Below is a list of research projects per academic year.
Each year has two research project periods of one month each, called Research Project 1 and 2.
Research project 2 is the equivalent of the Master's Thesis.
Not all papers or presentations are represented since some are confidential.
See RP site
| ReportPresentation | Server agnostic DNS augmentation using eBPF | |
|---|---|---|
| Author: Tom Carpaij | Supervisors: Willem Toorop, Luuk Hendriks | |
| ReportPresentation | Incorporating post-quantum cryptography in a microservice environment | |
| Author: Daan Weller, Ronald van der Gaag | Supervisors: Cedric Van Bockhaven, Itan Barmes, Vincent van Mieghem | |
| ReportPresentation | Malicious behavior detection based on CyberArk PAS logs through string matching and genetic neural networks | |
| Author: Mike Slotboom, Ivar Slotboom | Supervisors: Roel Bierens, Bartosz Czaszynski | |
| ReportPresentation | Detecting Botnets Communicating with Command and Control Servers with DNS and NetFlow Data | |
| Author: Hoang Huynh, Mathijs Visser | Supervisors: Eddie Bijnen | |
| ReportPresentation | Advanced Persistent Threat detection for Industrial Control Systems | |
| Author: Dominika Rusek, Steffan Roobol | Supervisors: Derre Hendrik, Deneut Tijl | |
| ReportPresentation | Incentivize decentralized WiFi roaming through VPN on home routers | |
| Author: | Supervisors: Peter Boers | |
| ReportPresentation | Detecting Cobalt Strike beacons in NetFlow data | |
| Author: Vincent van der Eijk, Coen Schuijt | Supervisors: Ralph Koning | |
| ReportPresentation | Collecting telemetry data using P4 and RDMA | |
| Author: Silke Knossen, Rutger Beltman | Supervisors: Joseph Hill, Paola Grosso | |
| ReportPresentation | The integration of Ethernet Virtual Private Network in Kubernetes | |
| Author: Frank Potter | Supervisors: Attilla de Groot | |
| ReportPresentation | End-to-end security in LoRa and NB-IoT sensor networks. | |
| Author: Niek van Noort, Jason Kerssens | Supervisors: Cedric Both | |
| ReportPresentation | Performance comparison of VPN implementations WireGuard, strongSwan, and OpenVPN in a 1 Gbit/s environment | |
| Author: Patrick Spaans, Erik Dekker | Supervisors: Aristide Bouix, Mohammad Al Najar | |
| ReportPresentation | Analysis of Bypassing Detection by Microsoft Advanced Threat Analytics | |
| Author: Edgar Bohte, Nick Offerman | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | Iris recognition using low resolution photographs from commodity sensors | |
| Author: Roy Vermeulen | Supervisors: Zeno Geradts | |
| ReportPresentation | Deepfake detection through PRNU and logistic regression analyses | |
| Author: Catherine de Weever, Sebastian Wilczek | Supervisors: Zeno Geradts | |
| ReportPresentation | Monitoring an EVPN-VxLAN fabric with BGP Monitoring Protocol | |
| Author: Giacomo Casoni, Davide Pucci | Supervisors: Vivek Venkatraman, Donald Sharp, Attilla de Groot | |
| ReportPresentation | Defragmenting DNS: Determining the optimal maximum UDP response size for DNS | |
| Author: Axel Koolhaas, Tjeerd Slokker | Supervisors: Willem Toorop, Roland van Rijswijk-Deij | |
| ReportPresentation | Using TURN Servers as Proxies | |
| Author: Sean Liao | Supervisors: Cedric van Bockhaven, Jan Freudenreich | |
| ReportPresentation | An Evaluation of IPFS as a Distribution Mechanism for RPKI Repository | |
| Author: Dadepo Aderemi, Woudt van Steenbergen | Supervisors: Luuk Hendriks | |
| ReportPresentation | Securing home Wi-Fi with WPA3 personal | |
| Author: Raoul Dijksman, Erik Lamers | Supervisors: Arjan van der Vegt | |
| ReportPresentation | Investigative Research of an IP Peering Service for NetherLight | |
| Author: Arnold Buntsma, Mar Badias Simó | Supervisors: Gerben van Malenstein, Migiel de Vos, Max Mudde | |
| ReportPresentation | Securing the Automatic Dependent Surveillance-Broadcast (ADS-B) protocol against spoofing | |
| Author: Tim de Boer | Supervisors: Jan-Joris van Es, Nico de Gelder | |
| ReportPresentation | Requirements for extracting ENF data to correctly timestamp a video | |
| Author: Thomas Ouddeken, Niels den Otter | Supervisors: Zeno Geradts | |
| ReportPresentation | Automated reverse-engineering of CAN messages using OBD-II and correlation coefficients | |
| Author: Vincent Kieberl, Bram Blaauwendraad | Supervisors: Sander Ubink, Ruben Koeze | |
| ReportPresentation | Securely accessing remote sensors in critical infrastructures. | |
| Author: Pavlos Lontorfos | Supervisors: Cedric Both | |
| ReportPresentation | Zero Trust Network Security Model in containerized environments | |
|---|---|---|
| Author: Catherine de Weever, Marios Andreou | Supervisors: Jeroen Scheerder | |
| ReportPresentation | The Current State of DNS Resolversand RPKI Protection | |
| Author: Erik Dekker, Marius Brouwer | Supervisors: Willem Toorop | |
| ReportPresentation | Digital Forensic Investigation of Data Theft on the Google Cloud Platform | |
| Author: Frank Wiersma, Tjeerd Slokker | Supervisors: Korstiaan Stam | |
| ReportPresentation | APFS Slack Analysis and Detection of Hidden Data | |
| Author: Axel Koolhaas, Woudt van Steenbergen | Supervisors: Danny Kielman | |
| ReportPresentation | Elastic Named Data Network (NDN) for data centric application in cloud environments | |
| Author: Sean Liao | Supervisors: Zhiming Zhao | |
| ReportPresentation | Ibis Data Serialization in Apache Spark | |
| Author: Dadepo Aderemi, Mathijs Visser | Supervisors: Jason Maassen, Adam Belloum | |
| ReportPresentation | Anomaly Detection on Log Files Based on Simplicity Theory | |
| Author: Giacomo Casoni, Mar Badias Simó | Supervisors: Giovanni Sileno | |
| ReportPresentation | Analyzing and enhancing embedded software technologies on RISC-V64 using the Ghidra framework | |
| Author: Patrick Spaans, Joris Jonkers Both | Supervisors: Alexandru Geana, Karolina Mrozek, Dana Geist | |
| ReportPresentation | Security Evaluation on Amazon Web Services’ REST API Authentication Protocol Signature Version 4 | |
| Author: Hoang Huynh, Jason Kerssens | Supervisors: Alex Stavroulakis, Aristide Bouix | |
| ReportPresentation | Generating probable password candidates for the assessment of Dutch domain password hashes | |
| Author: Tom Broumels | Supervisors: Pim Campers | |
| ReportPresentation | Network Anomaly Detection in Modbus TCP Industrial Control Systems | |
| Author: Philipp Mieden, Rutger Beltman | Supervisors: Bartosz Czaszynski | |
| ReportPresentation | The influence of the training set size on the performance of the Robust Covariance Estimator as an anomaly detection algorithm on automotive CAN data | |
| Author: Silke Knossen, Vincent Kieberl | Supervisors: Colin Schappin | |
| ReportPresentation | Cybersecurity in Automotive Networks | |
| Author: Arnold Buntsma, Sebastian Wilczek | Supervisors: Colin Schappin | |
| ReportPresentation | Tunneling data over a Citrix virtual channel | |
| Author: Ward Bakker, Niels den Otter | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | Using Mimikatz’ driver, Mimidrv, to disable Windows Defender in Windows | |
| Author: Bram Blaauwendraad, Thomas Ouddeken | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | Detecting Fileless Malicious Behaviour of .NET C2 Agents using ETW | |
| Author: Alexander Bode, Niels Warnars | Supervisors: Leandro Velasco, Jeroen Klaver | |
| ReportPresentation | Scoring model for IoCs by combining open intelligence feeds to reduce false positives | |
| Author: Jelle Ermerins, Niek van Noort | Supervisors: Leandro Velasco, João Carlos De Novais Marques | |
| ReportPresentation | Using BGP Flow-Spec for distributed micro-segmentation | |
| Author: Davide Pucci | Supervisors: Attilla de Groot | |
| ReportPresentation | APFS checkpoint management behaviour in macOS | |
| Author: Maarten van der Slik | Supervisors: Zeno Geradts, Ruud Schramp | |
| ReportPresentation | Insight in Cyber Safety when Remotely Operating SCADA Systems of Dutch Critical Infrastructure Objects | |
| Author: Tina Tami | Supervisors: Cedric Both | |
| ReportPresentation | Mobility as a Service(MaaS) and Privacy | |
| Author: Alexander Blaauwgeers | Supervisors: Alex Stavroulakis | |
| ReportPresentation | Automated end-to-end e-mail component testing | |
|---|---|---|
| Author: Isaac Klop, Kevin Csuka | Supervisors: Michiel Leenaars | |
| ReportPresentation | Availability analysis of SURFwireless | |
| Author: Kasper van Brakel | Supervisors: Frans Panken | |
| ReportPresentation | Scaling AMS-IX Route Servers | |
| Author: David Garay | Supervisors: Stavros Konstantaras | |
| ReportPresentation | IoT (D)DoS prevention and corporate responsibility: A model to prevent polluting the internet | |
| Author: Swann Scholtes | Supervisors: Alex Stavroulakis | |
| ReportPresentation | Pairing attacks on the Bluetooth Low Energy Protocol | |
| Author: Vincent Breider, Marko Spithoff | Supervisors: Hidde-Jan Jongsma | |
| ReportPresentation | Planning and Scaling a Named Data Network with Persistent Identifier Interoperability | |
| Author: Kees de Jong, Anas Younis | Supervisors: Zhiming Zhao | |
| ReportPresentation | Bypassing phishing protections with email authentication | |
| Author: Adrien Raulot | Supervisors: Alex Stavroulakis, Marat Nigmatullin | |
| ReportPresentation | Practical Implications of Graphene-SGX | |
| Author: Robin Klusman, Derk Barten | Supervisors: Gijs Hollestelle | |
