Archive of OS3 Master's Theses

Below is a list of research projects per academic year.

Each year has two research project periods of one month each, called Research Project 1 and 2.

Research project 2 is the equivalent of the Master's Thesis.

Not all papers or presentations are represented since some are confidential.

2020-2021

See RP site

2019-2020

Research Project 2

ReportPresentation Server agnostic DNS augmentation using eBPF
Author: Tom Carpaij Supervisors: Willem Toorop, Luuk Hendriks
ReportPresentation Incorporating post-quantum cryptography in a microservice environment
Author: Daan Weller, Ronald van der Gaag Supervisors: Cedric Van Bockhaven, Itan Barmes, Vincent van Mieghem
ReportPresentation Malicious behavior detection based on CyberArk PAS logs through string matching and genetic neural networks
Author: Mike Slotboom, Ivar Slotboom Supervisors: Roel Bierens, Bartosz Czaszynski
ReportPresentation Detecting Botnets Communicating with Command and Control Servers with DNS and NetFlow Data
Author: Hoang Huynh, Mathijs Visser Supervisors: Eddie Bijnen
ReportPresentation Advanced Persistent Threat detection for Industrial Control Systems
Author: Dominika Rusek, Steffan Roobol Supervisors: Derre Hendrik, Deneut Tijl
ReportPresentation Incentivize decentralized WiFi roaming through VPN on home routers
Author: Supervisors: Peter Boers
ReportPresentation Detecting Cobalt Strike beacons in NetFlow data
Author: Vincent van der Eijk, Coen Schuijt Supervisors: Ralph Koning
ReportPresentation Collecting telemetry data using P4 and RDMA
Author: Silke Knossen, Rutger Beltman Supervisors: Joseph Hill, Paola Grosso
ReportPresentation The integration of Ethernet Virtual Private Network in Kubernetes
Author: Frank Potter Supervisors: Attilla de Groot
ReportPresentation End-to-end security in LoRa and NB-IoT sensor networks.
Author: Niek van Noort, Jason Kerssens Supervisors: Cedric Both
ReportPresentation Performance comparison of VPN implementations WireGuard, strongSwan, and OpenVPN in a 1 Gbit/s environment
Author: Patrick Spaans, Erik Dekker Supervisors: Aristide Bouix, Mohammad Al Najar
ReportPresentation Analysis of Bypassing Detection by Microsoft Advanced Threat Analytics
Author: Edgar Bohte, Nick Offerman Supervisors: Cedric Van Bockhaven
ReportPresentation Iris recognition using low resolution photographs from commodity sensors
Author: Roy Vermeulen Supervisors: Zeno Geradts
ReportPresentation Deepfake detection through PRNU and logistic regression analyses
Author: Catherine de Weever, Sebastian Wilczek Supervisors: Zeno Geradts
ReportPresentation Monitoring an EVPN-VxLAN fabric with BGP Monitoring Protocol
Author: Giacomo Casoni, Davide Pucci Supervisors: Vivek Venkatraman, Donald Sharp, Attilla de Groot
ReportPresentation Defragmenting DNS: Determining the optimal maximum UDP response size for DNS
Author: Axel Koolhaas, Tjeerd Slokker Supervisors: Willem Toorop, Roland van Rijswijk-Deij
ReportPresentation Using TURN Servers as Proxies
Author: Sean Liao Supervisors: Cedric van Bockhaven, Jan Freudenreich
ReportPresentation An Evaluation of IPFS as a Distribution Mechanism for RPKI Repository
Author: Dadepo Aderemi, Woudt van Steenbergen Supervisors: Luuk Hendriks
ReportPresentation Securing home Wi-Fi with WPA3 personal
Author: Raoul Dijksman, Erik Lamers Supervisors: Arjan van der Vegt
ReportPresentation Investigative Research of an IP Peering Service for NetherLight
Author: Arnold Buntsma, Mar Badias Simó Supervisors: Gerben van Malenstein, Migiel de Vos, Max Mudde
ReportPresentation Securing the Automatic Dependent Surveillance-Broadcast (ADS-B) protocol against spoofing
Author: Tim de Boer Supervisors: Jan-Joris van Es, Nico de Gelder
ReportPresentation Requirements for extracting ENF data to correctly timestamp a video
Author: Thomas Ouddeken, Niels den Otter Supervisors: Zeno Geradts
ReportPresentation Automated reverse-engineering of CAN messages using OBD-II and correlation coefficients
Author: Vincent Kieberl, Bram Blaauwendraad Supervisors: Sander Ubink, Ruben Koeze
ReportPresentation Securely accessing remote sensors in critical infrastructures.
Author: Pavlos Lontorfos Supervisors: Cedric Both

