security Tools; Web Tool; Informationssakerhet; Kritiska Sakerhetskontroller; Undersokande Metod; Sakerhetsverktyg; Webbverktyg; Electrical Engineering, Electronic Engineering, Information Engineering; Elektroteknik och elektronik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Conca, A. M. (2017). A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Conca, Alexandre Marcos. “A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls.” 2017. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Conca, Alexandre Marcos. “A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls.” 2017. Web. 14 Oct 2019.

Vancouver:

Conca AM. A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls. [Internet] [Thesis]. KTH; 2017. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Conca AM. A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls. [Thesis]. KTH; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

15. Ingverud, Patrik. Datasäkerhet för webbaserade system.

Degree: Information and Communication Technology (ICT), 2015, KTH

Webbattacker är i dagens läge ett välkänt problem. Syftet med en attack kan vara allt från att enbart förstöra, till att komma åt sekretessklassad… (more)

Subjects/Keywords: Computer security; web security; web attacks; datasäkerhet; webbsäkerhet; webbattacker; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ingverud, P. (2015). Datasäkerhet för webbaserade system. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177551

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ingverud, Patrik. “Datasäkerhet för webbaserade system.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177551.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ingverud, Patrik. “Datasäkerhet för webbaserade system.” 2015. Web. 14 Oct 2019.

Vancouver:

Ingverud P. Datasäkerhet för webbaserade system. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177551.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ingverud P. Datasäkerhet för webbaserade system. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177551

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

16. Bonnevier, Jani. The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

Firewalls help protect computer networks from intrusions and malware by enforcing restrictions on what network traffic is allowed to pass through the firewall into… (more)

Subjects/Keywords: firewall; firewall configuration; threat modeling; network security; information security; brandvägg; brandväggskonfiguration; hotmodellering; nätverkssäkerhet; informationssäkerhet; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bonnevier, J. (2018). The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bonnevier, Jani. “The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling.” 2018. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bonnevier, Jani. “The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling.” 2018. Web. 14 Oct 2019.

Vancouver:

Bonnevier J. The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling. [Internet] [Thesis]. KTH; 2018. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bonnevier J. The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

17. Palombini, Francesca. Object Security in the Internet of Things.

Degree: Information and Communication Technology (ICT), 2015, KTH

The Internet of Things and the constrained environment that comes from the growth of constrained devices connected to the Internet brings new security challenges… (more)

Subjects/Keywords: Constrained nodes; Constrained Application Protocol (CoAP); REST; DTLS; object security; Constrained nodes; Constrained Application Protocol (CoAP); REST; DTLS; object security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palombini, F. (2015). Object Security in the Internet of Things. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175754

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Palombini, Francesca. “Object Security in the Internet of Things.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175754.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Palombini, Francesca. “Object Security in the Internet of Things.” 2015. Web. 14 Oct 2019.

Vancouver:

Palombini F. Object Security in the Internet of Things. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175754.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Palombini F. Object Security in the Internet of Things. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175754

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Mirbaz, Jamshid. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.

Degree: Industrial Information and Control Systems, 2012, KTH

  For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently.… (more)

Subjects/Keywords: IT Governance; IT Infrastructure; Information Security; Security

…x5D;[23] Figur 6 – PDCA modell anpassad till ISMS (Information Security… …ISGF (Information Security Governance Framework) är en omfattande akademisk ramverk… …Figur 8 – Akademiska ramverket ISGF (Information Security Governance Framework) 3… …Maintaining the Security Policy Access Management Human Resource Security Operations management… …Environmental Security Management Risk Assessment and Management Organisationer har länge använt sig… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mirbaz, J. (2012). Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mirbaz, Jamshid. “Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mirbaz, Jamshid. “Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.” 2012. Web. 14 Oct 2019.

Vancouver:

Mirbaz J. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mirbaz J. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

19. Wedin, Johan. Automatic secret synchronisation across heterogeneous IT environments.

Degree: Health Informatics and Logistics, 2019, KTH

Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother.… (more)

Subjects/Keywords: security; secrets; secret management; system integration; cryptography; computer security; säkerhet; hemligheter; hemlighetshantering; systemintegration; kryptografi; datasäkerhet; Computer Engineering; Datorteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wedin, J. (2019). Automatic secret synchronisation across heterogeneous IT environments. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252815

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wedin, Johan. “Automatic secret synchronisation across heterogeneous IT environments.” 2019. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252815.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wedin, Johan. “Automatic secret synchronisation across heterogeneous IT environments.” 2019. Web. 14 Oct 2019.

