36 entries found.
Program | Year | Role |
Student |
Thesis |
Content |
---|
Master ICT in Business a... | 2024 | second supervisor | Aggelen, B. van (Bram) | RPG: What Role Should NCSC-NL Play? | |
Master ICT in Business a... | 2024 | first supervisor | Abdul, S. (Shamir) | Identifying Emerging Trends and Technologies: How Banks Can Prepare th... | |
Master ICT in Business a... | 2024 | first supervisor | Ven, T. van de (Tim) | Cyber Espionage within the Dutch Industry and Educational Sector | |
Master Computer Science | 2024 | first supervisor | Yuan, Y. (Yuang) | Ensemble Methods of Malicious Domain Detection using Whois Features an... | |
Bachelor Informatica & E... | 2024 | first supervisor | Brinke, W. ten (Wouter) | Secure Software Development at BDO Today and Tomorrow: The Current Met... | |
Bachelor Informatica | 2024 | second supervisor | Adwan, A. (Amr) | Impact of Hyperparameters on Model Performance in Split Learning | |
Bachelor Informatica | 2024 | second supervisor | Deutz, F. (Fenna) | Implementing a Storage Solution Sacilitating Future Analysis of ADTs G... | |
Bachelor Informatica | 2024 | second supervisor | Fazlija, R. (Reshit) | Development of User-Friendly Interfaces In a Technical Tool Used To Cr... | |
Bachelor Informatica | 2024 | second supervisor | Hebinck, J. (Jayme) | ADT Create: Determination of Equivalence and Satisfiability of Attack-... | |
Bachelor Informatica | 2024 | first supervisor | Hulsebosch, H. (Hugo) | An Exploration of C2 Server Fingerprinting Capabilities with Probed HT... | |
Bachelor Informatica | 2024 | first supervisor | Kuiper, D. (Daniel) | Automating Dynamic Analysis of Python Proof of Concept Exploits | |
Master ICT in Business a... | 2023 | first supervisor | Wan, Y (Yun) | A Research regarding how IT professionals conduct risk classification ... | |
Master ICT in Business a... | 2023 | first supervisor | Wee, A. (Alex) | Considerations for the Adoption of a Secure Software Development Fra... | |
Master Computer Science | 2023 | first supervisor | Sun, Feiyang | Explenation of XAI clustering methods on Android malware family caterg... | |
Bachelor Informatica & E... | 2023 | second supervisor | Klumperbeek, S. (Simeon) | The Impact of Social Media Discourse on Market Reactions to Data Breac... | |
Bachelor Informatica & E... | 2023 | first supervisor | Braams, V. (Viola) | Fake news during the Dutch elections: automatic classification and go... | |
Bachelor Informatica | 2023 | second supervisor | Berg, J. van den (Joren) | Expanding Side-Channel Data Sets Using Conditional Generative Adversar... | |
Bachelor Informatica | 2023 | second supervisor | Massa, R. (Rajeck) | Implementation and Evaluation of a Detection Tool for Data Hiding Tech... | |
Bachelor Informatica | 2023 | second supervisor | Meza Orellana, S.G. (Stephan) | ADTLang: A Declarative Language to Describe Attack Defense Trees | |
Bachelor Informatica | 2023 | second supervisor | Mohalaia, M. (Marwa) | Implementing a User Interface for Attack-Defense Tree WebApp Using Hum... | |
Bachelor Informatica | 2023 | second supervisor | Oei, J. (Jimmy) | Automated Dynamic Analysis of Java Exploit Proof-of-Concepts | |
Master ICT in Business a... | 2022 | first supervisor | Ihsan, Falih | Security Challenges in a Smart Home IoT | |
Master ICT in Business a... | 2022 | first supervisor | Pang, Alicia | Behaviour models of consultants and developers about privacy-by-desig... | |
Master Computer Science | 2022 | second supervisor | Moradi, A. | Federated Learning: literature review and hyperparameter importance. | |
Master Computer Science | 2022 | first supervisor | Vos, L. | Automatically testing libraries symbolically | |
Bachelor Informatica & E... | 2022 | second supervisor | Haasnoot, F. | Predicting Fake News via Stance Detection | |
Bachelor Informatica & E... | 2022 | first supervisor | Hulsker, K. | A first draft for an evaluation method for SMEs to select a SIEM solut... | |
Bachelor Informatica | 2022 | first supervisor | Buurman, D. (Dennis) | Threat Intelligence Feed For Mobile Applications | |
Bachelor Informatica | 2022 | first supervisor | Soulimani, O. (Oussama) | Evaluating Android Malware Detection Explanation | |
Master ICT in Business a... | 2021 | first supervisor | Egberts, Jari | Bridging the gap between risk assessment and security operations | |
Master ICT in Business a... | 2021 | first supervisor | Touhami, Mounaim Ben | Quantifying the Effectiveness of Cyber Security Awareness on Human Beh... | |
Master Computer Science | 2021 | first supervisor | Liebens, Anne | Feature Reduction Methods for Cyber Attack Detection | |
Bachelor Informatica & E... | 2021 | first supervisor | Doek, A. | Classification of Android applications using the Koodous data set | |
Bachelor Informatica | 2021 | first supervisor | Peet, L. (Louise) van der | More than a one-time heist Identifying the current state of Android CP... | |
Bachelor Informatica | 2021 | first supervisor | Spek, C. (Corne) | Analyzing the Code Coverage of Android Apps using the Exerciser Monkey | |
Bachelor Informatica | 2021 | first supervisor | Staaij, A. (Arthur) van der | Composing instrumentation tools for Android apps | |