Research Project 1

ReportPresentation Zero Trust Network Security Model in containerized environments
Author: Catherine de Weever, Marios Andreou Supervisors: Jeroen Scheerder
ReportPresentation The Current State of DNS Resolversand RPKI Protection
Author: Erik Dekker, Marius Brouwer Supervisors: Willem Toorop
ReportPresentation Digital Forensic Investigation of Data Theft on the Google Cloud Platform
Author: Frank Wiersma, Tjeerd Slokker Supervisors: Korstiaan Stam
ReportPresentation APFS Slack Analysis and Detection of Hidden Data
Author: Axel Koolhaas, Woudt van Steenbergen Supervisors: Danny Kielman
ReportPresentation Elastic Named Data Network (NDN) for data centric application in cloud environments
Author: Sean Liao Supervisors: Zhiming Zhao
ReportPresentation Ibis Data Serialization in Apache Spark
Author: Dadepo Aderemi, Mathijs Visser Supervisors: Jason Maassen, Adam Belloum
ReportPresentation Anomaly Detection on Log Files Based on Simplicity Theory
Author: Giacomo Casoni, Mar Badias Simó Supervisors: Giovanni Sileno
ReportPresentation Analyzing and enhancing embedded software technologies on RISC-V64 using the Ghidra framework
Author: Patrick Spaans, Joris Jonkers Both Supervisors: Alexandru Geana, Karolina Mrozek, Dana Geist
ReportPresentation Security Evaluation on Amazon Web Services’ REST API Authentication Protocol Signature Version 4
Author: Hoang Huynh, Jason Kerssens Supervisors: Alex Stavroulakis, Aristide Bouix
ReportPresentation Generating probable password candidates for the assessment of Dutch domain password hashes
Author: Tom Broumels Supervisors: Pim Campers
ReportPresentation Network Anomaly Detection in Modbus TCP Industrial Control Systems
Author: Philipp Mieden, Rutger Beltman Supervisors: Bartosz Czaszynski
ReportPresentation The influence of the training set size on the performance of the Robust Covariance Estimator as an anomaly detection algorithm on automotive CAN data
Author: Silke Knossen, Vincent Kieberl Supervisors: Colin Schappin
ReportPresentation Cybersecurity in Automotive Networks
Author: Arnold Buntsma, Sebastian Wilczek Supervisors: Colin Schappin
ReportPresentation Tunneling data over a Citrix virtual channel
Author: Ward Bakker, Niels den Otter Supervisors: Cedric Van Bockhaven
ReportPresentation Using Mimikatz’ driver, Mimidrv, to disable Windows Defender in Windows
Author: Bram Blaauwendraad, Thomas Ouddeken Supervisors: Cedric Van Bockhaven
ReportPresentation Detecting Fileless Malicious Behaviour of .NET C2 Agents using ETW
Author: Alexander Bode, Niels Warnars Supervisors: Leandro Velasco, Jeroen Klaver
ReportPresentation Scoring model for IoCs by combining open intelligence feeds to reduce false positives
Author: Jelle Ermerins, Niek van Noort Supervisors: Leandro Velasco, João Carlos De Novais Marques
ReportPresentation Using BGP Flow-Spec for distributed micro-segmentation
Author: Davide Pucci Supervisors: Attilla de Groot
ReportPresentation APFS checkpoint management behaviour in macOS
Author: Maarten van der Slik Supervisors: Zeno Geradts, Ruud Schramp
ReportPresentation Insight in Cyber Safety when Remotely Operating SCADA Systems of Dutch Critical Infrastructure Objects
Author: Tina Tami Supervisors: Cedric Both
ReportPresentation Mobility as a Service(MaaS) and Privacy
Author: Alexander Blaauwgeers Supervisors: Alex Stavroulakis

2018-2019

Research Project 2

ReportPresentation Automated end-to-end e-mail component testing
Author: Isaac Klop, Kevin Csuka Supervisors: Michiel Leenaars
ReportPresentation Availability analysis of SURFwireless
Author: Kasper van Brakel Supervisors: Frans Panken
ReportPresentation Scaling AMS-IX Route Servers
Author: David Garay Supervisors: Stavros Konstantaras
ReportPresentation IoT (D)DoS prevention and corporate responsibility: A model to prevent polluting the internet
Author: Swann Scholtes Supervisors: Alex Stavroulakis
ReportPresentation Pairing attacks on the Bluetooth Low Energy Protocol
Author: Vincent Breider, Marko Spithoff Supervisors: Hidde-Jan Jongsma
ReportPresentation Planning and Scaling a Named Data Network with Persistent Identifier Interoperability
Author: Kees de Jong, Anas Younis Supervisors: Zhiming Zhao
ReportPresentation Bypassing phishing protections with email authentication
Author: Adrien Raulot Supervisors: Alex Stavroulakis, Marat Nigmatullin
ReportPresentation Practical Implications of Graphene-SGX
Author: Robin Klusman, Derk Barten Supervisors: Gijs Hollestelle

Research Project 1

ReportPresentation Technical feasibility of Segment Routing Traffic Engineering to steer traffic through VNFs
Author: Ronald van der Gaag, Mike Slotboom Supervisors: Marijke Kaat, Eyle Brinkhuis
ReportPresentation Network Peering Dashboard for SURFnet
Author: David Garay Supervisors: Jac Kloots, Marijke Kaat
ReportPresentation Investigation of security on Chinese smartwatches
Author: Kasper van Brakel, Renee Witsenburg Supervisors: Alex Stavroulakis
ReportPresentation WhatsApp End-to-End Encryption: Are Our Messages Private?
Author: Pavlos Lontorfos, Tom Carpaij Supervisors: Alex Stavroulakis
ReportPresentation Probabilistic password recognition
Author: Tiko Huizinga Supervisors: Zeno Geradts
ReportPresentation Developing a contained and user emulated malware assessment platform
Author: Siebe Hodzelmans, Frank Potter Supervisors: Vincent van Mieghem, Henri Hambartsumyan
ReportPresentation Security evaluation of glucose monitoring applications for Android smartphones
Author: Roy Vermeulen, Edgar Bohte Supervisors: Ruud Verbij
ReportPresentation A Deep Dive into the Dark Web
Author: Coen Schuijt Supervisors: Stijn van Winsen, Soufiane el Aissaoui
ReportPresentation Client-side Attacks on the LastPass Browser Extension
Author: Derk Barten Supervisors: Cedric Van Bockhaven
ReportPresentation Characterization of a Cortex-M4 based microcontroller using optical fault injection
Author: Jasper Hupkens, Dominika Rusek Supervisors: Niek Timmers
ReportPresentation Invisible Internet Project (I2P)
Author: Vincent Breider, Tim de Boer Supervisors: Henri Hambartsumyan, Vincent van Mieghem, Fons Mijnen
ReportPresentation A Comparative Security Evaluation for IPv4 and Ipv6 Addresses
Author: Erik Lamers, Vincent van der Eijk Supervisors: Tobias Fiebig
ReportPresentation Development of Techniques to Remove Kerberos Credentials from Windows Systems
Author: Nick Offerman, Steffan Roobol Supervisors: Dima van de Wouw