| ReportPresentation | Technical feasibility of Segment Routing Traffic Engineering to steer traffic through VNFs | |
|---|---|---|
| Author: Ronald van der Gaag, Mike Slotboom | Supervisors: Marijke Kaat, Eyle Brinkhuis | |
| ReportPresentation | Network Peering Dashboard for SURFnet | |
| Author: David Garay | Supervisors: Jac Kloots, Marijke Kaat | |
| ReportPresentation | Investigation of security on Chinese smartwatches | |
| Author: Kasper van Brakel, Renee Witsenburg | Supervisors: Alex Stavroulakis | |
| ReportPresentation | WhatsApp End-to-End Encryption: Are Our Messages Private? | |
| Author: Pavlos Lontorfos, Tom Carpaij | Supervisors: Alex Stavroulakis | |
| ReportPresentation | Probabilistic password recognition | |
| Author: Tiko Huizinga | Supervisors: Zeno Geradts | |
| ReportPresentation | Developing a contained and user emulated malware assessment platform | |
| Author: Siebe Hodzelmans, Frank Potter | Supervisors: Vincent van Mieghem, Henri Hambartsumyan | |
| ReportPresentation | Security evaluation of glucose monitoring applications for Android smartphones | |
| Author: Roy Vermeulen, Edgar Bohte | Supervisors: Ruud Verbij | |
| ReportPresentation | A Deep Dive into the Dark Web | |
| Author: Coen Schuijt | Supervisors: Stijn van Winsen, Soufiane el Aissaoui | |
| ReportPresentation | Client-side Attacks on the LastPass Browser Extension | |
| Author: Derk Barten | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | Characterization of a Cortex-M4 based microcontroller using optical fault injection | |
| Author: Jasper Hupkens, Dominika Rusek | Supervisors: Niek Timmers | |
| ReportPresentation | Invisible Internet Project (I2P) | |
| Author: Vincent Breider, Tim de Boer | Supervisors: Henri Hambartsumyan, Vincent van Mieghem, Fons Mijnen | |
| ReportPresentation | A Comparative Security Evaluation for IPv4 and Ipv6 Addresses | |
| Author: Erik Lamers, Vincent van der Eijk | Supervisors: Tobias Fiebig | |
| ReportPresentation | Development of Techniques to Remove Kerberos Credentials from Windows Systems | |
| Author: Nick Offerman, Steffan Roobol | Supervisors: Dima van de Wouw | |
| ReportPresentation | Security By Default: A Comparative Security Evaluation of Default Configurations | |
|---|---|---|
| Author: Bernardus Jansen | Supervisors: Tobias Fiebig, Ralph Koning | |
| ReportPresentation | Low-level writing to NTFS file systems | |
| Author: Rick van Gorp | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | A Blockchain based Data Production Traceability System | |
| Author: Sandino Moeniralam | Supervisors: Sjaak Koot | |
| ReportPresentation | An analysis of the scale-invariance of graph algorithms: A case study. | |
| Author: Tim van Zalingen | Supervisors: Merijn Verstraaten | |
| ReportPresentation | Opcode statistics for detecting compiler settings | |
| Author: Kenneth van Rijsbergen | Supervisors: Armijn Hemel | |
| ReportPresentation | Optimal network design of SURFnet8, using TI-LFA and Segment Routing | |
| Author: Péter Prjevara, Fouad Makioui | Supervisors: Marijke Kaat, Wouter Huisman | |
| ReportPresentation | DDoS Defense Mechanisms for IXP Infrastructures | |
| Author: Lennart van Gijtenbeek, Tim Dijkhuizen | Supervisors: Stavros Konstantaras | |
| ReportPresentation | Content-based Classification of Fraudulent Webshops | |
| Author: Sjors Haanen, Mick Cox | Supervisors: Marco Davids, Maarten Wullink | |
| ReportPresentation | Bypassing Phishing Filters | |
| Author: Shahrukh Zaidi | Supervisors: Rick van Galen, Alex Stavroulakis | |
| ReportPresentation | Improving Semantic Quality of Topic Models for Forensic Investigations | |
| Author: Henri Trenquier | Supervisors: Rob van Nieuwpoort, Carlos Martinez Ortiz | |
| ReportPresentation | Using Fault Injection to weaken RSA public key verification | |
| Author: Ivo van der Elzen | Supervisors: Ronan Loftus | |
| ReportPresentation | Automated analysis of AWS infrastructures | |
| Author: Peter Bennink | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | How to Spot the Blue Team | |
| Author: Rick Lahaye | Supervisors: Marc Smeets | |
| ReportPresentation | Towards predicting network device failures: An analysis of time-series and syslog data | |
| Author: Henk van Doorn, Chris Kuipers | Supervisors: Marijke Kaat, Peter Boers | |
| ReportPresentation | DoS on a Bitcoin Lightning Network channel. | |
| Author: Willem Rens | Supervisors: Oskar van Deventer, Maarten Everts | |
| ReportPresentation | Privacy analysis of DNS resolver solutions | |
| Author: Jeroen van Heugten | Supervisors: Martin Hoffmann, Ralph Dolmans | |
| ReportPresentation | Targeted GPS spoofing | |
| Author: Luc Gommans, Bart Hermans | Supervisors: Ralph Moonen | |
| ReportPresentation | Verifying email security techniques for Dutch organizations | |
| Author: Vincent van Dongen | Supervisors: George Thessalonikefs, Ralph Dolmans | |
| ReportPresentation | Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network | |
| Author: Dirk Gaastra, Kotaiba Alachkar | Supervisors: Henri Hambartsumyan, Vincent van Mieghem | |
| ReportPresentation | Tor: Hidden Service Intelligence Extraction | |
| Author: João Carlos De Novais Marques | Supervisors: Rik van Duijn, Leandro Velasco | |
| ReportPresentation | Microsoft Office Upload Center Cache Files in Forensic Investigations | |
|---|---|---|
| Author: Rick van Gorp, Kotaiba Alachkar | Supervisors: Yonne de Bruijn | |
| ReportPresentation | Network Functions Virtualization | |
| Author: Bernardus Jansen | Supervisors: Marijke Kaat | |
| ReportPresentation | Pentest Accountability By Analyzing Network Traffic & Network Traffic Metadata | |
| Author: Marko Spithoff, Henk van Doorn | Supervisors: Rick van Galen | |
| ReportPresentation | An Analysis of Atomic Swaps on and between Ethereum Blockchains using Smart Contracts | |
| Author: Peter Bennink, Lennart van Gijtenbeek | Supervisors: Oskar van Deventer, Maarten Everts | |
| ReportPresentation | Virtual infrastructure partitioning and provisioning under nearly real-time constraints | |
| Author: Andrey Afanas'yev | Supervisors: Zhiming Zhao, Arie Taal | |
| ReportPresentation | Feasibility of Cryptocurrency on Mobile devices | |
| Author: Sander Lentink, Anas Younis | Supervisors: Rick van Galen | |
| ReportPresentation | Capability analyses of mdtmFTP | |
| Author: Kees de Jong | Supervisors: Leon Gommans | |
| ReportPresentation | Deanonymisation in Ethereum Using Existing Methods for Bitcoin | |
| Author: Tim Dijkhuizen, Robin Klusman | Supervisors: Arno Bakker | |
| ReportPresentation | Breaking CAPTCHAs on the Dark Web | |
| Author: Dirk Gaastra, Kevin Csuka | Supervisors: Yonne de Bruijn | |
| ReportPresentation | Improving Machine Learning based Intrusion and Anomaly Detection on SCADA and DCS using Case Specific Information | |
| Author: Péter Prjevara | Supervisors: Dima van de Wouw | |
| ReportPresentation | Framework for profiling critical pathrelated algorithms | |
| Author: Henri Trenquier | Supervisors: Zhiming Zhao | |
| ReportPresentation | Containerized Workflow Scheduling | |
| Author: Isaac Klop | Supervisors: Zhiming Zhao | |
| ReportPresentation | Categorizing container escape methodologies in multi-tenant environments | |
| Author: Rik Janssen | Supervisors: Rick van Galen | |
| ReportPresentation | Detection of Browser Fingerprinting by Static JavaScript Code Classification | |
| Author: Sjors Haanen, Tim van Zalingen | Supervisors: Aidan Barrington | |
| ReportPresentation | Large-scale Netflow Information Management | |
| Author: Shahrukh Zaidi, Adrien Raulot | Supervisors: Marijke Kaat, Wim Biemolt | |
| ReportPresentation | Plug-and-play Raspberry Pi-based video filtration system: A novel approach to real-time on the wire reversible PII anonymization in video streams using commodity hardware | |
| Author: Swann Scholtes, Chris Kuipers | Supervisors: Junaid Chaudhry | |
| ReportPresentation | Probabilistic Passphrase Cracking | |
| Author: Luc Gommans | Supervisors: Melanie Rieback | |
| ReportPresentation | Measuring Performance Overhead of Trans-encrypting HTTP Adaptive Streaming | |
|---|---|---|
| Author: Abe Wiersma | Supervisors: Oskar van Deventer | |
| ReportPresentation | Formal verification of the implementation of the MQTT protocol in IoT devices | |
| Author: Kris Mladenov | Supervisors: Rick van Galen | |
| ReportPresentation | Automated embedding of dynamic libraries into iOS applications from GNU/Linux | |
| Author: Marwin Baumann, Leandro Velasco | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | Security considerations in Docker Swarm networking | |
| Author: Marcel Brouwers | Supervisors: Esan Wit | |
| ReportPresentation | Calculating the Energy Consumption of a Website | |
| Author: Anouk Boukema | Supervisors: Maarten de Waard | |
| ReportPresentation | A hybrid system for automatic exchanges of routing information | |
| Author: Stamatios Maritsas | Supervisors: Stavros Konstantaras | |
| ReportPresentation | Improving the Energy Efficiency of SURFwireless | |
| Author: Jeroen van Leur | Supervisors: Frans Panken, Marijke Kaat | |
| ReportPresentation | Application aware digital objects access and distribution using Named Data Networking (NDN) | |
| Author: Rahaf Mousa | Supervisors: Zhiming Zhao, Lucia D'Acunto, Paul Martin | |
| ReportPresentation | Collecting, cataloguing and searching performance information of Cloud resources | |
