12.6.2024 | CIPHER : comprehensive inline assembly and solidity detection for enhanced smart contract security | Niku Waltteri Saulinpoika Nuutinen 1996- |
10.6.2022 | Cybersecurity maturity : researching managerial views to develop a maturity model and cybersecurity health certificate | Alexandra Líf Arnarsdóttir 2000-; Breki Benediktsson 1998-; Ingunn Káradóttir 1998-; Tinna Rut Vídalín Egilsdóttir 1996- |
3.9.2014 | Developing a next-generation Mobile Security solution for Android | Rovelli, Paolo, 1988- |
11.6.2024 | Does the adoption of cybersecurity best practices influence individuals’ susceptibility to online financial fraud? | Íris Lilja Sverrisdóttir 2001-; Ísabella Mjöll Þrastardóttir 2001- |
28.5.2020 | Dumbainhunter 2.0 : hunting malicious domains | Brynjar Örn Grétarsson 1998-; Ingi Þór Sigurðsson 1998-; Steinar Sigurðsson 1996- |
24.5.2023 | Escaping cyber attacks | Jón Goði Ingvarsson 1999-; Jóna Karen Þorbjörnsdóttir 2001-; Rut Tryggvadóttir 2000- |
1.1.2004 | Firewall handling | Alfreð Markússon |
25.6.2020 | Frameworks for centralized authentication and authorization | Erikson, Ken Håkan, 1995- |
31.1.2019 | Heimdallur - Interface For Publicly Accessible Internet Services | Anna Dís Arnarsdóttir 1993-; Eyþór Andri Einarsson 1994-; Þórdís Þuríður Aikman 1994- |
19.2.2018 | Heimdallur - Vulnerability Detection Through Internet Scanning | Heiðar Karl Ragnarsson 1986-; Hlynur Óskar Guðmundsson 1996-; Tinna Sigurðardóttir 1990- |
10.6.2024 | IceStation : getting our noses deep into Iceland's cellular infrastructure! | Elvar Árni Bjarnason 2002-; Konráð Elí Sigurgeirsson 1995-; Samúel Arnar Hafsteinsson 2002- |
11.6.2024 | Keystrike sanctum guard web API | Haraldur Jón Friðriksson 2002-; Kristófer Fannar Björnsson 2002-; Logi Sigurðarson 2002- |
14.6.2022 | Lookey : building a public key database to discover the origin of compromised private keys | Guðjón Ingi Valdimarsson 2000-; Halla Margrét Jónsdóttir 1999-; Ísól Sigurðardóttir 1997- |
23.6.2021 | Near Field Communication for user centric IoT device pairing and authentication | Rasmus Henrik Johan Karlsson 1997- |
29.9.2021 | Off-chain execution of IoT Smart Contracts | Matteo Guerrini 1997-; William Paciaroni 1997- |
19.6.2024 | Optimizing cybersecurity knowledge : a comparison between spaced and massed microlearning | Sarah Julia Herrmann 1972- |
18.6.2021 | PassDB : parser for password dump database | Eva Ösp Björnsdóttir 1988-; Ingibjörg Guðmundsdóttir 1988-; Gunnsteinn Geirsson 1980-; Þorsteinn Atli Georgsson 1986- |
3.2.2014 | The security properties of in-network aggregation | Kristján Valur Jónsson 1966- |
28.5.2020 | Syndis Share | Daði Steinn Brynjarsson 1990-; Tyler Elías Jones 1991- |
12.6.2024 | Tear down the firewall! | Davide Parente 1999- |
22.2.2018 | Using Autocorrelations to Detect Potential Side-Channels | Caroline Butschek 1989- |