2017-2018

Research Project 2

ReportPresentation Security By Default: A Comparative Security Evaluation of Default Configurations
Author: Bernardus Jansen Supervisors: Tobias Fiebig, Ralph Koning
ReportPresentation Low-level writing to NTFS file systems
Author: Rick van Gorp Supervisors: Cedric Van Bockhaven
ReportPresentation A Blockchain based Data Production Traceability System
Author: Sandino Moeniralam Supervisors: Sjaak Koot
ReportPresentation An analysis of the scale-invariance of graph algorithms: A case study.
Author: Tim van Zalingen Supervisors: Merijn Verstraaten
ReportPresentation Opcode statistics for detecting compiler settings
Author: Kenneth van Rijsbergen Supervisors: Armijn Hemel
ReportPresentation Optimal network design of SURFnet8, using TI-LFA and Segment Routing
Author: Péter Prjevara, Fouad Makioui Supervisors: Marijke Kaat, Wouter Huisman
ReportPresentation DDoS Defense Mechanisms for IXP Infrastructures
Author: Lennart van Gijtenbeek, Tim Dijkhuizen Supervisors: Stavros Konstantaras
ReportPresentation Content-based Classification of Fraudulent Webshops
Author: Sjors Haanen, Mick Cox Supervisors: Marco Davids, Maarten Wullink
ReportPresentation Bypassing Phishing Filters
Author: Shahrukh Zaidi Supervisors: Rick van Galen, Alex Stavroulakis
ReportPresentation Improving Semantic Quality of Topic Models for Forensic Investigations
Author: Henri Trenquier Supervisors: Rob van Nieuwpoort, Carlos Martinez Ortiz
ReportPresentation Using Fault Injection to weaken RSA public key verification
Author: Ivo van der Elzen Supervisors: Ronan Loftus
ReportPresentation Automated analysis of AWS infrastructures
Author: Peter Bennink Supervisors: Cedric Van Bockhaven
ReportPresentation How to Spot the Blue Team
Author: Rick Lahaye Supervisors: Marc Smeets
ReportPresentation Towards predicting network device failures: An analysis of time-series and syslog data
Author: Henk van Doorn, Chris Kuipers Supervisors: Marijke Kaat, Peter Boers
ReportPresentation DoS on a Bitcoin Lightning Network channel.
Author: Willem Rens Supervisors: Oskar van Deventer, Maarten Everts
ReportPresentation Privacy analysis of DNS resolver solutions
Author: Jeroen van Heugten Supervisors: Martin Hoffmann, Ralph Dolmans
ReportPresentation Targeted GPS spoofing
Author: Luc Gommans, Bart Hermans Supervisors: Ralph Moonen
ReportPresentation Verifying email security techniques for Dutch organizations
Author: Vincent van Dongen Supervisors: George Thessalonikefs, Ralph Dolmans
ReportPresentation Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network
Author: Dirk Gaastra, Kotaiba Alachkar Supervisors: Henri Hambartsumyan, Vincent van Mieghem
ReportPresentation Tor: Hidden Service Intelligence Extraction
Author: João Carlos De Novais Marques Supervisors: Rik van Duijn, Leandro Velasco

Research Project 1

ReportPresentation Microsoft Office Upload Center Cache Files in Forensic Investigations
Author: Rick van Gorp, Kotaiba Alachkar Supervisors: Yonne de Bruijn
ReportPresentation Network Functions Virtualization
Author: Bernardus Jansen Supervisors: Marijke Kaat
ReportPresentation Pentest Accountability By Analyzing Network Traffic & Network Traffic Metadata
Author: Marko Spithoff, Henk van Doorn Supervisors: Rick van Galen
ReportPresentation An Analysis of Atomic Swaps on and between Ethereum Blockchains using Smart Contracts
Author: Peter Bennink, Lennart van Gijtenbeek Supervisors: Oskar van Deventer, Maarten Everts
ReportPresentation Virtual infrastructure partitioning and provisioning under nearly real-time constraints
Author: Andrey Afanas'yev Supervisors: Zhiming Zhao, Arie Taal
ReportPresentation Feasibility of Cryptocurrency on Mobile devices
Author: Sander Lentink, Anas Younis Supervisors: Rick van Galen
ReportPresentation Capability analyses of mdtmFTP
Author: Kees de Jong Supervisors: Leon Gommans
ReportPresentation Deanonymisation in Ethereum Using Existing Methods for Bitcoin
Author: Tim Dijkhuizen, Robin Klusman Supervisors: Arno Bakker
ReportPresentation Breaking CAPTCHAs on the Dark Web
Author: Dirk Gaastra, Kevin Csuka Supervisors: Yonne de Bruijn
ReportPresentation Improving Machine Learning based Intrusion and Anomaly Detection on SCADA and DCS using Case Specific Information
Author: Péter Prjevara Supervisors: Dima van de Wouw
ReportPresentation Framework for profiling critical pathrelated algorithms
Author: Henri Trenquier Supervisors: Zhiming Zhao
ReportPresentation Containerized Workflow Scheduling
Author: Isaac Klop Supervisors: Zhiming Zhao
ReportPresentation Categorizing container escape methodologies in multi-tenant environments
Author: Rik Janssen Supervisors: Rick van Galen
ReportPresentation Detection of Browser Fingerprinting by Static JavaScript Code Classification
Author: Sjors Haanen, Tim van Zalingen Supervisors: Aidan Barrington
ReportPresentation Large-scale Netflow Information Management
Author: Shahrukh Zaidi, Adrien Raulot Supervisors: Marijke Kaat, Wim Biemolt
ReportPresentation Plug-and-play Raspberry Pi-based video filtration system: A novel approach to real-time on the wire reversible PII anonymization in video streams using commodity hardware
Author: Swann Scholtes, Chris Kuipers Supervisors: Junaid Chaudhry
ReportPresentation Probabilistic Passphrase Cracking
Author: Luc Gommans Supervisors: Melanie Rieback

2016-2017

Research Project 2

ReportPresentation Measuring Performance Overhead of Trans-encrypting HTTP Adaptive Streaming
Author: Abe Wiersma Supervisors: Oskar van Deventer
ReportPresentation Formal verification of the implementation of the MQTT protocol in IoT devices
Author: Kris Mladenov Supervisors: Rick van Galen
ReportPresentation Automated embedding of dynamic libraries into iOS applications from GNU/Linux
Author: Marwin Baumann, Leandro Velasco Supervisors: Cedric Van Bockhaven
ReportPresentation Security considerations in Docker Swarm networking
Author: Marcel Brouwers Supervisors: Esan Wit
ReportPresentation Calculating the Energy Consumption of a Website
Author: Anouk Boukema Supervisors: Maarten de Waard
ReportPresentation A hybrid system for automatic exchanges of routing information
Author: Stamatios Maritsas Supervisors: Stavros Konstantaras
ReportPresentation Improving the Energy Efficiency of SURFwireless
Author: Jeroen van Leur Supervisors: Frans Panken, Marijke Kaat
ReportPresentation Application aware digital objects access and distribution using Named Data Networking (NDN)
Author: Rahaf Mousa Supervisors: Zhiming Zhao, Lucia D'Acunto, Paul Martin
ReportPresentation Collecting, cataloguing and searching performance information of Cloud resources
Author: Olaf Elzinga Supervisors: Zhiming Zhao, Arie Taal
ReportPresentation Feasibility of ILA as Network Virtualization Overlay in multi-tenant, multi-domain Cloud
Author: Tako Marks Supervisors: Lukasz Makowski, Paola Grosso
ReportPresentation Parallelization of BGP for route server functionality: A protocol and implementation study
Author: Jenda Brands, Patrick de Niet Supervisors: Stavros Konstantaras, Aris Lambrianidis
ReportPresentation eBPF Based Networking
Author: Nick de Bruijn Supervisors: Lukasz Makowski, Paola Grosso
ReportPresentation Session based high bandwidth throughput testin
Author: Bram ter Borch Supervisors: David Groep, Tristan Suerink
ReportPresentation Freenet Darknet Mapping
Author: Kees Halvemaan Supervisors: Yonne de Bruijn, Lennart Haagsma
ReportPresentation Discriminating reflective (D)DoS attack tools at the reflector
Author: Fons Mijnen, Max Grim Supervisors: Lennart Haagsma
ReportPresentation Segment Routing in Container Networks
Author: Ben de Graaff Supervisors: Marijke Kaat
ReportPresentation Unintended metadata leakage at the Dutch Government
Author: Auke Zwaan Supervisors: Alex Stavroulakis, Sukalp Bhople
ReportPresentation Kerberos Credential Thievery (GNU/Linux)
Author: Arne Zismer, Ronan Loftus Supervisors: Cedric van Bockhaven