Vancouver:

Wedin J. Automatic secret synchronisation across heterogeneous IT environments. [Internet] [Thesis]. KTH; 2019. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252815.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wedin J. Automatic secret synchronisation across heterogeneous IT environments. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252815

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

20. Messing, Andreas. A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems.

Degree: Computer Science and Communication (CSC), 2018, KTH

Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of… (more)

Subjects/Keywords: vehicular communication; network; security; privacy; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Messing, A. (2018). A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Messing, Andreas. “A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems.” 2018. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Messing, Andreas. “A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems.” 2018. Web. 14 Oct 2019.

Vancouver:

Messing A. A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems. [Internet] [Thesis]. KTH; 2018. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Messing A. A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

21. Cooper, Ke'ahi. Security for the Internet of Things.

Degree: Computer Science and Communication (CSC), 2015, KTH

  The Internet of Things (IoT) is an emerging paradigm that will change theway we interact with objects and computers in the future. It envisions… (more)

Subjects/Keywords: Internet of Things; IoT; Security; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cooper, K. (2015). Security for the Internet of Things. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cooper, Ke'ahi. “Security for the Internet of Things.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cooper, Ke'ahi. “Security for the Internet of Things.” 2015. Web. 14 Oct 2019.

Vancouver:

Cooper K. Security for the Internet of Things. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cooper K. Security for the Internet of Things. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

22. Broström, Andreas. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.

Degree: Computer Science and Communication (CSC), 2015, KTH

The number of vulnerabilities discovered in software has been growing fast the last few years. At the same time the Agile method has quickly… (more)

Subjects/Keywords: agile; security; testing; vulnerability scanner; detection; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Broström, A. (2015). Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Broström, Andreas. “Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Broström, Andreas. “Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.” 2015. Web. 14 Oct 2019.

Vancouver:

Broström A. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Broström A. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

23. Kang, Johan. Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence.

Degree: Industrial Economics and Management (Dept.), 2018, KTH

The cyber world is growing as more information is converted from analogue to digital form. While convenience has been the main driver for this… (more)

Subjects/Keywords: Cybersecurity; IT-security; Artificial Intelligence; Diffusion of Innovation; Technology Adoption; IT innovation; Security Strategy; Cybersecurity; IT-security; Artificial Intelligence; Diffusion of Innovation; Technology Adoption; IT innovation; Security Strategy; Economics and Business; Ekonomi och näringsliv

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kang, J. (2018). Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kang, Johan. “Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence.” 2018. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kang, Johan. “Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence.” 2018. Web. 14 Oct 2019.

Vancouver:

Kang J. Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence. [Internet] [Thesis]. KTH; 2018. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kang J. Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

24. Ilaghi, Mahya. Short Message ServiceVulnerability Analysis : An attempt to attack the Serial Line on Symbian Smartphone In Orderto Inject Arbitrary SMS.

Degree: Information and Communication Technology (ICT), 2011, KTH

  Short Message Service (SMS) is a permanently available service on mobile phone networks. In addition to text messages, it supports binary messages to provide… (more)

Subjects/Keywords: Smartphone Security; Vulnerability Analysis; Short Message Service Injection; Symbian; TECHNOLOGY; TEKNIKVETENSKAP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ilaghi, M. (2011). Short Message ServiceVulnerability Analysis : An attempt to attack the Serial Line on Symbian Smartphone In Orderto Inject Arbitrary SMS. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ilaghi, Mahya. “Short Message ServiceVulnerability Analysis : An attempt to attack the Serial Line on Symbian Smartphone In Orderto Inject Arbitrary SMS.” 2011. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ilaghi, Mahya. “Short Message ServiceVulnerability Analysis : An attempt to attack the Serial Line on Symbian Smartphone In Orderto Inject Arbitrary SMS.” 2011. Web. 14 Oct 2019.