| Author: Olaf Elzinga | Supervisors: Zhiming Zhao, Arie Taal | |
| ReportPresentation | Feasibility of ILA as Network Virtualization Overlay in multi-tenant, multi-domain Cloud | |
| Author: Tako Marks | Supervisors: Lukasz Makowski, Paola Grosso | |
| ReportPresentation | Parallelization of BGP for route server functionality: A protocol and implementation study | |
| Author: Jenda Brands, Patrick de Niet | Supervisors: Stavros Konstantaras, Aris Lambrianidis | |
| ReportPresentation | eBPF Based Networking | |
| Author: Nick de Bruijn | Supervisors: Lukasz Makowski, Paola Grosso | |
| ReportPresentation | Session based high bandwidth throughput testin | |
| Author: Bram ter Borch | Supervisors: David Groep, Tristan Suerink | |
| ReportPresentation | Freenet Darknet Mapping | |
| Author: Kees Halvemaan | Supervisors: Yonne de Bruijn, Lennart Haagsma | |
| ReportPresentation | Discriminating reflective (D)DoS attack tools at the reflector | |
| Author: Fons Mijnen, Max Grim | Supervisors: Lennart Haagsma | |
| ReportPresentation | Segment Routing in Container Networks | |
| Author: Ben de Graaff | Supervisors: Marijke Kaat | |
| ReportPresentation | Unintended metadata leakage at the Dutch Government | |
| Author: Auke Zwaan | Supervisors: Alex Stavroulakis, Sukalp Bhople | |
| ReportPresentation | Kerberos Credential Thievery (GNU/Linux) | |
| Author: Arne Zismer, Ronan Loftus | Supervisors: Cedric van Bockhaven | |
| ReportPresentation | Thinking in possibilities for federated log out. | |
|---|---|---|
| Author: Marcel den Reijer, Fouad Makioui | Supervisors: Thijs Kinkhorst, Joost van Dijk | |
| ReportPresentation | Extending the range of NFC capable devices | |
| Author: Sandino Moeniralam, Bart Hermans | Supervisors: Jordi van den Breekel, Jarno van de Moosdijk | |
| ReportPresentation | Automatic comparison of photo response non uniformity (PRNU) on Youtube | |
| Author: Marcel Brouwers, Rahaf Mousa | Supervisors: Zeno Geradts | |
| ReportPresentation | Repurposing defensive technologies for offensive Red Team operation | |
| Author: Arne Zismer, Kris Mladenov | Supervisors: Ari Davies | |
| ReportPresentation | Security and Performance Analysis of Encrypted NoSQL Database | |
| Author: Abe Wiersma, Max Grim | Supervisors: Fatih Turkmen | |
| ReportPresentation | Android 7 File Based Encryption and the Attacks Against It | |
| Author: Marwin Baumann, Ronan Loftus | Supervisors: Rick van Galen | |
| ReportPresentation | Advantages of Anomaly Detection Between the Controlling Unit and the Process Devices of an Industrial Control System | |
| Author: Rick Lahaye, Anouk Boukema | Supervisors: Coen Steenbeek, Dima van de Wouw | |
| ReportPresentation | Hiding in open sight: Dynamic profiles for malware communication | |
| Author: João Carlos De Novais Marques, Mick Cox | Supervisors: Cedric van Bockhaven, Ari Davies | |
| ReportPresentation | Website fingerprinting attacks against Tor Browser Bundle: a comparison between HTTP/1.1 and HTTP/2 | |
| Author: Kees Halvemaan, Tako Marks | Supervisors: David Vaartjes, Jurgen Kloosterman | |
| ReportPresentation | Techniques for detecting compromised IoT devices | |
| Author: Ivo van der Elzen, Jeroen van Heugten | Supervisors: Rogier Spoor | |
| ReportPresentation | Automated Windows lab Deployment | |
| Author: Vincent van Dongen, Fons Mijnen | Supervisors: Marc Smeets | |
| ReportPresentation | Reliable Library Identification Using VMI Techniques | |
| Author: Leandro Velasco, Nick de Bruijn | Supervisors: Ralph Koning, Ben de Graaff | |
| ReportPresentation | Browser forensics: adblocker extensions. | |
| Author: Willem Rens | Supervisors: Johannes de Vries | |
| ReportPresentation | Designing an open source DMARC aggregation tool | |
|---|---|---|
| Author: Yadvir Singh | Supervisors: Michiel Leenaars | |
| ReportPresentation | Design Exploration of Transparency Enhancing Technology for Government | |
| Author: Thijs Houtenbos | Supervisors: Guido van 't Noordende | |
| ReportPresentation | Adding An Unusual Transport To The Serval Project | |
| Author: Alexandros Tsiridis, Joseph Hill | Supervisors: Paul Gardner-Stephen | |
| ReportPresentation | Taking a closer look at IRATI | |
| Author: Koen Veelenturf | Supervisors: Marijke Kaat, Ralph Koning | |
| ReportPresentation | Machine Detectable Network Behavioural Commonalities for Exploits and Malware | |
| Author: Alexandros Stavroulakis | Supervisors: Adrianus Warmenhoven | |
| ReportPresentation | On the feasibility of converting AMS-IX to an Industrial-Scale Software Defined Internet Exchange Point | |
| Author: Siem Hermans, Jeroen Schutrup | Supervisors: Joris Claassen, Arien Vijnn | |
| ReportPresentation | Power Efficiency of Hypervisor-based Virtualization versus Container-based Virtualization | |
| Author: Jeroen van Kessel | Supervisors: Arie Taal, Paola Grosso | |
| ReportPresentation | Analysing the feasibility of portable passive detection of Advanced Persistent Threats | |
| Author: Guido Kroon | Supervisors: Marco Davids, Cristian Hesselman | |
| ReportPresentation | Namecoin as alternative to the Domain Name System | |
| Author: Xander Lammertink | Supervisors: Marco Davids, Cristian Hesselman | |
| ReportPresentation | Dynamic access control analysis in WordPress plugins | |
| Author: Frank Uijtewaal | Supervisors: Patrick Jagusiak | |
| ReportPresentation | TLS Session Key Extraction from Memory on iOS Devices | |
| Author: Thomas Curran, Marat Nigmatullin | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | Developing an Ethereum Blockchain Application | |
| Author: Nikolaos Triantafyllidis | Supervisors: Oskar van Deventer, Erwin Middelesch | |
| ReportPresentation | Extremely Sensitive Communication: secure, secret, and private e-mail | |
| Author: Loek Sangers | Supervisors: Ruud Verbij | |
| ReportPresentation | Partition under disruption improves computer network delivery | |
| Author: Lukasz Makowski | Supervisors: Marc Makkes | |
| ReportPresentation | Restoring TCP sessions with a DHT | |
| Author: Peter Boers | Supervisors: Attilla de Groot, Pete Lumbis, Rama Darbha | |
| ReportPresentation | Bypassing 802.1X in an IPv6 configured network | |
| Author: Ruben de Vries, Robert Diepeveen | Supervisors: Henri Hambartsumyan, Arris Huijgen | |
| ReportPresentation | SDIO as a new peripheral attack vector | |
| Author: Thom Does, Dana Geist | Supervisors: Cedric Van Bockhaven | |
| ReportPresentation | The Design of Malware on Modern Hardware: Malware Inside Intel SGX Enclaves | |
| Author: Jeroen van Prooijen | Supervisors: Marc X. Makkes, Kaveh Razavi | |
| ReportPresentation | Using Sensitive Information on Android 6 Based Smartphones | |
| Author: Romke van Dijk | Supervisors: Ruud Verbij | |
| ReportPresentation | A systematic approach towards GNSS receiver vulnerability analysis on Remotely Piloted Aircraft Systems | |
| Author: Mike Maarse | Supervisors: René Wiegers, Judith van Bruggen | |
| ReportPresentation | Modifying existing applications for 100 Gigabit Ethernet | |
| Author: Jelte Fennema | Supervisors: Migiel de Vos | |
| ReportPresentation | P4 VPN Authentication: Authentication of VPN Traffic on a Network Device with P4 | |
| Author: Jeroen Klomp | Supervisors: Ronald van der Pol, Marijke Kaat | |
| ReportPresentation | (Aster)-picking through the pieces of short URL services | |
|---|---|---|
| Author: Peter Boers | Supervisors: Ruud Verbij | |
| ReportPresentation | BGP Hijack Alert System | |
| Author: Bram ter Borch | Supervisors: Jeroen van der Ham, Gert Vliek | |
| ReportPresentation | Exfiltrating Data from Managed Profiles in Android for Work | |
| Author: Thomas Curran | Supervisors: Paul van Iterson | |
| ReportPresentation | (Aster)-picking through the pieces of short URL services | |
| Author: Robert Diepeveen | Supervisors: Ruud Verbij | |
| ReportPresentation | Portable RFID Bumping Device | |
| Author: Romke van Dijk | Supervisors: Ari Davies | |
| ReportPresentation | Subverting Android 6.0 fingerprint authentication | |
| Author: Thom Does | Supervisors: Rick van Galen | |
| ReportPresentation | Misusing Open Services on the Internet | |
| Author: Jelte Fennema | Supervisors: Rick van Galen | |
| ReportPresentation | Jailbreak/Root Detection Evasion Study on iOS and Android | |
| Author: Dana Geist | Supervisors: Roel Bierens | |
| ReportPresentation | Misusing Open Services on the Internet | |
| Author: Ben de Graaff | Supervisors: Rick van Galen | |
| ReportPresentation | Docker Overlay Network | |
| Author: Siem Hermans | Supervisors: Paola Grosso | |
| ReportPresentation | Investigating the Potential for SCTP to be used as a VPN Transport Protocol | |
| Author: Joseph Hill | Supervisors: Ralph Koning, Junaid Chaudhry | |
| ReportPresentation | Recursive InterNetwork Architecture | |
| Author: Jeroen Klomp | Supervisors: Marijke Kaat, Ralph Koning | |
| ReportPresentation | Recursive InterNetwork Architecture | |
| Author: Jeroen van Leur | Supervisors: Marijke Kaat, Ralph Koning | |
| ReportPresentation | Subverting Android 6.0 fingerprint authentication | |
| Author: Mike Maarse | Supervisors: Rick van Galen | |
| ReportPresentation | Performance measurement and tuning of remote acquisition | |
| Author: Lukasz Makowski | Supervisors: Ruud Schramp, Zeno Geradts, Erwin van Eijk | |
| ReportPresentation | Penetration Testing Auditability | |
| Author: Stamatios Maritsas | Supervisors: Christopher Mills | |