Research Project 1

ReportPresentation Thinking in possibilities for federated log out.
Author: Marcel den Reijer, Fouad Makioui Supervisors: Thijs Kinkhorst, Joost van Dijk
ReportPresentation Extending the range of NFC capable devices
Author: Sandino Moeniralam, Bart Hermans Supervisors: Jordi van den Breekel, Jarno van de Moosdijk
ReportPresentation Automatic comparison of photo response non uniformity (PRNU) on Youtube
Author: Marcel Brouwers, Rahaf Mousa Supervisors: Zeno Geradts
ReportPresentation Repurposing defensive technologies for offensive Red Team operation
Author: Arne Zismer, Kris Mladenov Supervisors: Ari Davies
ReportPresentation Security and Performance Analysis of Encrypted NoSQL Database
Author: Abe Wiersma, Max Grim Supervisors: Fatih Turkmen
ReportPresentation Android 7 File Based Encryption and the Attacks Against It
Author: Marwin Baumann, Ronan Loftus Supervisors: Rick van Galen
ReportPresentation Advantages of Anomaly Detection Between the Controlling Unit and the Process Devices of an Industrial Control System
Author: Rick Lahaye, Anouk Boukema Supervisors: Coen Steenbeek, Dima van de Wouw
ReportPresentation Hiding in open sight: Dynamic profiles for malware communication
Author: João Carlos De Novais Marques, Mick Cox Supervisors: Cedric van Bockhaven, Ari Davies
ReportPresentation Website fingerprinting attacks against Tor Browser Bundle: a comparison between HTTP/1.1 and HTTP/2
Author: Kees Halvemaan, Tako Marks Supervisors: David Vaartjes, Jurgen Kloosterman
ReportPresentation Techniques for detecting compromised IoT devices
Author: Ivo van der Elzen, Jeroen van Heugten Supervisors: Rogier Spoor
ReportPresentation Automated Windows lab Deployment
Author: Vincent van Dongen, Fons Mijnen Supervisors: Marc Smeets
ReportPresentation Reliable Library Identification Using VMI Techniques
Author: Leandro Velasco, Nick de Bruijn Supervisors: Ralph Koning, Ben de Graaff
ReportPresentation Browser forensics: adblocker extensions.
Author: Willem Rens Supervisors: Johannes de Vries

2015-2016

Research Project 2

ReportPresentation Designing an open source DMARC aggregation tool
Author: Yadvir Singh Supervisors: Michiel Leenaars
ReportPresentation Design Exploration of Transparency Enhancing Technology for Government
Author: Thijs Houtenbos Supervisors: Guido van 't Noordende
ReportPresentation Adding An Unusual Transport To The Serval Project
Author: Alexandros Tsiridis, Joseph Hill Supervisors: Paul Gardner-Stephen
ReportPresentation Taking a closer look at IRATI
Author: Koen Veelenturf Supervisors: Marijke Kaat, Ralph Koning
ReportPresentation Machine Detectable Network Behavioural Commonalities for Exploits and Malware
Author: Alexandros Stavroulakis Supervisors: Adrianus Warmenhoven
ReportPresentation On the feasibility of converting AMS-IX to an Industrial-Scale Software Defined Internet Exchange Point
Author: Siem Hermans, Jeroen Schutrup Supervisors: Joris Claassen, Arien Vijnn
ReportPresentation Power Efficiency of Hypervisor-based Virtualization versus Container-based Virtualization
Author: Jeroen van Kessel Supervisors: Arie Taal, Paola Grosso
ReportPresentation Analysing the feasibility of portable passive detection of Advanced Persistent Threats
Author: Guido Kroon Supervisors: Marco Davids, Cristian Hesselman
ReportPresentation Namecoin as alternative to the Domain Name System
Author: Xander Lammertink Supervisors: Marco Davids, Cristian Hesselman
ReportPresentation Dynamic access control analysis in WordPress plugins
Author: Frank Uijtewaal Supervisors: Patrick Jagusiak
ReportPresentation TLS Session Key Extraction from Memory on iOS Devices
Author: Thomas Curran, Marat Nigmatullin Supervisors: Cedric Van Bockhaven
ReportPresentation Developing an Ethereum Blockchain Application
Author: Nikolaos Triantafyllidis Supervisors: Oskar van Deventer, Erwin Middelesch
ReportPresentation Extremely Sensitive Communication: secure, secret, and private e-mail
Author: Loek Sangers Supervisors: Ruud Verbij
ReportPresentation Partition under disruption improves computer network delivery
Author: Lukasz Makowski Supervisors: Marc Makkes
ReportPresentation Restoring TCP sessions with a DHT
Author: Peter Boers Supervisors: Attilla de Groot, Pete Lumbis, Rama Darbha
ReportPresentation Bypassing 802.1X in an IPv6 configured network
Author: Ruben de Vries, Robert Diepeveen Supervisors: Henri Hambartsumyan, Arris Huijgen
ReportPresentation SDIO as a new peripheral attack vector
Author: Thom Does, Dana Geist Supervisors: Cedric Van Bockhaven
ReportPresentation The Design of Malware on Modern Hardware: Malware Inside Intel SGX Enclaves
Author: Jeroen van Prooijen Supervisors: Marc X. Makkes, Kaveh Razavi
ReportPresentation Using Sensitive Information on Android 6 Based Smartphones
Author: Romke van Dijk Supervisors: Ruud Verbij
ReportPresentation A systematic approach towards GNSS receiver vulnerability analysis on Remotely Piloted Aircraft Systems
Author: Mike Maarse Supervisors: René Wiegers, Judith van Bruggen
ReportPresentation Modifying existing applications for 100 Gigabit Ethernet
Author: Jelte Fennema Supervisors: Migiel de Vos
ReportPresentation P4 VPN Authentication: Authentication of VPN Traffic on a Network Device with P4
Author: Jeroen Klomp Supervisors: Ronald van der Pol, Marijke Kaat

