Hopp til hovedinnhold
UiO
Universitetet i Oslo
No
En
Meny
For ansatte
Mine studier
S?k i nettsidene til UiO
S?k
篮球即时比分_nba比分直播-彩客网重点推荐
篮球即时比分_nba比分直播-彩客网重点推荐
篮球即时比分_nba比分直播-彩客网重点推荐
Livet rundt studiene
Tjenester og verkt?y
Om UiO
Personer
Undermeny
篮球即时比分_nba比分直播-彩客网重点推荐
Finn studier
Informatikk: informasjonssikkerhet (master)
Oppbygging og gjennomf?ring
Masteroppgaver
篮球即时比分_nba比分直播-彩客网重点推荐
>
Finn studier
>
Informatikk: informasjonssikkerhet (master)
>
Oppbygging og gjennomf?ring
>
Masteroppgaver
Informatikk: informasjonssikkerhet (master)
Masteroppgaver
Tabellen viser ledige masteroppgaver for informatikk: informasjonssikkerhet.
Sidetittel
Publisert
Veileder(e)
Sustainability attacks on blockchain platforms
6. apr. 2026
Audun J?sang,
Alina Lapina
Energy consumption of blockchain-based systems
6. apr. 2026
Audun J?sang,
Alina Lapina
A Data-Centric Approach to Context-Aware Email Scenario Generation via Adversarially Guided Synthetic Data Curation
5. apr. 2026
Vasileios Mavroeidis
Advanced Steganalysis in the Era of AI and Modern Forensics
28. nov. 2025
Tamas Gy?rgy Bisztray
Shocks to the System: How Major Events Shift Cyber Risk Perception
18. nov. 2025
Lillian R?stad
Cause-and-Effect of Adversarial Techniques in Operational Technology (OT)
10. nov. 2025
Robert Andrew Chetwyn
Prompt Hunt – A Threat Hunting Framework for adversarial intent in LLM prompts
3. nov. 2025
Robert Andrew Chetwyn
Semantic-Incremental Rough-Set Framework for Adaptive and Explainable Cyber Threat Intelligence
21. okt. 2025
Vasileios Mavroeidis,
Gudmund Grov
Confidential Computing
13. okt. 2025
Ijlal Loutfi
Opplevd sikkerhet og reell sikkerhet i skyteknologi
26. sep. 2025
Janne Merete Hagen
Risikostyring i skyteknologi – har anbefalte risikoreduserende tiltak effect
26. sep. 2025
Janne Merete Hagen
Generating Red-Team Adversarial Emulations: From Reports to CACAO Attack Playbooks and Executable Caldera Emulations Using Large Language Models
25. sep. 2025
Mateusz Zych,
Vasileios Mavroeidis,
Robert Andrew Chetwyn
Automated Generation of Precise Reasoning Rules for Cybersecurity Knowledge Using LLMs
25. sep. 2025
Vasileios Mavroeidis,
Mateusz Zych,
Gudmund Grov,
Robert Andrew Chetwyn
Potentials and challenges for EU cybersecurity cooperation
25. sep. 2025
Vasileios Mavroeidis,
Erik Kursetgjerde
Impacts of the EU cyber acts
25. sep. 2025
Vasileios Mavroeidis,
Josephine Kjelsrud
Automating Cybersecurity Knowledge Representation with LLM-Driven Ontology Construction
25. sep. 2025
Vasileios Mavroeidis,
Gudmund Grov,
Mateusz Zych
Rammeverk for trusselmodellering av KI-drevne systemer
21. sep. 2025
Gudmund Grov
Digital Forensics
12. sep. 2025
Hans Vatne Hansen,
Namrah Azam
Hacking AI-Powered Chatbots with Social Engineering (taken)
2. sep. 2025
Tamas Gy?rgy Bisztray
Detecting Deepfake Audio for Voice Authentication Security (taken)
2. sep. 2025
Tamas Gy?rgy Bisztray
Jailbreaking Large Language Models for System-Level Exploitation (taken)
2. sep. 2025
Tamas Gy?rgy Bisztray
AI-Assisted Detection of Privacy-Sensitive Content in Images (taken)
2. sep. 2025
Tamas Gy?rgy Bisztray
Uncovering Behavioural Biometric Web-Tracking
2. sep. 2025
Nils Gruschka,
Florian Dehling
Evaluating the Security of LLM-Based Code Generation Across Programming Languages (taken)
1. sep. 2025
Tamas Gy?rgy Bisztray
Benchmarking AI-Assisted Vulnerability Detection in Code
1. sep. 2025
Tamas Gy?rgy Bisztray
Vis p?g?ende og avsluttede masteroppgaver
1
2
3
Neste side
RSS-str?m fra denne siden