| ReportPresentation | Docker Overlay Network | |
| Author: Patrick de Niet | Supervisors: Paola Grosso | |
| ReportPresentation | Jailbreak/Root Detection Evasion Study on iOS and Android | |
| Author: Marat Nigmatullin | Supervisors: Roel Bierens | |
| ReportPresentation | UsnJrnl Parsing for File System History | |
| Author: Jeroen van Prooijen | Supervisors: Kevin Jonkers | |
| ReportPresentation | Portable RFID Bumping Device | |
| Author: Loek Sangers | Supervisors: Ari Davies | |
| ReportPresentation | BGP Hijack Alert System | |
| Author: Jeroen Schutrup | Supervisors: Jeroen van der Ham, Gert Vliek | |
| ReportPresentation | WIFI espionage using a UAV | |
| Author: Yadvir Singh | Supervisors: Rick van Galen | |
| ReportPresentation | Comparison of parallel and distributed implementation of the MST algorithm | |
| Author: Alexis Sireta | Supervisors: Ana Varbanescu | |
| ReportPresentation | Penetration Testing Auditability | |
| Author: Alexandros Tsiridis | Supervisors: Christopher Mills | |
| ReportPresentation | UsnJrnl Parsing for File System History | |
| Author: Frank Uijtewaal | Supervisors: Kevin Jonkers | |
| ReportPresentation | Exfiltrating Data from Managed Profiles in Android for Work | |
| Author: Ruben de Vries | Supervisors: Paul van Iterson | |
| ReportPresentation | Malicious Domain Name Detection System | |
| Author: Auke Zwaan | Supervisors: Marco Davids, Cristian Hesselman, Maarten Wullink | |
| ReportPresentation | Improving the Performance of an IP-over-P2P Overlay for Nested Cloud Environments | |
|---|---|---|
| Author: Dragos-Laurentiu Barosan | Supervisors: Renato Figueiredo, Kaveh Razavi, Ana Oprescu | |
| ReportPresentation | Crawling the USENET for DMCA | |
| Author: Eddie Bijnen | Supervisors: Niels Sijm, Arno Bakker | |
| ReportPresentation | Analysis of DNS Resolver Performance Measurements | |
| Author: Hamza Boulakhrif | Supervisors: Willem Toorop, Yuri Schaeffer | |
| ReportPresentation | Container Network Solutions | |
| Author: Joris Claassen | Supervisors: Paola Grosso | |
| ReportPresentation | Remote Acquisition Boot environment | |
| Author: Dennis Cortjens | Supervisors: Ruud Schramp | |
| ReportPresentation | The use of workflow topology observables in a Security Autonomous Response Network | |
| Author: Adriaan Dens | Supervisors: Marc Makkes, Robert Meijer | |
| ReportPresentation | Graph500 in the public cloud | |
| Author: Harm Dermois | Supervisors: Ana Varbanescu | |
| ReportPresentation | Network utilization with SDN in on-demand application-specific Networks | |
| Author: Ioannis Grafis | Supervisors: Marc Makkes | |
| ReportPresentation | PTP Switches Accuracy and Hollow Core Fiber Latency | |
| Author: Martin Leucht | Supervisors: Cees de Laat | |
| ReportPresentation | Functional breakdown of decentralised social networks | |
| Author: Wouter Miltenburg | Supervisors: Michiel Leenaars | |
| ReportPresentation | Zero-effort Monitoring | |
| Author: Julien Nyczak | Supervisors: Rick van Rein | |
| ReportPresentation | PTP Switches Accuracy and Hollow Core Fiber Latency | |
| Author: Carlo Rengo | Supervisors: Cees de Laat | |
| ReportPresentation | Measuring The Impact of Docker on Network I/O Performance | |
| Author: Ardho Rohprimardho | Supervisors: Cees de Laat | |
| ReportPresentation | Remote data acquisition of IskraME372 GPRS smart meter | |
| Author: Nikolaos Sidiropoulos | Supervisors: Max Hovens, Rick van Galen | |
| ReportPresentation | Discovery method for a DNSSEC validating stub resolver | |
| Author: Xavier Torrent Gorjón | Supervisors: Willem Toorop | |
| ReportPresentation | Automated configuration of BGP on edge routers | |
| Author: Tarcan Turgut | Supervisors: Stavros Konstantaras, Benno Overeinder | |
| ReportPresentation | Automated configuration of BGP on edge routers | |
| Author: Stella Vouteva | Supervisors: Stavros Konstantaras, Benno Overeinder | |
| ReportPresentation | HTTP Header Analysis | |
| Author: Roland Zegers | Supervisors: Renato Fontana | |
| ReportPresentation | Pre-boot RAM acquisition and compression | |
| Author: Martijn Bogaard | Supervisors: Ruud Schramp, Zeno Geradts, Erwin van Eijk | |
| ReportPresentation | Circumventing Forensic Live-Acquisition Tools On Linux | |
| Author: Yonne de Bruijn | Supervisors: Arno Bakker, Jaap van Ginkel | |
| ReportPresentation | Extremely Secure Communication | |
| Author: Daniel Romão | Supervisors: Martijn Sprengers, Ruud Verbij, Jarno Roos | |
| ReportPresentation | Online events registration with minimal privacy violation | |
| Author: Niels van Dijkhuizen | Supervisors: Jeroen van der Ham | |
| ReportPresentation | Security evaluation of smart-cars' remote control Applications | |
| Author: Florian Ecard | Supervisors: Cees de Laat | |
| ReportPresentation | Proving the wild jungle jump | |
| Author: James Gratchoff | Supervisors: Niek Timmers | |
| ReportPresentation | Securing the SDN northbound interface | |
| Author: Jan Laan | Supervisors: Haiyun Xu | |
| ReportPresentation | CoinShuffle anonymity in the Block chain | |
| Author: Jan-Willem Selij | Supervisors: Roberta Piscitelli, Oskar van Deventer | |
| ReportPresentation | An Overview on Hiding and Detecting Stego-data in Video Streams | |
| Author: Alexandre Ferreira | Supervisors: Zeno Geradts | |
| ReportPresentation | StealthWare - Social Engineering Malware | |
| Author: Joey Dreijer | Supervisors: Jeroen van Beek | |
| ReportPresentation | Security intelligence data mining | ||
|---|---|---|---|
| Author: Nikolaos Triantafyllidis, Diana Rusu | Supervisors: Henri Hambartsumyan | ||
| ReportPresentation | Teleporting virtual machines | ||
| Author: Carlo Rengo, Harm Dermois | Supervisors: Oskar van Deventer | ||
| ReportPresentation | Fine-grained control of LAMP component versions for Hosting Companies | ||
| Author: Xander Lammertink | Supervisors: Michiel Leenaars | ||
| ReportPresentation | DANE verification test suite report | ||
| Author: Guido Kroon, Hamza Boulakhrif | Supervisors: Michiel Leenaars | ||
| ReportPresentation | Monitoring DNSSEC | ||
| Author: Martin Leucht, Julien Nyczak | Supervisors: Rick van Rein | ||
| ReportPresentation | Protecting against relay attacks forging increased distance reports | ||
| Author: Xavier Torrent Gorjón | Supervisors: Martijn Sprengers | ||
| ReportPresentation | Feasibility and Deployment of Bad USB | ||
| Author: Stella Vouteva | Supervisors: Martijn Sprengers | ||
| ReportPresentation | Evaluating the security of the KlikAanKlikUit Internet Control Station 1000 | ||
| Author: Roland Zegers | Supervisors: Martijn Sprengers | ||
| ReportPresentation | Study on a known-plaintext attack on ZIP encryption | ||
| Author: Dragos-Laurentiu Barosan | Supervisors: Armijn Hemel | ||
| ReportPresentation | Large-scale drive-by download detection: visit | n. process. analyse. report. | |
| Author: Adriaan Dens, Martijn Bogaard | Supervisors: Jop van der Lelie, Wouter Katz | ||
| ReportPresentation | Trusted Network Initiative to combat DDos attacks | ||
| Author: Jeroen van Kessel, Alexandros Stavroulakis | Supervisors: Marc Gauw | ||
| ReportPresentation | Peeling the Google Public DNS Onion | ||
| Author: Ardho Rohprimardho, Tarcan Turgut | Supervisors: Roland van Rijswijk - Deij | ||
| ReportPresentation | Security automation and optimization using HP-NA | ||
| Author: Florian Ecard | Supervisors: Olivier Willm | ||
| ReportPresentation | Preventing Common Attacks on Critical Infrastructure | ||
| Author: Koen Veelenturf, Wouter Miltenburg | Supervisors: Oscar Koeroo | ||
| ReportPresentation | Evaluation of the security of a high class UAV telemetry communication link | ||
| Author: Yonne de Bruijn, James Gratchoff | Supervisors: Martijn Sprengers | ||
| ReportPresentation | DNSsec Revisited | |
|---|---|---|
| Author: Anastasios Poulidis, Hoda Rohani | Supervisors: Jeroen Scheerder | |
| ReportPresentation | Controlled DDoS Security Testing | |
| Author: Mike Berkelaar | Supervisors: Pieter Westein | |
| ReportPresentation | Search optimization through JPEG quantization tables using a decision tree learning approach | |
| Author: Sharon Gieske | Supervisors: Marcel Worring, Zeno Geradts | |
| ReportPresentation | Anomaly Detection on Internet Content Filter Data | |
| Author: Peter van Bolhuis | Supervisors: Sjoerd Peerlkamp, Johannes Ijkel | |
| ReportPresentation | Implementing Security Control Loops in Security Autonomous Response Networks | |
| Author: Hristo Dimitrov | Supervisors: Marc Makkes, Robert Meijer | |
| ReportPresentation | Measuring the deployment of DNSSEC over the Internet | |
| Author: Nicolas Canceill | Supervisors: Benno Overeinder, Willem Toorop | |
| ReportPresentation | Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests | |
| Author: Sebastiaan Vlaszaty | Supervisors: Casper Joost Eyckelhof | |
| ReportPresentation | Using EVPN to minimize ARP traffic in an IXP environment | |
| Author: Stefan Plug, Lutz Engels | Supervisors: Kay Rechtien, Thorben Krüger | |
| ReportPresentation | Rich Identity Provisioning | |
| Author: Jos van Dijk | Supervisors: Michiel Leenaars | |
| ReportPresentation | Implementing proximity based device-to-device communication in commercial LTE networks in The Netherlands | |
| Author: Remco van Vugt | Supervisors: Bastiaan Wissingh | |
| ReportPresentation | Android patching from an MDM perspective | |
| Author: Cedric Van Bockhaven | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