Research Project 1

ReportPresentation (Aster)-picking through the pieces of short URL services
Author: Peter Boers Supervisors: Ruud Verbij
ReportPresentation BGP Hijack Alert System
Author: Bram ter Borch Supervisors: Jeroen van der Ham, Gert Vliek
ReportPresentation Exfiltrating Data from Managed Profiles in Android for Work
Author: Thomas Curran Supervisors: Paul van Iterson
ReportPresentation (Aster)-picking through the pieces of short URL services
Author: Robert Diepeveen Supervisors: Ruud Verbij
ReportPresentation Portable RFID Bumping Device
Author: Romke van Dijk Supervisors: Ari Davies
ReportPresentation Subverting Android 6.0 fingerprint authentication
Author: Thom Does Supervisors: Rick van Galen
ReportPresentation Misusing Open Services on the Internet
Author: Jelte Fennema Supervisors: Rick van Galen
ReportPresentation Jailbreak/Root Detection Evasion Study on iOS and Android
Author: Dana Geist Supervisors: Roel Bierens
ReportPresentation Misusing Open Services on the Internet
Author: Ben de Graaff Supervisors: Rick van Galen
ReportPresentation Docker Overlay Network
Author: Siem Hermans Supervisors: Paola Grosso
ReportPresentation Investigating the Potential for SCTP to be used as a VPN Transport Protocol
Author: Joseph Hill Supervisors: Ralph Koning, Junaid Chaudhry
ReportPresentation Recursive InterNetwork Architecture
Author: Jeroen Klomp Supervisors: Marijke Kaat, Ralph Koning
ReportPresentation Recursive InterNetwork Architecture
Author: Jeroen van Leur Supervisors: Marijke Kaat, Ralph Koning
ReportPresentation Subverting Android 6.0 fingerprint authentication
Author: Mike Maarse Supervisors: Rick van Galen
ReportPresentation Performance measurement and tuning of remote acquisition
Author: Lukasz Makowski Supervisors: Ruud Schramp, Zeno Geradts, Erwin van Eijk
ReportPresentation Penetration Testing Auditability
Author: Stamatios Maritsas Supervisors: Christopher Mills
ReportPresentation Docker Overlay Network
Author: Patrick de Niet Supervisors: Paola Grosso
ReportPresentation Jailbreak/Root Detection Evasion Study on iOS and Android
Author: Marat Nigmatullin Supervisors: Roel Bierens
ReportPresentation UsnJrnl Parsing for File System History
Author: Jeroen van Prooijen Supervisors: Kevin Jonkers
ReportPresentation Portable RFID Bumping Device
Author: Loek Sangers Supervisors: Ari Davies
ReportPresentation BGP Hijack Alert System
Author: Jeroen Schutrup Supervisors: Jeroen van der Ham, Gert Vliek
ReportPresentation WIFI espionage using a UAV
Author: Yadvir Singh Supervisors: Rick van Galen
ReportPresentation Comparison of parallel and distributed implementation of the MST algorithm
Author: Alexis Sireta Supervisors: Ana Varbanescu
ReportPresentation Penetration Testing Auditability
Author: Alexandros Tsiridis Supervisors: Christopher Mills
ReportPresentation UsnJrnl Parsing for File System History
Author: Frank Uijtewaal Supervisors: Kevin Jonkers
ReportPresentation Exfiltrating Data from Managed Profiles in Android for Work
Author: Ruben de Vries Supervisors: Paul van Iterson
ReportPresentation Malicious Domain Name Detection System
Author: Auke Zwaan Supervisors: Marco Davids, Cristian Hesselman, Maarten Wullink

2014-2015

Research Project 2

ReportPresentation Improving the Performance of an IP-over-P2P Overlay for Nested Cloud Environments
Author: Dragos-Laurentiu Barosan Supervisors: Renato Figueiredo, Kaveh Razavi, Ana Oprescu
ReportPresentation Crawling the USENET for DMCA
Author: Eddie Bijnen Supervisors: Niels Sijm, Arno Bakker
ReportPresentation Analysis of DNS Resolver Performance Measurements
Author: Hamza Boulakhrif Supervisors: Willem Toorop, Yuri Schaeffer
ReportPresentation Container Network Solutions
Author: Joris Claassen Supervisors: Paola Grosso
ReportPresentation Remote Acquisition Boot environment
Author: Dennis Cortjens Supervisors: Ruud Schramp
ReportPresentation The use of workflow topology observables in a Security Autonomous Response Network
Author: Adriaan Dens Supervisors: Marc Makkes, Robert Meijer
ReportPresentation Graph500 in the public cloud
Author: Harm Dermois Supervisors: Ana Varbanescu
ReportPresentation Network utilization with SDN in on-demand application-specific Networks
Author: Ioannis Grafis Supervisors: Marc Makkes
ReportPresentation PTP Switches Accuracy and Hollow Core Fiber Latency
Author: Martin Leucht Supervisors: Cees de Laat
ReportPresentation Functional breakdown of decentralised social networks
Author: Wouter Miltenburg Supervisors: Michiel Leenaars
ReportPresentation Zero-effort Monitoring
Author: Julien Nyczak Supervisors: Rick van Rein
ReportPresentation PTP Switches Accuracy and Hollow Core Fiber Latency
Author: Carlo Rengo Supervisors: Cees de Laat
ReportPresentation Measuring The Impact of Docker on Network I/O Performance
Author: Ardho Rohprimardho Supervisors: Cees de Laat
ReportPresentation Remote data acquisition of IskraME372 GPRS smart meter
Author: Nikolaos Sidiropoulos Supervisors: Max Hovens, Rick van Galen
ReportPresentation Discovery method for a DNSSEC validating stub resolver
Author: Xavier Torrent Gorjón Supervisors: Willem Toorop
ReportPresentation Automated configuration of BGP on edge routers
Author: Tarcan Turgut Supervisors: Stavros Konstantaras, Benno Overeinder
ReportPresentation Automated configuration of BGP on edge routers
Author: Stella Vouteva Supervisors: Stavros Konstantaras, Benno Overeinder
ReportPresentation HTTP Header Analysis
Author: Roland Zegers Supervisors: Renato Fontana
ReportPresentation Pre-boot RAM acquisition and compression
Author: Martijn Bogaard Supervisors: Ruud Schramp, Zeno Geradts, Erwin van Eijk
ReportPresentation Circumventing Forensic Live-Acquisition Tools On Linux
Author: Yonne de Bruijn Supervisors: Arno Bakker, Jaap van Ginkel
ReportPresentation Extremely Secure Communication
Author: Daniel Romão Supervisors: Martijn Sprengers, Ruud Verbij, Jarno Roos
ReportPresentation Online events registration with minimal privacy violation
Author: Niels van Dijkhuizen Supervisors: Jeroen van der Ham
ReportPresentation Security evaluation of smart-cars' remote control Applications
Author: Florian Ecard Supervisors: Cees de Laat
ReportPresentation Proving the wild jungle jump
Author: James Gratchoff Supervisors: Niek Timmers
ReportPresentation Securing the SDN northbound interface
Author: Jan Laan Supervisors: Haiyun Xu
ReportPresentation CoinShuffle anonymity in the Block chain
Author: Jan-Willem Selij Supervisors: Roberta Piscitelli, Oskar van Deventer
ReportPresentation An Overview on Hiding and Detecting Stego-data in Video Streams
Author: Alexandre Ferreira Supervisors: Zeno Geradts
ReportPresentation StealthWare - Social Engineering Malware
Author: Joey Dreijer Supervisors: Jeroen van Beek

