Students supervised by Gadyatskaya, dr. O. (Olga)



Note: the overview per supervisor is likely partially incomplete.

36 entries found.



ProgramYearRole Student Thesis Content
Master ICT in Business a...2024second supervisorAggelen, B. van (Bram)RPG: What Role Should NCSC-NL Play?
Master ICT in Business a...2024first supervisorAbdul, S. (Shamir)Identifying Emerging Trends and Technologies: How Banks Can Prepare th...
Master ICT in Business a...2024first supervisorVen, T. van de (Tim) Cyber Espionage within the Dutch Industry and Educational Sector
Master Computer Science2024first supervisorYuan, Y. (Yuang)Ensemble Methods of Malicious Domain Detection using Whois Features an...
Bachelor Informatica & E...2024first supervisorBrinke, W. ten (Wouter)Secure Software Development at BDO Today and Tomorrow: The Current Met...
Bachelor Informatica2024second supervisorAdwan, A. (Amr)Impact of Hyperparameters on Model Performance in Split Learning
Bachelor Informatica2024second supervisorDeutz, F. (Fenna)Implementing a Storage Solution Sacilitating Future Analysis of ADTs G...
Bachelor Informatica2024second supervisorFazlija, R. (Reshit)Development of User-Friendly Interfaces In a Technical Tool Used To Cr...
Bachelor Informatica2024second supervisorHebinck, J. (Jayme)ADT Create: Determination of Equivalence and Satisfiability of Attack-...
Bachelor Informatica2024first supervisorHulsebosch, H. (Hugo) An Exploration of C2 Server Fingerprinting Capabilities with Probed HT...
Bachelor Informatica2024first supervisorKuiper, D. (Daniel)Automating Dynamic Analysis of Python Proof of Concept Exploits
Master ICT in Business a...2023first supervisorWan, Y (Yun)A Research regarding how IT professionals conduct risk classification ...
Master ICT in Business a...2023first supervisorWee, A. (Alex)Considerations for the Adoption of a Secure Software Development Fra...
Master Computer Science2023first supervisorSun, FeiyangExplenation of XAI clustering methods on Android malware family caterg...
Bachelor Informatica & E...2023second supervisorKlumperbeek, S. (Simeon)The Impact of Social Media Discourse on Market Reactions to Data Breac...
Bachelor Informatica & E...2023first supervisorBraams, V. (Viola)Fake news during the Dutch elections: automatic classification and go...
Bachelor Informatica2023second supervisorBerg, J. van den (Joren)Expanding Side-Channel Data Sets Using Conditional Generative Adversar...
Bachelor Informatica2023second supervisorMassa, R. (Rajeck)Implementation and Evaluation of a Detection Tool for Data Hiding Tech...
Bachelor Informatica2023second supervisorMeza Orellana, S.G. (Stephan)ADTLang: A Declarative Language to Describe Attack Defense Trees
Bachelor Informatica2023second supervisorMohalaia, M. (Marwa)Implementing a User Interface for Attack-Defense Tree WebApp Using Hum...
Bachelor Informatica2023second supervisorOei, J. (Jimmy)Automated Dynamic Analysis of Java Exploit Proof-of-Concepts
Master ICT in Business a...2022first supervisorIhsan, FalihSecurity Challenges in a Smart Home IoT
Master ICT in Business a...2022first supervisorPang, AliciaBehaviour models of consultants and developers about privacy-by-desig...
Master Computer Science2022second supervisorMoradi, A.Federated Learning: literature review and hyperparameter importance.
Master Computer Science2022first supervisorVos, L.Automatically testing libraries symbolically
Bachelor Informatica & E...2022second supervisorHaasnoot, F. Predicting Fake News via Stance Detection
Bachelor Informatica & E...2022first supervisorHulsker, K.A first draft for an evaluation method for SMEs to select a SIEM solut...
Bachelor Informatica2022first supervisorBuurman, D. (Dennis)Threat Intelligence Feed For Mobile Applications
Bachelor Informatica2022first supervisorSoulimani, O. (Oussama)Evaluating Android Malware Detection Explanation
Master ICT in Business a...2021first supervisorEgberts, JariBridging the gap between risk assessment and security operations
Master ICT in Business a...2021first supervisorTouhami, Mounaim BenQuantifying the Effectiveness of Cyber Security Awareness on Human Beh...
Master Computer Science2021first supervisorLiebens, AnneFeature Reduction Methods for Cyber Attack Detection
Bachelor Informatica & E...2021first supervisorDoek, A.Classification of Android applications using the Koodous data set
Bachelor Informatica2021first supervisorPeet, L. (Louise) van derMore than a one-time heist Identifying the current state of Android CP...
Bachelor Informatica2021first supervisorSpek, C. (Corne)Analyzing the Code Coverage of Android Apps using the Exerciser Monkey
Bachelor Informatica2021first supervisorStaaij, A. (Arthur) van derComposing instrumentation tools for Android apps