| ReportPresentation | Open Data analysis to retrieve sensitive information regarding national-centric critical infrastructures | |
| Author: Renato Fontana | Supervisors: Benno Overeinder, Ralph Dolmans | |
| ReportPresentation | Timestomping NTFS | |
| Author: Wicher Minnaard | Supervisors: Kevin Jonkers, Marco van Loosen | |
| ReportPresentation | Securing the last mile of DNS with CGA-TSIG | |
| Author: Marc Buijsman | Supervisors: Matthijs Mekking, Jeroen van der Ham | |
| ReportPresentation | Detecting routing anomalies with RIPE Atlas | |
| Author: Todor Yakimov | Supervisors: Jeroen van der Ham, Barry van Kampen | |
| ReportPresentation | Feasibility of attacks against weak SSL/TLS ciphers | |
| Author: Kim van Erkelens | Supervisors: Marc Smeets, Jeroen van der Ham | |
| ReportPresentation | Information Centric Networking for Delivering Big Data with Persistent Identifiers | |
| Author: Andreas Karakannas | Supervisors: Zhiming Zhao | |
| ReportPresentation | Combating DNS amplification using cookies | |
| Author: Sean Rijs | Supervisors: Roland van Rijswijk-Deij | |
| ReportPresentation | Peer-to-Peer Botnet Detection Using Netflow | |
| Author: Connor Dillon | Supervisors: Pepijn Janssen | |
| ReportPresentation | Covert channel detection using flow data | |
| Author: Guido Pineda Reyes | Supervisors: Pepijn Janssen | |
| ReportPresentation | Practical Security and Key Management | |
| Author: Magiel van der Meer | Supervisors: Jeroen van der Ham, Marc Smeets | |
| ReportPresentation | Software Defined VPNs | |
| Author: George Thessalonikefs, Stavros Konstantaras | Supervisors: Rudolf Strijkers | |
| ReportPresentation | Bootable Linux CD / PXE for the remote acquisition of multiple computers | |
| Author: Dennis Cortjens | Supervisors: Zeno Geradts, Ruud Schramp | |
| ReportPresentation | Remote data acquisition on block devices in large environments | |
| Author: Eric van den Haak | Supervisors: Zeno Geradts, Ruud Schramp | |
| ReportPresentation | Beacon detection in PCAP files | |
| Author: Leendert van Duijn | Supervisors: Robert Jan Mora | |
| ReportPresentation | Cross-realm Kerberos implementations | |
| Author: Mick Pouw, Esan Wit | Supervisors: Michiel Leenaars | |
| ReportPresentation | Mice and Elephants | |
|---|---|---|
| Author: Ioannis Giannoulatos | Supervisor: Ronald van der Pol | |
| ReportPresentation | Evaluating the Network Performance of ExoGENI Cloud Computing System | |
| Authors: Andreas Karakannas, Tasos Poulidis | Supervisors: Paola Grosso, Ralph Koning | |
| ReportPresentation | A closer look at SQRL | |
| Author: Jos van Dijk | Supervisors: Henri Hambartsumyan, Hugo Ideler | |
| ReportPresentation | Calculating Total System Availability | |
| Authors: Azad Kamaliroosta, Hoda Rohani | Supervisor: Betty Gommans | |
| ReportPresentation | Information loss to public networks | |
| Authors: Peter van Bolhuis, Jan-Willem Selij | Supervisor: Steven Raspe | |
| ReportPresentation | Secure Sockets Layer Health Assessment | |
| Authors: Eric van den Haak, Mick Pouw | Supervisors: Thijs Kinkhorst, Teun Nijssen | |
| ReportPresentation | DDOS protection measures for Electronic Payment Systems | |
| Authors: Joris Claassen, Sean Rijs | Supervisor: Stefan Dusée | |
| ReportPresentation | Cryptanalysis of, and practical attacks against E-Safenet encryption | |
| Authors: Cedric Van Bockhaven, Jan Laan | Supervisor: Armijn Hemel | |
| ReportPresentation | OpenFlow (D)DoS Mitigation | |
| Authors: Mike Berkelaar, Connor Dillon | Supervisor: Hidde van der Heide | |
| ReportPresentation | Detecting IP Hijacking Through Server Fingerprinting | |
| Authors: Eddie Bijnen, Magiel van der Meer | Supervisors: Douwe Schmidt, Sacha van Geffen | |
| ReportPresentation | DDoS Detection and Alerting | |
| Authors: Daniel Cabaça Romão, Niels van Dijkhuizen | Supervisor: Rogier Spoor | |
| ReportPresentation | MySQL record carving | |
| Authors: Leendert van Duijn, Esan Wit | Supervisor: Kevin Jonkers | |
| ReportPresentation | Data Map | |
| Authors: Sharon Gieske, Thijs Houtenbos | Supervisors: Jeroen van der Ham, Barry van Kampen | |
| ReportPresentation | Security assessment on a VXLAN-based network | |
| Author: Guido Pineda Reyes | Supervisors: Sander Ruiter, Maarthen Kastanja, Maarten Dammers | |
| ReportPresentation | Evaluation of the feasible attacks against RFID tags for access control systems | |
| Authors: Hristo Dimitrov, Kim van Erkelens | Supervisors: Henri Hambartsumyan, Hugo Ideler | |
| ReportPresentation | PIRE ExoGENI – ENVRI Preparation for Big Data Science | |
| Authors: Ioannis Grafis, Stavros Konstantaras | Supervisors: Ana Oprescu, Zhiming Zhao | |
| ReportPresentation | ElectroMagnetic Fault Injection Characterization | |
| Author: George Thessalonikefs | Supervisors: Niek Timmers, Albert Spruyt | |
| ReportPresentation | NetFlow Anomaly Detection; finding covert channels on the network | |
| Author: Joey Dreijer | Supervisors: Sjoerd Peerlkamp, Johannes Ijkel | |
| ReportPresentation | Architecture of dynamic VPNs in OpenFlow | |
|---|---|---|
| Author: Michiel Appelman | Supervisor: Rudolf Strijkers | |
| ReportPresentation | Research cache rebuilding for different browsers | |
| Authors: Iwan Hoogendoorn, Edwin Schaap | Supervisors: Zeno Geradts, Ruud van Baar | |
| ReportPresentation | OpenFlow network virtualization with FlowVisor | |
| Author: Sebastian Dabkiewicz | Supervisor: Ronald van der Pol | |
| ReportPresentation | Discovery and Mapping of the Dutch National Critical IP Infrastructure | |
| Authors: Razvan Oprea, Fahimeh Alizadeh | Supervisor: Benno Overeinder | |
| ReportPresentation | Load balancing in ESB based service platform | |
| Author: Nick Barendregt | Supervisor: Yuri Demchenko | |
| ReportPresentation | Performance optimisation of webmail | |
| Authors: Periklis Stefopoulos, Katerina Barmpopoulou | Supervisor: Michiel Leenaars | |
| ReportPresentation | OpenFlow at AMS-IX | |
| Authors: Hanieh Bagheri, Victor Boteanu | Supervisor: Martin Pels | |
| ReportPresentation | BGP route origin validation | |
| Authors: Javy de Koning, Remy de Boer | Supervisors: Jac Kloots, Marijke Kaat | |
| ReportPresentation | Reliable Client-Server Connections | |
| Authors: Rene Klomp, Thijs Rozekrans | Supervisor: Michiel Leenaars | |
| ReportPresentation | Using git to circumvent censorship of access to the Tor network | |
| Authors: Bjorgvin Ragnarsson, Pieter Westein | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
| ReportPresentation | OpenFlow Enlightenment; Extending lightpaths through the campus network | |
| Authors: Diederik Vandevenne, Tjebbe Vlieg | Supervisors: Marijke Kaat, Ronald van der Pol | |
| ReportPresentation | Detection of client-side e-banking fraud using a heuristic model | |
| Authors: Jurgen Kloosterman, Tim Timmermans | Supervisor: Steven Raspe | |
| ReportPresentation | GNUnet and PSYC integration | |
| Author: Gabor Toth | Supervisor: Christian Grothoff | |
| ReportPresentation | Gaining insight into network hygiene a visual analytics approach | |
| Author: Tarik El Yassem | Supervisor: Martijn van der Heide | |
| ReportPresentation | Automated vulnerability scanning and exploitation | |
| Authors: Thijs Houtenbos, Dennis Pellikaan | Supervisors: Jop van der Lelie, Bart Roos | |
| ReportPresentation | Analysis of DNS amplification attack packets | |
| Author: Pieter Lexis | Supervisors: Marcel Worring, Matthijs Mekking | |
| ReportPresentation | Data from home routers for forensics purposes | |
| Author: Tobias Fiebig | Supervisor: Andreas Schuster | |
| ReportPresentation | Metasploit-able honeypots | |
| Author: Wouter Katz | Supervisors: Jop van der Lelie, Bart Roos | |
| ReportPresentation | Preventing DNS Amplification Attacks using white- and greylisting | |
| Author: Ralph Dolmans | Supervisor: Maurits van der Schee | |
| ReportPresentation | Traffic Volume vs. Network Inspection | |
|---|---|---|
| Authors: Fahimeh Alizadeh, Rawi Ramdhan | Supervisor: Jeroen Scheerder | |
| ReportPresentation | Linux Open Source Distributed Filesystem | |
| Author: Remco van Vugt | Supervisor: Walter de Jong | |
| ReportPresentation | FileSender Terabyte Challenge | |
| Authors: Rene Klomp, Edwin Schaap | Supervisor: Jan Meijer | |
| ReportPresentation | Using random sampling as a way to determine disk complexity | |
| Author: Nicolas Canceill | Supervisors: Zeno Geradts, Erwin van Eijk | |
| ReportPresentation | Time skew analysis using web cookies | |
| Author: Bjorgvin Ragnarsson | Supervisors: Zeno Geradts, Marnix Kaart | |
| ReportPresentation | SSH Botnet Member Credential Collection using Connect Back Honeypots | |
| Author: Tobias Fiebig | Supervisor: Jaap van Ginkel | |
| ReportPresentation | Defending against DNS reflection amplification attacks | |
| Authors: Thijs Rozekrans, Javy de Koning | Supervisor: Matthijs Mekking | |
| ReportPresentation | Remote relay attack on RFID access control systems using NFC enabled devices | |
| Authors: Pieter Westein, Wouter van Dullink | Supervisor: Bart Roos | |
| ReportPresentation | Topology discovery | |
| Authors: Dennis Pellikaan, Diederik Vandevenne | Supervisor: Freek Dijkstra | |
| ReportPresentation | Using wavelengths outside of the Telecom spectrum | |
| Authors: Stefan Plug, Remy de Boer | Supervisor: Erik Radius | |
| ReportPresentation | GreenSONAR; A multi-domain energy profiling system based on perfSONAR | |
