1.1.2004 | Firewall handling | Alfreð Markússon |
3.2.2014 | The security properties of in-network aggression | Kristján Valur Jónsson 1966- |
3.9.2014 | Developing a next-generation Mobile Security solution for Android | Rovelli, Paolo, 1988- |
19.2.2018 | Heimdallur - Vulnerability Detection Through Internet Scanning | Heiðar Karl Ragnarsson 1986-; Hlynur Óskar Guðmundsson 1996-; Tinna Sigurðardóttir 1990- |
22.2.2018 | Using Autocorrelations to Detect Potential Side-Channels | Caroline Butschek 1989- |
31.1.2019 | Heimdallur - Interface For Publicly Accessible Internet Services | Anna Dís Arnarsdóttir 1993-; Eyþór Andri Einarsson 1994-; Þórdís Þuríður Aikman 1994- |
28.5.2020 | Dumbainhunter 2.0 : hunting malicious domains | Brynjar Örn Grétarsson 1998-; Ingi Þór Sigurðsson 1998-; Steinar Sigurðsson 1996- |
28.5.2020 | Syndis Share | Daði Steinn Brynjarsson 1990-; Tyler Elías Jones 1991- |
25.6.2020 | Frameworks for centralized authentication and authorization | Erikson, Ken Håkan, 1995- |
18.6.2021 | PassDB : parser for password dump database | Eva Ösp Björnsdóttir 1988-; Ingibjörg Guðmundsdóttir 1988-; Gunnsteinn Geirsson 1980-; Þorsteinn Atli Georgsson 1986- |
23.6.2021 | Near Field Communication for user centric IoT device pairing and authentication | Rasmus Henrik Johan Karlsson 1997- |
29.9.2021 | Off-chain execution of IoT Smart Contracts | Matteo Guerrini 1997-; William Paciaroni 1997- |
10.6.2022 | Cybersecurity maturity : researching managerial views to develop a maturity model and cybersecurity health certificate | Alexandra Líf Arnarsdóttir 2000-; Breki Benediktsson 1998-; Ingunn Káradóttir 1998-; Tinna Rut Vídalín Egilsdóttir 1996- |
14.6.2022 | Lookey : building a public key database to discover the origin of compromised private keys | Guðjón Ingi Valdimarsson 2000-; Halla Margrét Jónsdóttir 1999-; Ísól Sigurðardóttir 1997- |
24.5.2023 | Escaping cyber attacks | Jón Goði Ingvarsson 1999-; Jóna Karen Þorbjörnsdóttir 2001-; Rut Tryggvadóttir 2000- |