Hopp til hovedinnhold
UiO
Universitetet i Oslo
No
En
Meny
For ansatte
Mine studier
S?k i nettsidene til UiO
S?k
澳门葡京手机版app下载
澳门葡京手机版app下载
澳门葡京手机版app下载
Livet rundt studiene
Tjenester og verkt?y
Om UiO
Personer
Undermeny
澳门葡京手机版app下载
Finn studier
Informatikk: informasjonssikkerhet (master)
Oppbygging og gjennomf?ring
Masteroppgaver
澳门葡京手机版app下载
>
Finn studier
>
Informatikk: informasjonssikkerhet (master)
>
Oppbygging og gjennomf?ring
>
Masteroppgaver
Informatikk: informasjonssikkerhet (master)
Masteroppgaver
Tabellen viser ledige masteroppgaver for informatikk: informasjonssikkerhet.
Sidetittel
Publisert
Veileder(e)
Prompt Hunt – A Threat Hunting Framework for adversarial intent in LLM prompts
3. nov. 2025
Robert Andrew Chetwyn
Semantic-Incremental Rough-Set Framework for Adaptive and Explainable Cyber Threat Intelligence
21. okt. 2025
Vasileios Mavroeidis,
Gudmund Grov
Confidential Computing
13. okt. 2025
Ijlal Loutfi
Opplevd sikkerhet og reell sikkerhet i skyteknologi
26. sep. 2025
Janne Merete Hagen
Risikostyring i skyteknologi – har anbefalte risikoreduserende tiltak effect
26. sep. 2025
Janne Merete Hagen
Generating Red-Team Adversarial Emulations: From Reports to CACAO Attack Playbooks and Executable Caldera Emulations Using Large Language Models
25. sep. 2025
Mateusz Zych,
Vasileios Mavroeidis,
Robert Andrew Chetwyn
Automated Generation of Precise Reasoning Rules for Cybersecurity Knowledge Using LLMs
25. sep. 2025
Vasileios Mavroeidis,
Mateusz Zych,
Gudmund Grov,
Robert Andrew Chetwyn
Potentials and challenges for EU cybersecurity cooperation
25. sep. 2025
Vasileios Mavroeidis,
Erik Kursetgjerde
Impacts of the EU cyber acts
25. sep. 2025
Vasileios Mavroeidis,
Josephine Kjelsrud
Automating Cybersecurity Knowledge Representation with LLM-Driven Ontology Construction
25. sep. 2025
Vasileios Mavroeidis,
Gudmund Grov,
Mateusz Zych
Context Engineering for Security-Focused AI Agents
22. sep. 2025
Robert Andrew Chetwyn
Rammeverk for trusselmodellering av KI-drevne systemer
21. sep. 2025
Gudmund Grov
Security and Complexity Evaluation of AI-Generated Websites: A Case Study on DeepSite
17. sep. 2025
Rebeka Toth,
Tamas Gy?rgy Bisztray
Digital Forensics
12. sep. 2025
Hans Vatne Hansen,
Namrah Azam
Analysis of Publicly Reported Phishing Sites: Common Features and Trends
11. sep. 2025
Rebeka Toth
User Awareness & Detection of Simulated Phishing via Passive Techniques
11. sep. 2025
Rebeka Toth
Hacking AI-Powered Chatbots with Social Engineering
2. sep. 2025
Tamas Gy?rgy Bisztray
Detecting Deepfake Audio for Voice Authentication Security
2. sep. 2025
Tamas Gy?rgy Bisztray
Jailbreaking Large Language Models for System-Level Exploitation
2. sep. 2025
Tamas Gy?rgy Bisztray
AI-Assisted Detection of Privacy-Sensitive Content in Images
2. sep. 2025
Tamas Gy?rgy Bisztray
AI-Assisted Detection of Steganographic Content in Images
2. sep. 2025
Tamas Gy?rgy Bisztray
Uncovering Behavioural Biometric Web-Tracking
2. sep. 2025
Nils Gruschka,
Florian Dehling
Evaluating the Security of LLM-Based Code Generation Across Programming Languages
1. sep. 2025
Tamas Gy?rgy Bisztray
Benchmarking AI-Assisted Vulnerability Detection in Code
1. sep. 2025
Tamas Gy?rgy Bisztray