| Authors: Lutz Engels, Todor Yakimov | Supervisors: Paola Grosso, Karel van der Veldt, Hao Zhu | |
| ReportPresentation | Monitoring GreenClouds; Evaluating the trade-off between Performance and Energy Consumption in DAS-4 | |
| Authors: Renato Fontana, Katerina Barmpopoulou | Supervisors: Karel van der Veldt, Hao Zhu, Paola Grosso | |
| ReportPresentation | Tinfoil attack; A study on the security threats and weaknesses of GSM-based communication in BMW car | |
| Authors: Thijs Houtenbos, Jurgen Kloosterman | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
| ReportPresentation | Malware Analysis on Carberp | |
| Authors: Wouter Katz, Ralph Dolmans | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
| ReportPresentation | Image-based localization of pictures using Google Streetview images | |
| Authors: Bas Vlaszaty, Tim Timmermans | Supervisor: John Schavemaker | |
| ReportPresentation | Additional certificate verification methods for TLS client applications | |
| Authors: Gabor Toth, Tjebbe Vlieg | Supervisor: Michiel Leenaars | |
| ReportPresentation | Advanced Metering Infrastructure | |
|---|---|---|
| Author: Vic Ding | Supervisor: Jan Amoraal | |
| ReportPresentation | Electromagnetic Fault Injection (EMFI) on System-on-a-Chips (SoC) / Smartcards | |
| Author: Sebastian Carlier | Supervisor: Niek Timmers | |
| ReportPresentation | Secure Internet Banking on Insecure Hosts | |
| Author: Christos Tziortzios | Supervisors: Martijn Knuiman, Sander Vos | |
| ReportPresentation | Fault injection model for the XMEGA64A3 | |
| Author: Albert Spruyt | Supervisor: Niek Timmers | |
| ReportPresentation | Visualizing attacks on honeypots | |
| Authors: Jop van der Lelie, Rory Breuk | Supervisor: Bart Roos | |
| ReportPresentation | Green computing in IEEE 802.3az enabled clusters | |
| Authors: Joris Soeurt, Dimitar Pavlov | Supervisors: Zhiming Zhao, Paola Grosso | |
| ReportPresentation | Discovering Path MTU black holes using RIPE Atlas | |
| Authors: Maikel de Boer, Jeffrey Bosma | Supervisor: Benno Overeinder | |
| ReportPresentation | OpenDNSSEC | |
| Author: Aleksandar Kasabov | Supervisor: Yuri Schaeffer | |
| ReportPresentation | Torrent monitoring and statistics | |
| Author: Hidde van der Heide | Supervisor: Jeroen van der Ham | |
| ReportPresentation | Social media crawling | |
| Authors: Yannick Scheelen, Daan Wagenaar | Supervisor: Marc Smeets | |
| ReportPresentation | Multipath TCP | |
| Author: Gerrie Veerman | Supervisor: Ronald van der Pol | |
| ReportPresentation | Time Sensitive Application Transport | |
| Author: Mohammad Shafahi | Supervisors: Cees de Laat, Erik-Jan Bos | |
| ReportPresentation | Content Delivery Network Interconnection | |
| Author: Bastiaan Wissingh | Supervisor: Ray van Brandenburg | |
| ReportPresentation | OpenFlow | |
|---|---|---|
| Authors: Iwan Hoogendoorn, Joris Soeurt | Supervisor: Ronald van der Pol | |
| ReportPresentation | Performance Analysis of OpenFlow Hardware | |
| Authors: Michiel Appelman, Maikel de Boer | Supervisor: Ronald van der Pol | |
| Report presentation unavailable | IPv6 risks and vulnerabilities | |
| Author: Fred Wieringa | Supervisors: unavailable | |
| ReportPresentation | Bootstrapping the Internet of the Future | |
| Author: Mohammad Shafahi | Supervisor: Rudolf Strijkers | |
| ReportPresentation | l/O Load Scheduler for Grid Mass Storage | |
| Author: Christos Tziortzios | Supervisor: Walter de Jong | |
| ReportPresentation | DNS-Based Authentication of Named Entries (DANE) | |
| Author: Pieter Lexis | Supervisor: Bert Hubert | |
| ReportPresentation | Automatic end-host configuration | |
| Author: Sebastian Dabkiewicz | Supervisor: Jeroen van der Ham | |
| ReportPresentation | Traffic anomaly detection using a distributed measurement network | |
| Authors: Razvan Oprea | Supervisor: Emile Aben | |
| ReportPresentation | Camera Identification on YouTube | |
| Authors: Yannick Scheelen, Jop van der Lelie | Supervisors: Marcel Worring, Zeno Geradts | |
| ReportPresentation | Ranking of manipulated images in a large set using error level analysis | |
| Authors: Jeffrey Bosma, Daan Wagenaar | Supervisor: Marcel Worring | |
| ReportPresentation | Integrating DMA attacks in exploitation frameworks | |
| Authors: Rory Breuk, Albert Spruyt | Supervisor: Marc Smeets | |
| ReportPresentation | Distributed Password Cracking Platform | |
| Authors: Dimitar Pavlov, Gerrie Veerman | Supervisor: Marc Smeets | |
| ReportPresentation | Securing an outsourced network: Detecting and preventing malware infections | |
| Authors: Dennis Cortjens, Tarik El Yassem | Supervisor: Ewout Meij | |
| ReportPresentation | Measuring DNSSEC Validation | |
|---|---|---|
| Author: Niels Monen | Supervisor: Roland van Rijswijk | |
| ReportPresentation | Security of IPv6 and DNSSEC for penetration testers | |
| Author: Vesselin Hadjitodorov | Supervisor: Jaap van Ginkel | |
| ReportPresentation | Passive LAN information gathering | |
| Author: Roy Duisters | Supervisor: Marc Smeets | |
| ReportPresentation | PersLink Security | |
| Authors: Eleonora Petridou, Pascal Cuylaerts | Supervisors: Jo Lahaye, Martijn Stegeman | |
| ReportPresentation | Exploiting Jailbrakes | |
| Author: Jochem van Kerkwijk | Supervisors: Gijs Hollestelle, Derk Wieringa | |
| ReportPresentation | BufferBloat detection | |
| Authors: Harald Kleppe, Danny Groenewegen | Supervisor: Michiel Leenaars | |
| ReportPresentation | CurveCP protocol efficiency | |
| Author: Thorben Krüger | Supervisor: Jeroen Scheerder | |
| ReportPresentation | Comparing TCP connection performance over VPN-tunnels vs non-tunneled traffic | |
| Authors: Berry Hoekstra, Damir Musulin | Supervisor: Jan Just Keijser | |
| ReportPresentation | A mapping daemon for the Locator/ID Separation Protocol (LISP) | |
| Author: Marek Kuczynski | Supervisors: Job Snijders, Rager Ossel | |
| ReportPresentation | Power measuremeents in DAS | |
|---|---|---|
| Author: Vesselin Hadjitodorov | Supervisors: Ralph Koning, Paola Grosso | |
| ReportPresentation | Desktop Virtualisatie | |
| Author: Sudesh Jethoe | Supervisors: unavailable | |
| ReportPresentation | Synergy of social networks defeat online privacy | |
| Authors: Eleonora Petridou, Marek Kuczynski | Supervisor: Marc Smeets | |
| ReportPresentation | Large scale GPU based password cracking | |
| Authors: Jochem van Kerkwijk, Aleksandar Kasabov | Supervisor: Marc Smeets | |
| ReportPresentation | Emulating network latency on high speed networks | |
| Authors: Niels Monen, Berry Hoekstra | Supervisors: Cosmin Dumitru, Ralph Koning | |
| ReportPresentation | Quality analysis of automated penetration testing tools | |
| Authors: Harald Kleppe, Alexandre Miguel Ferreira | Supervisors: Coen Steenbeek, Derk Wieringa | |
| ReportPresentation | Analysis of network measurement data | |
| Authors: Roy Duisters, Damir Musulin | Supervisors: Robert Kisteleki, Emile Aben | |
| ReportPresentation | Android Market monitoring | |
| Authors: Bastiaan Wissingh, Thorben Krüger | Supervisor: Michiel Leenaars | |
| ReportPresentation | OpenSSH automatic public key retrieval | |
| Authors: Marc Buijsman, Pascal Cuylaerts | Supervisor: Michiel Leenaars | |
| ReportPresentation | DNSSEC Certificate validation | |
| Authors: Pieter Lange, Danny Groenewegen | Supervisor: Michiel Leenaars | |
| ReportPresentation | DNS anomaly detection | |
| Authors: Nick Barendregt, Hidde van der Heide | Supervisors: Bart Roos, Sander Peters | |
| ReportPresentation | HTTP session identification | |
|---|---|---|
| Authors: Marcus Bakker, Kevin de Kok | Supervisors: Bart Roos | |
| ReportPresentation | Self-adaptive Routing | |
| Authors: Marvin Rambhadjan, Arthur van Kleef | Supervisors: Rudolf Strijkers | |
| ReportPresentation | DFRWS Forensics Challenge 2010 | |
| Authors: Joeri Blokhuis, Axel Puppe | Supervisors: Hans Wim Tinholt | |
| ReportPresentation | Performance measurement tools | |
| Authors: Jeroen Vanderauwera, Alex Giurgiu | Supervisors: Freek Dijkstra | |
| ReportPresentation | Evaluation of the Handle System to identify and retrieve digital objects | |
| Authors: Taarik Hassenmahomed | Supervisors: Paola Grosso, Andy Maltz | |
| ReportPresentation | SURFnet storage Design | |
| Authors: Jeroen Klaver, Roel van der Jagt | Supervisors: Rogier Spoor | |
| ReportPresentation | On Demand Grid on Cloud | |
| Authors: Willem Toorop, Alain van Hoof | Supervisors: Rudolf Strijkers, Paola Grosso | |
| undisclosed | Detecting illegal use in TomTom PND's | |
| Authors: Daan Muller, Arthur Schutijser | Supervisors: Jaap-Jan Boor, Karl Robinson | |
| undisclosed | Secure services on TomTom PND's | |
| Authors: Cosmin Dumitru, Niek Timmers | Supervisors: Jaap-Jan Boor | |
| ReportPresentation | Mail client IPv6 interoperabillity problems | |
| Authors: Michiel Timmers, Sebastian Carlier | Supervisors: Freek Dijkstra | |
| ReportPresentation | Trustworthiness of Cyber Infrastructure for e-Science | |
|---|---|---|
| Authors: Niels Monen, Berry Hoekstra | Supervisors: unavailable | |
| ReportPresentation | Horse-ID | |
| Authors: Vic Ding, Laurens Bruinsma | Supervisors: Jeroen van Beek | |
| ReportPresentation | Bright Cluster Manager inc. Failover Research | |
| Authors: Cosmin Dumitru, Niek Timmers | Supervisors: Martijn de Vries | |
| ReportPresentation | Security Virtual Infrastructure; Study possible security issues with a virtual infrastructure | |