Research Project 1

ReportPresentation Security intelligence data mining
Author: Nikolaos Triantafyllidis, Diana Rusu Supervisors: Henri Hambartsumyan
ReportPresentation Teleporting virtual machines
Author: Carlo Rengo, Harm Dermois Supervisors: Oskar van Deventer
ReportPresentation Fine-grained control of LAMP component versions for Hosting Companies
Author: Xander Lammertink Supervisors: Michiel Leenaars
ReportPresentation DANE verification test suite report
Author: Guido Kroon, Hamza Boulakhrif Supervisors: Michiel Leenaars
ReportPresentation Monitoring DNSSEC
Author: Martin Leucht, Julien Nyczak Supervisors: Rick van Rein
ReportPresentation Protecting against relay attacks forging increased distance reports
Author: Xavier Torrent Gorjón Supervisors: Martijn Sprengers
ReportPresentation Feasibility and Deployment of Bad USB
Author: Stella Vouteva Supervisors: Martijn Sprengers
ReportPresentation Evaluating the security of the KlikAanKlikUit Internet Control Station 1000
Author: Roland Zegers Supervisors: Martijn Sprengers
ReportPresentation Study on a known-plaintext attack on ZIP encryption
Author: Dragos-Laurentiu Barosan Supervisors: Armijn Hemel
ReportPresentation Large-scale drive-by download detection: visitn. process. analyse. report.
Author: Adriaan Dens, Martijn Bogaard Supervisors: Jop van der Lelie, Wouter Katz
ReportPresentation Trusted Network Initiative to combat DDos attacks
Author: Jeroen van Kessel, Alexandros Stavroulakis Supervisors: Marc Gauw
ReportPresentation Peeling the Google Public DNS Onion
Author: Ardho Rohprimardho, Tarcan Turgut Supervisors: Roland van Rijswijk - Deij
ReportPresentation Security automation and optimization using HP-NA
Author: Florian Ecard Supervisors: Olivier Willm
ReportPresentation Preventing Common Attacks on Critical Infrastructure
Author: Koen Veelenturf, Wouter Miltenburg Supervisors: Oscar Koeroo
ReportPresentation Evaluation of the security of a high class UAV telemetry communication link
Author: Yonne de Bruijn, James Gratchoff Supervisors: Martijn Sprengers

2013-2014

Research Project 2

ReportPresentation DNSsec Revisited
Author: Anastasios Poulidis, Hoda Rohani Supervisors: Jeroen Scheerder
ReportPresentation Controlled DDoS Security Testing
Author: Mike Berkelaar Supervisors: Pieter Westein
ReportPresentation Search optimization through JPEG quantization tables using a decision tree learning approach
Author: Sharon Gieske Supervisors: Marcel Worring, Zeno Geradts
ReportPresentation Anomaly Detection on Internet Content Filter Data
Author: Peter van Bolhuis Supervisors: Sjoerd Peerlkamp, Johannes Ijkel
ReportPresentation Implementing Security Control Loops in Security Autonomous Response Networks
Author: Hristo Dimitrov Supervisors: Marc Makkes, Robert Meijer
ReportPresentation Measuring the deployment of DNSSEC over the Internet
Author: Nicolas Canceill Supervisors: Benno Overeinder, Willem Toorop
ReportPresentation Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests
Author: Sebastiaan Vlaszaty Supervisors: Casper Joost Eyckelhof
ReportPresentation Using EVPN to minimize ARP traffic in an IXP environment
Author: Stefan Plug, Lutz Engels Supervisors: Kay Rechtien, Thorben Krüger
ReportPresentation Rich Identity Provisioning
Author: Jos van Dijk Supervisors: Michiel Leenaars
ReportPresentation Implementing proximity based device-to-device communication in commercial LTE networks in The Netherlands
Author: Remco van Vugt Supervisors: Bastiaan Wissingh
ReportPresentation Android patching from an MDM perspective
Author: Cedric Van Bockhaven Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek
ReportPresentation Open Data analysis to retrieve sensitive information regarding national-centric critical infrastructures
Author: Renato Fontana Supervisors: Benno Overeinder, Ralph Dolmans
ReportPresentation Timestomping NTFS
Author: Wicher Minnaard Supervisors: Kevin Jonkers, Marco van Loosen
ReportPresentation Securing the last mile of DNS with CGA-TSIG
Author: Marc Buijsman Supervisors: Matthijs Mekking, Jeroen van der Ham
ReportPresentation Detecting routing anomalies with RIPE Atlas
Author: Todor Yakimov Supervisors: Jeroen van der Ham, Barry van Kampen
ReportPresentation Feasibility of attacks against weak SSL/TLS ciphers
Author: Kim van Erkelens Supervisors: Marc Smeets, Jeroen van der Ham
ReportPresentation Information Centric Networking for Delivering Big Data with Persistent Identifiers
Author: Andreas Karakannas Supervisors: Zhiming Zhao
ReportPresentation Combating DNS amplification using cookies
Author: Sean Rijs Supervisors: Roland van Rijswijk-Deij
ReportPresentation Peer-to-Peer Botnet Detection Using Netflow
Author: Connor Dillon Supervisors: Pepijn Janssen
ReportPresentation Covert channel detection using flow data
Author: Guido Pineda Reyes Supervisors: Pepijn Janssen
ReportPresentation Practical Security and Key Management
Author: Magiel van der Meer Supervisors: Jeroen van der Ham, Marc Smeets
ReportPresentation Software Defined VPNs
Author: George Thessalonikefs, Stavros Konstantaras Supervisors: Rudolf Strijkers
ReportPresentation Bootable Linux CD / PXE for the remote acquisition of multiple computers
Author: Dennis Cortjens Supervisors: Zeno Geradts, Ruud Schramp
ReportPresentation Remote data acquisition on block devices in large environments
Author: Eric van den Haak Supervisors: Zeno Geradts, Ruud Schramp
ReportPresentation Beacon detection in PCAP files
Author: Leendert van Duijn Supervisors: Robert Jan Mora
ReportPresentation Cross-realm Kerberos implementations
Author: Mick Pouw, Esan Wit Supervisors: Michiel Leenaars

