10.6.2022 | Cybersecurity maturity : researching managerial views to develop a maturity model and cybersecurity health certificate | Tinna Rut Vídalín Egilsdóttir 1996-; Alexandra Líf Arnarsdóttir 2000-; Ingunn Káradóttir 1998-; Breki Benediktsson 1998- |
3.9.2014 | Developing a next-generation Mobile Security solution for Android | Rovelli, Paolo, 1988- |
28.5.2020 | Dumbainhunter 2.0 : hunting malicious domains | Brynjar Örn Grétarsson 1998-; Ingi Þór Sigurðsson 1998-; Steinar Sigurðsson 1996- |
1.1.2004 | Firewall handling | Alfreð Markússon |
25.6.2020 | Frameworks for centralized authentication and authorization | Erikson, Ken Håkan, 1995- |
31.1.2019 | Heimdallur - Interface For Publicly Accessible Internet Services | Anna Dís Arnarsdóttir 1993-; Eyþór Andri Einarsson 1994-; Þórdís Þuríður Aikman 1994- |
19.2.2018 | Heimdallur - Vulnerability Detection Through Internet Scanning | Heiðar Karl Ragnarsson 1986-; Hlynur Óskar Guðmundsson 1996-; Tinna Sigurðardóttir 1990- |
23.6.2021 | Near Field Communication for user centric IoT device pairing and authentication | Rasmus Henrik Johan Karlsson 1997- |
29.9.2021 | Off-chain execution of IoT Smart Contracts | Matteo Guerrini 1997-; William Paciaroni 1997- |
18.6.2021 | PassDB : parser for password dump database | Eva Ösp Björnsdóttir 1988-; Ingibjörg Guðmundsdóttir 1988-; Gunnsteinn Geirsson 1980-; Þorsteinn Atli Georgsson 1986- |
27.6.2022 | Security in home IoT environments | Antti Kuismanen 2000- |
3.2.2014 | The security properties of in-network aggression | Kristján Valur Jónsson 1966- |
28.5.2020 | Syndis Share | Daði Steinn Brynjarsson 1990-; Tyler Elías Jones 1991- |
22.2.2018 | Using Autocorrelations to Detect Potential Side-Channels | Caroline Butschek 1989- |