| Authors: Niels Monen, Berry Hoekstra | Supervisors: unavailable | |
| ReportPresentation | SSD performance | |
| Authors: Daan Muller, Sebastian Carlier | Supervisors: Ronald van der Pol | |
| ReportPresentation | Load simulation on [Open]Solaris systems | |
| Authors: Alain van Hoof | Supervisors: Jeroen Roodhart | |
| ReportPresentation | SURFnet Cloud Computing Design | |
| Authors: Arthur Schutijser, Marvin Rambhadjan | Supervisors: Rogier Spoor | |
| ReportPresentation | GPU-based password cracking | |
| Authors: Roel van der Jagt, Marcus Bakker | Supervisors: Marc Smeets | |
| report unavailable Presentation | Automatic Network Configuration in Clouds | |
| Authors: Alex Giurgiu | Supervisors: Rudolf Strijkers, Paola Grosso | |
| ReportPresentation | Modern Age Burglars | |
| Authors: Kevin de Kok, Jeroen Klaver | Supervisors: Christiaan Roselaar | |
| ReportPresentation | Des-Plus encryptie on IP over the powernet: HomePlug Security | |
| Authors: Jeroen Vanderauwera, Axel Puppe | Supervisors: Christiaan Roselaar | |
| ReportPresentation | Online Banking: Attacks & Defences | |
|---|---|---|
| Authors: Dominic van den Ende, Tom Hendrickx | Supervisors: Jan Joris Vereijken, Kino Verburg | |
| ReportPresentation | 802.1ah in NetherLight; an application proposal | |
| Author: Sevickson Kwidama | Supervisors: Ronald van der Pol, Mark Meijerink | |
| ReportPresentation | Ad-hoc trust associations with Trust Anchor Repositories | |
| Author: Stefan Roelofs | Supervisor: Yuri Demchenko | |
| ReportPresentation | Implementation difference between DNScurve and DNSsec | |
| Author: Cornel de Jong | Supervisor: Fred Mobach | |
| ReportPresentation | IPv4 ARP/IPv6 ND Sponge Daemon | |
| Authors: Niels Sijm, Marco Wessel | Supervisor: Steven Bakker | |
| ReportPresentation | Design and development of a SAN Alarm system | |
| Authors: Adriaan van der Zee, Yanick de Jong | Supervisors: Leon Gommans | |
| ReportPresentation | The DFRWS 2009 Challenge | |
| Authors: Wouter van Dongen, Alain van Hoof | Supervisor: Ruud van Baar | |
| ReportPresentation | Car security: remote keyless entry and go systems | |
| Authors: Jarno van de Moosdijk, Dick Visser | Supervisors: Hans Ijkel, Stan Hegt, Pieter Ceelen | |
| ReportPresentation | IP multicast routing on AMS-IX | |
| Authors: Attilla De Groot, Yuri Schaeffer | Supervisors: Ariën Vijn, Martin Pels | |
| ReportPresentation | Busting the ghost on the web: real time detection of drive-by-infections | |
| Authors: Thijs Kinkhorst, Michael van Kleij | Supervisors: Bart Roos, Sander Peters | |
| ReportPresentation | Verschillende toepassingen voor virtualisatie | |
|---|---|---|
| Author: Dominic van den Ende | Supervisor: Fred Mobach | |
| ReportPresentation | Implementing OpenLISP with LISP + ALT | |
| Author: Attilla De Groot | Supervisor: Benno Overeinder | |
| ReportPresentation | Browser Security | |
| Author: Wouter van Dongen | Supervisors: Marc Smeets, Hans Ijkel | |
| ReportPresentation | Stream Control Transport Protocol | |
| Author: Taarik Hassenmahomed | Supervisor: Ronald van der Pol | |
| ReportPresentation | Troubleshooting Grid authentication from the client side | |
| Author: Adriaan van der Zee | Supervisors: Jan Just Keijser, David Groep | |
| ReportPresentation | Xen Hypervisor security in VM isolation | |
| Author: Yanick de Jong | Supervisor: Fred Mobach | |
| ReportPresentation | XEN VGA passthrough | |
| Author: Yuri Schaeffer | Supervisor: Mendel Mobach | |
| ReportPresentation | Using XEN Technology for Green IT | |
| Author: Arthur van Kleef | Supervisors: Ralph Koning, Cees de Laat | |
| ReportPresentation | Feasibility study Network Access Control (NAC) | |
| Author: Stefan Roelofs | Supervisor: Marcel Verbruggen | |
| ReportPresentation | Universal Plug and Play Eventing vulnerabilities | |
| Author: Joeri Blokhuis | Supervisor: Armijn Hemel | |
| ReportPresentation | Top40 cache compared to LRU and LFU | |
| Author: Alain van Hoof | Supervisor: Dick Snippe | |
| ReportPresentation | Research on OpenID and its integration within the GravityZoo framework | |
| Author: Jarno van de Moosdijk | Supervisor: Marcel van Birgelen | |
| ReportPresentation | Desktop sharing with SIP | |
| Author: Willem Toorop | Supervisor: Michiel Leenaars | |
| ReportPresentation | DNSCurve Analysis | |
| Author: Michiel Timmers | Supervisor: J. Scheerder | |
| ReportPresentation | Cloud Computing | |
| Author: Tom Hendrickx | Supervisor: Jan Meijer | |
| ReportPresentation | In depth abuse statistics | |
| Authors: Michiel Timmers, Arthur van Kleef | Supervisors: Carel van Straten, JP Velders | |
| ReportPresentation | Slimme meters | |
|---|---|---|
| Authors: Bart Roos, Sander Keemink | Supervisors: Hans Ijkel, Jeroen van Beek, Marc Smeets | |
| ReportPresentation | Multicast in a PBT enabled CineGrid network | |
| Author: Igor Idziejczak | Supervisors: Ralph Koning, Paola Grosso | |
| ReportPresentation | High performance TFTP and DHCP for network booting cluster computers | |
| Author: Matthew Steggink | Supervisor: Martijn de Vries | |
| ReportPresentation | Security en privacy in het Landelijk Schakelpunt | |
| Author: Niels Sijm | Supervisor: Guido van 't Noordende | |
| undisclosed | Evaluate the safety of Microsoft Office documents | |
| Author: Cornel de Jong | Supervisor: undisclosed | |
| undisclosed | Cross-country disaster recovery with Geant2 | |
| Author: Marco Wessel | Supervisor: undisclosed | |
| ReportPresentation | Detecting inconsistencies in INRDB data | |
| Author: Peter Ruissen | Supervisors: Tiziana Refice, Daniël Karrenberg | |
| ReportPresentation | Usability- en efficientieverbeteringen Mailman | |
| Author: Rudy Borgstede | Supervisor: Michiel Leenaars | |
| ReportPresentation | Streaming and storing CineGrid data: A study on optimization methods | |
| Author: Sevickson Kwidama | Supervisors: Ralph Koning, Paola Grosso, Peter Hinrich | |
| ReportPresentation | pNFS, high speed parallel open standard file access | |
| Author: Thijs Stuurman | Supervisor: Jan Meijer | |
| ReportPresentation | Wireless protocol analysis using GNUradio | |
| Author: Alex Verduin | Supervisors: Karst Koymans, Maurits van der Schee | |
| ReportPresentation | Haalbaarheidsstudie implementatie IPv6 bij de Nederlandse Publieke Omroep (NPO) | |
|---|---|---|
| Authors: Bart Roos, Marco Wessel | Supervisors: Ed van Vuuren, Dirk-Jan van Helmond | |
| ReportPresentation | Online authentication methods; Evaluate the strength of online authentication methods | |
| Author: Cornel de Jong | Supervisors: Gijs Hollestelle, Tom Schuurmans | |
| ReportPresentation | Security and Reliability of Automated Waste Registration in The Netherlands | |
| Authors: Dick Visser, Thijs Kinkhorst | Supervisors: Jeroen van Beek, Marc Smeets, Hans Ijkel | |
| undisclosed | Mobile devices security; degree of risk, mobile devices pose to a company's confidential data | |
| Authors: Ralph Laclé, Sevickson Kwidama | Supervisor: Cees de Laat | |
| ReportPresentation | Detection of peer-to-peer botnets | |
| Authors: Igor Idziejczak, Matthew Steggink | Supervisors: Rogier Spoor, Wim Biemolt | |
| ReportPresentation | Implementing Snort into SURFids | |
| Authors: Michael van Kleij, Sander Keemink | Supervisors: Rogier Spoor, Wim Biemolt | |
| ReportPresentation | Security model for hybrid token-based networking models | |
| Author: Rudy Borgstede | Supervisor: Yuri Demchenko | |
| ReportPresentation | Improving scalability of the AMS-IX network; analyzing load adaptive TE concepts and solutions | |
| Authors: Stefan Deelen, Reinier Schoof | Supervisors: Henk Steenman, Paola Grosso | |
| undisclosed | HoneyClients; Low interaction detection methods | |
| Authors: Thijs Stuurman, Alex Verduin | Supervisors: Rogier Spoor, Wim Biemolt | |
| reportpresentation | Scale-free Optical Networks | |
|---|---|---|
| Authors: Carol Meertens, Joost Pijnaker | Supervisor: Freek Dijkstra, Jeroen van der Ham | |
| reportpresentation | Store and Forward Architecture to support CineGrid | |
| Author: Daniël Sánchez | Supervisor: Paola Grosso, Jeroen Roodhart | |
| reportpresentation | LAN-2 Hybrid | |
| Authors: Gerben van Malenstein, Coen Steenbeek | Supervisor: Ronald van der Pol | |
| reportpresentation | A Zero Day Warning System | |
| Authors: Michael Rave, Rob Buijs | Supervisor: Scott A. McIntyre | |
| reportpresentation | Veiligheid van Update Mechanismen | |
| Authors: Peter Ruissen, Robert Vloothuis | Supervisor: Jeroen van Beek, Hans IJkel | |
| reportpresentation | Beveiliging van Wegwerp OV-rittenkaart | |
| Authosr: Pieter Siekerman, Maurits van der Schee | Supervisor: Jaap van Ginkel, Cees de Laat | |
| reportpresentation | The PERFSonar Framework | |
| Authors: Peter Tevenier, Tijmen van den Brink | Supervisor: Ronald van der Pol, Paola Grosso | |
| reportpresentation | Path Computation Element in the SURFnet6 network | |
| Authors: Patrick van Abswoude, Ralph Koning | Supervisor: Ronald van der Pol | |
| reportpresentation | Intrusion Detection System Sensors | |
|---|---|---|
| Authors: Coen Steenbeek, Michael Rave | Supervisors: Rogier Spoor, Jan van Lith, Kees Trippervitz | |
| reportpresentation | RIPE-NCC | |
| Authors: Daniël Sanchèz, Joost Pijnaker | Supervisor: Daniël Karrenberg | |
| reportpresentation | CERT Noodnet | |
| Authors: Gerben van Malenstein, Robert Vloothuis | Supervisor: Jan Meijer | |