Research Project 1

ReportPresentation Mice and Elephants
Author: Ioannis Giannoulatos Supervisor: Ronald van der Pol
ReportPresentation Evaluating the Network Performance of ExoGENI Cloud Computing System
Authors: Andreas Karakannas, Tasos Poulidis Supervisors: Paola Grosso, Ralph Koning
ReportPresentation A closer look at SQRL
Author: Jos van Dijk Supervisors: Henri Hambartsumyan, Hugo Ideler
ReportPresentation Calculating Total System Availability
Authors: Azad Kamaliroosta, Hoda Rohani Supervisor: Betty Gommans
ReportPresentation Information loss to public networks
Authors: Peter van Bolhuis, Jan-Willem Selij Supervisor: Steven Raspe
ReportPresentation Secure Sockets Layer Health Assessment
Authors: Eric van den Haak, Mick Pouw Supervisors: Thijs Kinkhorst, Teun Nijssen
ReportPresentation DDOS protection measures for Electronic Payment Systems
Authors: Joris Claassen, Sean Rijs Supervisor: Stefan Dusée
ReportPresentation Cryptanalysis of, and practical attacks against E-Safenet encryption
Authors: Cedric Van Bockhaven, Jan Laan Supervisor: Armijn Hemel
ReportPresentation OpenFlow (D)DoS Mitigation
Authors: Mike Berkelaar, Connor Dillon Supervisor: Hidde van der Heide
ReportPresentation Detecting IP Hijacking Through Server Fingerprinting
Authors: Eddie Bijnen, Magiel van der Meer Supervisors: Douwe Schmidt, Sacha van Geffen
ReportPresentation DDoS Detection and Alerting
Authors: Daniel Cabaça Romão, Niels van Dijkhuizen Supervisor: Rogier Spoor
ReportPresentation MySQL record carving
Authors: Leendert van Duijn, Esan Wit Supervisor: Kevin Jonkers
ReportPresentation Data Map
Authors: Sharon Gieske, Thijs Houtenbos Supervisors: Jeroen van der Ham, Barry van Kampen
ReportPresentation Security assessment on a VXLAN-based network
Author: Guido Pineda Reyes Supervisors: Sander Ruiter, Maarthen Kastanja, Maarten Dammers
ReportPresentation Evaluation of the feasible attacks against RFID tags for access control systems
Authors: Hristo Dimitrov, Kim van Erkelens Supervisors: Henri Hambartsumyan, Hugo Ideler
ReportPresentation PIRE ExoGENI – ENVRI Preparation for Big Data Science
Authors: Ioannis Grafis, Stavros Konstantaras Supervisors: Ana Oprescu, Zhiming Zhao
ReportPresentation ElectroMagnetic Fault Injection Characterization
Author: George Thessalonikefs Supervisors: Niek Timmers, Albert Spruyt
ReportPresentation NetFlow Anomaly Detection; finding covert channels on the network
Author: Joey Dreijer Supervisors: Sjoerd Peerlkamp, Johannes Ijkel

2012-2013

Research Project 2

ReportPresentation Architecture of dynamic VPNs in OpenFlow
Author: Michiel Appelman Supervisor: Rudolf Strijkers
ReportPresentation Research cache rebuilding for different browsers
Authors: Iwan Hoogendoorn, Edwin Schaap Supervisors: Zeno Geradts, Ruud van Baar
ReportPresentation OpenFlow network virtualization with FlowVisor
Author: Sebastian Dabkiewicz Supervisor: Ronald van der Pol
ReportPresentation Discovery and Mapping of the Dutch National Critical IP Infrastructure
Authors: Razvan Oprea, Fahimeh Alizadeh Supervisor: Benno Overeinder
ReportPresentation Load balancing in ESB based service platform
Author: Nick Barendregt Supervisor: Yuri Demchenko
ReportPresentation Performance optimisation of webmail
Authors: Periklis Stefopoulos, Katerina Barmpopoulou Supervisor: Michiel Leenaars
ReportPresentation OpenFlow at AMS-IX
Authors: Hanieh Bagheri, Victor Boteanu Supervisor: Martin Pels
ReportPresentation BGP route origin validation
Authors: Javy de Koning, Remy de Boer Supervisors: Jac Kloots, Marijke Kaat
ReportPresentation Reliable Client-Server Connections
Authors: Rene Klomp, Thijs Rozekrans Supervisor: Michiel Leenaars
ReportPresentation Using git to circumvent censorship of access to the Tor network
Authors: Bjorgvin Ragnarsson, Pieter Westein Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek
ReportPresentation OpenFlow Enlightenment; Extending lightpaths through the campus network
Authors: Diederik Vandevenne, Tjebbe Vlieg Supervisors: Marijke Kaat, Ronald van der Pol
ReportPresentation Detection of client-side e-banking fraud using a heuristic model
Authors: Jurgen Kloosterman, Tim Timmermans Supervisor: Steven Raspe
ReportPresentation GNUnet and PSYC integration
Author: Gabor Toth Supervisor: Christian Grothoff
ReportPresentation Gaining insight into network hygiene a visual analytics approach
Author: Tarik El Yassem Supervisor: Martijn van der Heide
ReportPresentation Automated vulnerability scanning and exploitation
Authors: Thijs Houtenbos, Dennis Pellikaan Supervisors: Jop van der Lelie, Bart Roos
ReportPresentation Analysis of DNS amplification attack packets
Author: Pieter Lexis Supervisors: Marcel Worring, Matthijs Mekking
ReportPresentation Data from home routers for forensics purposes
Author: Tobias Fiebig Supervisor: Andreas Schuster
ReportPresentation Metasploit-able honeypots
Author: Wouter Katz Supervisors: Jop van der Lelie, Bart Roos
ReportPresentation Preventing DNS Amplification Attacks using white- and greylisting
Author: Ralph Dolmans Supervisor: Maurits van der Schee