Vancouver:

Ilaghi M. Short Message ServiceVulnerability Analysis : An attempt to attack the Serial Line on Symbian Smartphone In Orderto Inject Arbitrary SMS. [Internet] [Thesis]. KTH; 2011. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ilaghi M. Short Message ServiceVulnerability Analysis : An attempt to attack the Serial Line on Symbian Smartphone In Orderto Inject Arbitrary SMS. [Thesis]. KTH; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

25. Tesfaye, Mussie. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.

Degree: CoS, 2012, KTH

This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the… (more)

Subjects/Keywords: SCADA; PLC; SCADA security; SCADA networks; PLC security; Trusted computing; TCM; TPM; Embedded security; Digital security; SCADA; PLC; SCADA säkerhet; SCADA-nätverk; PLC säkerhet; pålitlig datoranvändning; TCM; TPM; inbäddad säkerhetlösningar; datasäkerhet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tesfaye, M. (2012). Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tesfaye, Mussie. “Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tesfaye, Mussie. “Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.” 2012. Web. 14 Oct 2019.

Vancouver:

Tesfaye M. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tesfaye M. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Tandra, Sabrina Ali. Security for Cloud Based Services.

Degree: Radio Systems Laboratory (RS Lab), 2014, KTH

Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the… (more)

Subjects/Keywords: cloud computing; security; risk; vulnerability; performance; Molntjänster; säkerhet; risk; sårbarhet; utförande

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tandra, S. A. (2014). Security for Cloud Based Services. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-140601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tandra, Sabrina Ali. “Security for Cloud Based Services.” 2014. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-140601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tandra, Sabrina Ali. “Security for Cloud Based Services.” 2014. Web. 14 Oct 2019.

Vancouver:

Tandra SA. Security for Cloud Based Services. [Internet] [Thesis]. KTH; 2014. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-140601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tandra SA. Security for Cloud Based Services. [Thesis]. KTH; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-140601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

27. Lu, Shiting. Micro-architectural Attacks and Countermeasures.

Degree: Information and Communication Technology (ICT), 2011, KTH

  Micro-architectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new area focuses on the effects of common processor components and their… (more)

Subjects/Keywords: Cache attack; AES; countermeasures; side channel; security; TECHNOLOGY; TEKNIKVETENSKAP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, S. (2011). Micro-architectural Attacks and Countermeasures. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-65733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lu, Shiting. “Micro-architectural Attacks and Countermeasures.” 2011. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-65733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lu, Shiting. “Micro-architectural Attacks and Countermeasures.” 2011. Web. 14 Oct 2019.

Vancouver:

Lu S. Micro-architectural Attacks and Countermeasures. [Internet] [Thesis]. KTH; 2011. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-65733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lu S. Micro-architectural Attacks and Countermeasures. [Thesis]. KTH; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-65733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

28. Cao, Jin. OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model.

Degree: Industrial Information and Control Systems, 2015, KTH

  In this Master Thesis, several common applications and Windows operating systemservices are modeled within the field of information security. This thesis focuses onapplying the… (more)

Subjects/Keywords: CySeMoL; EAAT; Operating System; Application Modeling; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cao, J. (2015). OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cao, Jin. “OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cao, Jin. “OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model.” 2015. Web. 14 Oct 2019.

Vancouver:

Cao J. OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cao J. OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

29. PASQUIER, JEAN-BAPTISTE. Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo.

Degree: Industrial Ecology, 2015, KTH

  In the last 20 years, on-going conflicts in eastern Democratic Republic of Congo (DRC) and neighbouring countries have led to massive displacements. In the… (more)

Subjects/Keywords: IDP; Nord-Kivu; food security; remote surveys; World Food Programme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

PASQUIER, J. (2015). Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-179640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

PASQUIER, JEAN-BAPTISTE. “Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-179640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

PASQUIER, JEAN-BAPTISTE. “Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo.” 2015. Web. 14 Oct 2019.

Vancouver:

PASQUIER J. Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-179640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

PASQUIER J. Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-179640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

30. Abaid, Mohammed. Evaluation of Jatropha Curcas as future en-ergy crop in some African countries.

Degree: Land and Water Resources Engineering, 2015, KTH

  Biofuels now days consider as one of the successful alternative to meet the challenges associated with climate change and peak oil, as well as… (more)

Subjects/Keywords: Biofuels; Jatropha Curcas; Africa; policies; environments and food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abaid, M. (2015). Evaluation of Jatropha Curcas as future en-ergy crop in some African countries. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abaid, Mohammed. “Evaluation of Jatropha Curcas as future en-ergy crop in some African countries.” 2015. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abaid, Mohammed. “Evaluation of Jatropha Curcas as future en-ergy crop in some African countries.” 2015. Web. 14 Oct 2019.

Vancouver:

Abaid M. Evaluation of Jatropha Curcas as future en-ergy crop in some African countries. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abaid M. Evaluation of Jatropha Curcas as future en-ergy crop in some African countries. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6]

.