| reportpresentation | Xen Guest Migration in a Dynamic Environment | |
| Author: Lotte-Sara Laan | Supervisor: Cees de Laat | |
| reportpresentation | Xen based High Availability Backup Environment | |
| Author: Marju Jalloh, Peter Ruissen | Supervisor: Cees de Laat | |
| reportpresentation | SSL HSM en Accelerator Testbank | |
| Author: Maurits van der Schee, Stefan Deelen | Supervisor: Jan Meijer | |
| reportpresentation | Expansion of the SURFNet IDS | |
| Author: Pieter Siekerman, Rob Buijs | Supervisors: Rogier Spoor, Jan van Lith, Kees Trippervitz | |
| reportpresentation | Open Recursive Nameservers | |
| Author: Patrick van Abswoude, Peter Tavenier | Supervisors: Karst Koymans, JP Velders | |
| reportpresentation | Detecting peer-to-peer botnets | |
| Author: Reinier Schoof, Ralph Koning | Supervisors: Wim Biemolt, Rogier Spoor | |
| reportpresentation | UCLP2 Evaluation | |
| Author: Tijmen van den Brink, Carol Meertens | Supervisors: Ronald van der Pol, Paola Grosso | |
| undisclosed | Beveiliging Belastingsdienst: CERT | |
|---|---|---|
| Author: Gert Bon, Jimmy Macé | Supervisor: Norien Kuiper | |
| reportpresentation | ``Cut Through Switching/routing'' op een Internet Exchange | |
| Author: René Jorissen, Lourens Bordewijk | Supervisor: Henk Steenman | |
| reportpresentation | Integration of MPI support in a large-scale grid deployment | |
| Author: Richard de Jong, Matthijs Koot | Supervisors: David Groep, Jeff Templon, Louis Poncet | |
| undisclosed | Beveiliging Belastingsdienst: Vertrouwd Toegangspad | |
| Author: Steffen van Loon, Fangbin Liu | Supervisor: Norien Kuiper | |
| reportpresentation | Voice over IP. status en toekomst | |
| Author: Bas Eenink, Antoine Schonewille | Supervisor: Rob Denekamp | |
| reportpresentation | GMPLS | |
| Author: Rob Prickaerts, Mark Meijerink | Supervisors: Ronald van der Pol, Paola Grosso | |
| reportpresentation | Benefits and tradeoffs of application-specific WAN acceleration technologies on different latency and loss scenarios | |
| Author: Dirk-Jan van Helmond, Marc Smeets | Supervisor: Saverio Pangoli | |
| reportpresentation | Ictivity VoIP Consultancy | |
|---|---|---|
| Authors: René Jorissen, Rob Prickaerts | Supervisor: Ewout van Dijck | |
| reportpresentation | Veiligheid c.q. beveiliging van de SURFnet IDS dienst | |
| Authors: Lourens Bordewijk, Jimmy Macé | Supervisor: Rogier Spoor | |
| reportpresentation | DNS statistieken bruikbaar als spy-, ad-, malware, botnet en virus detector? | |
| Authors: Dirk-Jan van Helmond, Antoine Schonewille | Supervisors: Rogier Spoor, Wim Biemolt | |
| undisclosed | Virtualisatie en distributie | |
| Authors: Richard de Jong, Bas Eenink | Supervisor: Martin Maas | |
| reportpresentation | Covert channels | |
| Authors: Matthijs Koot, Marc Smeets | Supervisor: Eric Nieuwland | |
| reportpresentation | Versleutelalgoritmes voor wachtwoorden | |
| Authors: Steffen van Loon, Gert Bon | Supervisor: Jeroen van Beek | |
| reportpresentation | SURFnet IDS project honeypot | |
| Authors: Mark Meijerink, Jonel Spellen | Supervisor: Rogier Spoor | |
| reportpresentation | HPC Parallel File System | |
| Author: Fangbin Liu | Supervisors: Huub Stoffers, Ans Sullot | |
| reportpresentation | Bestands- en Schijfencryptie | |
|---|---|---|
| Authors: Marya Steenman, Thijs van den Berg | Supervisor: Xander Jansen | |
| reportpresentation | BGP (D)DoS Diversion | |
| Authors: Wouter Borremans, Ruben Valke | Supervisor: Jan Hoogenboom | |
| reportpresentation | Centralised patch management | |
| Authors: Jelmer Barhorst, Martin Pels | Supervisor: Frank Pinxt | |
| reportpresentation | Distributed File Systems - Inzetbaar als data consistentie houder? | |
| Authors: Jan van Lith, Maarten Michels | Supervisor: Fred Mobach | |
| reportpresentation | High Availability Services | |
| Authors: Arjan Dekker, Remco Hobo | Supervisor: Jaap van Ginkel | |
| reportpresentation | Systeembeheer in het MKB | |
| Author: Jeffrey Barendse | Supervisor: Mark van der Zwaag | |
| reportpresentation | TCP/IP stack extensies | |
| Authors: Pieter de Boer, Martijn Rijkeboer | Supervisor: Jan Meijer | |
| undisclosed | Beveiliging banktransacties | |
| Authors: Bart Dorlandt, Carlos Groen | Supervisors: Roeland Kluit, Martien Arends | |
| reportpresentation | SURFNet Intrusion Detection Systemss | |
| Authors: Kees Trippelvitz, Harm-Jan Blok | Supervisor: Rogier Spoor | |
| undisclosed | Onderzoek naar machine virtualisatie technieken | |
|---|---|---|
| Authors: Martijn Rijkeboer, Jelmer Barhorst | Supervisor: Jan Meijer | |
| report | Onderzoek naar de problematiek van invoering van IPv6 in een organisatie zoals die van het SNB Lab | |
| Authors: Jan van Lith, Marya Steenman | Supervisors: Mendel Mobach, Wim Biemolt | |
| report | Voor- en nadelen van Sender Policy Framework | |
| Authors: Thijs van den Berg, Kees Trippelvitz | Supervisors: Jeroen Scheerder, Karst Koymans | |
| report | MonALISA | |
| Authors: Harm-Jan Blok, Bart Dorlandt | Supervisors: Freek Dijkstra, Bas van Oudenaarde | |
| report | User Controlled LightPath, UCLP | |
| Authors: Ruben Valke, Remco Hobo | Supervisors: Bas van Oudenaarde, Freek Dijkstra | |
| report | Loganalyse en IDS | |
| Authors: Carlos Groen, Arjan Dekker | Supervisor: Fred Mobach | |
| report | Host Based Intrusion Detection Systemen | |
| Authors: Martin Pels, Pieter de Boer | Supervisor: Jaap van Ginkel | |
| report | Clustering with OpenMosix | |
| Authors: Wouter Borremans, Maarten Michels | Supervisor: Harris Sunyoto | |
| report | Universele Configuratie Methode | |
| Author: Jeffrey Barendse | Supervisor: Marten Hoekstra | |
| report | Real-Time and Quality of Service Facilities for Wireless Networks | |
|---|---|---|
| Authors: Eric Hos, Niels Visser | Supervisor: Jeroen Scheerder | |
| report | Performance van een op Web Services gebaseerde AAA service binnen een J2EE application server omgeving | |
| Authors: Aziz Ait Messaoud, Redouan Lahit | Supervisors: Yuri Demchenko, Cees de Laat | |
| unavailable | Virtual Network Experiments with User Mode Linux | |
| Authors: Jeroen van der Ham, Gert Jan Verhoog | Supervisors: Karst Koymans, Jeroen Scheerder | |
| report | Traffic Engineering op een Force10 | |
| Authors: Marco van Doorn, Roeland Kluit | Supervisors: Cees de Laat, Freek Dijkstra | |
| unavailable | Het grootschalig inzetten van Zigbee-technologie in een bedrijfsomgeving | |
| Authors: Eelco Driel, Ronald Wezeman | Supervisor: Rob Meijer | |
| report | Distributed Intrusion Detection Platform | |
| Authors: Jeroen van Beek, Tjerk Nan | Supervisor: Jaap van Ginkel | |
| unavailable | Beveiliging Portal Interpay (undisclosed) | |
| Authors: Sander Bootsma, Daniël Hilster | Supervisors: Ramses Hoek, Jan Mastenbroek, Rob Meijer | |
| unavailable | Cyberauthoring, SANE 2004 paper | |
| Author: Arjen Krap | Supervisors: Karst Koymans, Jeroen Scheerder | |
| unavailable | IPv4 to IPv6 Migration | |
| Authors: Aziz Ahrouch, Samir Ezzine | Supervisor: Karst Koymans | |
| report | Verbetering convergentietijd klantaansluitingen SURFnet | |
| Authors: Leendert van Doesburg, Andree Toonk | Supervisors: Dennis Paus, Jeroen Scheerder | |
| report | Multicast Configuration | |
| Author: Thijs Hodiamont | Supervisors: Leonard Knijff, Cees de Laat | |
| report | Distributed Mail | |
| Authors: Jaap Bouwsma, Robert Visser | Supervisor: Jeroen Scheerder | |
| report | Disrupting Wireless Networks | |
| Authors: Dennis Marinus, Martijn Meijer | Supervisor: Mark Burgess | |
| report | Onderzoek naar een professionele ICT infrastructuur | |
|---|---|---|
| Authors: Leendert van Doesburg, Andree Toonk | Supervisor: Jeroen Scheerder | |
| unavailable | Setting up a Virtual Network Laboratory with User-Mode Linux | |
| Author: Arjen Krap | Supervisor: Karst Koymans | |
| report | G5 Performance Report | |
| Authors: Daniël Hilster, Niels Visser | Supervisors: Freek Dijkstra, Cees de Laat | |
| unavailable | Single sign-on | |
| Authors: Martijn Meijer, Jaap Bouwsma | Supervisor: Jeroen Scheerder | |
| unavailable | Linux/PPC Netbooting Analyzed | |
| Authors: Jeroen van der Ham, Thijs Hodiamond | Supervisor: Jeroen Scheerder | |
| report | Licenties onder de loep | |
| Authors: Marco van Doorn, Roeland Kuit | Supervisor: Rob Meijer | |
| unavailable | Een overzicht van de gangbare methoden in de spambestrijding | |
| Authors: Eelco Driel, Ronald Wezeman | Supervisor: Rob Meijer | |
| report | IPv6 Monitoring Web Services | |
| Authors: Jeroen van Beek, Gert Jan Verhoog | Supervisors: Remco Poortinga, Karst Koymans | |
| undisclosed | Meten en monitoren bij SURFnet | |
| Authors: Dennis Marinus, Tjerk Nan | Supervisors: Dennis Paus, Erik-Jan Bos, Cees de Laat | |
| unavailable | Generic Authentication, Authorization and Accounting | |
| Authors: Sander Bootsma, Eric Hos | Supervisors: Leon Gommans, Bas van Oudenaarde, Cees de Laat | |
| report | Evaluatie van de beveiligingsarchitectuur van Collaboratory.nl | |
| Authors: Aziz Ait Messaoud, Redouan Lahit | Supervisors: Yuri Damchenko, Cees de Laat | |
| unavailable | Migratie van Sendmail naar Postfix | |
| Authors: Sander Hollaar, Samir Ezzine | Supervisors: Jeroen Roodhart, Gert Poletiek, Karst Koymans | |
| unavailable | ICT Consultancy | |
| Author: Samir Ezzine | Supervisors: Jeroen Roodhart, Karst Koymans | |
| report | Zeroconf | |
| Authors: Robert Visser, Aziz Ahrouch | Supervisor: Jeroen Scheerder | |