Research Project 1

ReportPresentation Traffic Volume vs. Network Inspection
Authors: Fahimeh Alizadeh, Rawi Ramdhan Supervisor: Jeroen Scheerder
ReportPresentation Linux Open Source Distributed Filesystem
Author: Remco van Vugt Supervisor: Walter de Jong
ReportPresentation FileSender Terabyte Challenge
Authors: Rene Klomp, Edwin Schaap Supervisor: Jan Meijer
ReportPresentation Using random sampling as a way to determine disk complexity
Author: Nicolas Canceill Supervisors: Zeno Geradts, Erwin van Eijk
ReportPresentation Time skew analysis using web cookies
Author: Bjorgvin Ragnarsson Supervisors: Zeno Geradts, Marnix Kaart
ReportPresentation SSH Botnet Member Credential Collection using Connect Back Honeypots
Author: Tobias Fiebig Supervisor: Jaap van Ginkel
ReportPresentation Defending against DNS reflection amplification attacks
Authors: Thijs Rozekrans, Javy de Koning Supervisor: Matthijs Mekking
ReportPresentation Remote relay attack on RFID access control systems using NFC enabled devices
Authors: Pieter Westein, Wouter van Dullink Supervisor: Bart Roos
ReportPresentation Topology discovery
Authors: Dennis Pellikaan, Diederik Vandevenne Supervisor: Freek Dijkstra
ReportPresentation Using wavelengths outside of the Telecom spectrum
Authors: Stefan Plug, Remy de Boer Supervisor: Erik Radius
ReportPresentation GreenSONAR; A multi-domain energy profiling system based on perfSONAR
Authors: Lutz Engels, Todor Yakimov Supervisors: Paola Grosso, Karel van der Veldt, Hao Zhu
ReportPresentation Monitoring GreenClouds; Evaluating the trade-off between Performance and Energy Consumption in DAS-4
Authors: Renato Fontana, Katerina Barmpopoulou Supervisors: Karel van der Veldt, Hao Zhu, Paola Grosso
ReportPresentation Tinfoil attack; A study on the security threats and weaknesses of GSM-based communication in BMW car
Authors: Thijs Houtenbos, Jurgen Kloosterman Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek
ReportPresentation Malware Analysis on Carberp
Authors: Wouter Katz, Ralph Dolmans Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek
ReportPresentation Image-based localization of pictures using Google Streetview images
Authors: Bas Vlaszaty, Tim Timmermans Supervisor: John Schavemaker
ReportPresentation Additional certificate verification methods for TLS client applications
Authors: Gabor Toth, Tjebbe Vlieg Supervisor: Michiel Leenaars

2011-2012

Research Project 2

ReportPresentation Advanced Metering Infrastructure
Author: Vic Ding Supervisor: Jan Amoraal
ReportPresentation Electromagnetic Fault Injection (EMFI) on System-on-a-Chips (SoC) / Smartcards
Author: Sebastian Carlier Supervisor: Niek Timmers
ReportPresentation Secure Internet Banking on Insecure Hosts
Author: Christos Tziortzios Supervisors: Martijn Knuiman, Sander Vos
ReportPresentation Fault injection model for the XMEGA64A3
Author: Albert Spruyt Supervisor: Niek Timmers
ReportPresentation Visualizing attacks on honeypots
Authors: Jop van der Lelie, Rory Breuk Supervisor: Bart Roos
ReportPresentation Green computing in IEEE 802.3az enabled clusters
Authors: Joris Soeurt, Dimitar Pavlov Supervisors: Zhiming Zhao, Paola Grosso
ReportPresentation Discovering Path MTU black holes using RIPE Atlas
Authors: Maikel de Boer, Jeffrey Bosma Supervisor: Benno Overeinder
ReportPresentation OpenDNSSEC
Author: Aleksandar Kasabov Supervisor: Yuri Schaeffer
ReportPresentation Torrent monitoring and statistics
Author: Hidde van der Heide Supervisor: Jeroen van der Ham
ReportPresentation Social media crawling
Authors: Yannick Scheelen, Daan Wagenaar Supervisor: Marc Smeets
ReportPresentation Multipath TCP
Author: Gerrie Veerman Supervisor: Ronald van der Pol
ReportPresentation Time Sensitive Application Transport
Author: Mohammad Shafahi Supervisors: Cees de Laat, Erik-Jan Bos
ReportPresentation Content Delivery Network Interconnection
Author: Bastiaan Wissingh Supervisor: Ray van Brandenburg

Research Project 1

ReportPresentation OpenFlow
Authors: Iwan Hoogendoorn, Joris Soeurt Supervisor: Ronald van der Pol
ReportPresentation Performance Analysis of OpenFlow Hardware
Authors: Michiel Appelman, Maikel de Boer Supervisor: Ronald van der Pol
Report presentation unavailable IPv6 risks and vulnerabilities
Author: Fred Wieringa Supervisors: unavailable
ReportPresentation Bootstrapping the Internet of the Future
Author: Mohammad Shafahi Supervisor: Rudolf Strijkers
ReportPresentation l/O Load Scheduler for Grid Mass Storage
Author: Christos Tziortzios Supervisor: Walter de Jong
ReportPresentation DNS-Based Authentication of Named Entries (DANE)
Author: Pieter Lexis Supervisor: Bert Hubert
ReportPresentation Automatic end-host configuration
Author: Sebastian Dabkiewicz Supervisor: Jeroen van der Ham
ReportPresentation Traffic anomaly detection using a distributed measurement network
Authors: Razvan Oprea Supervisor: Emile Aben
ReportPresentation Camera Identification on YouTube
Authors: Yannick Scheelen, Jop van der Lelie Supervisors: Marcel Worring, Zeno Geradts
ReportPresentation Ranking of manipulated images in a large set using error level analysis
Authors: Jeffrey Bosma, Daan Wagenaar Supervisor: Marcel Worring
ReportPresentation Integrating DMA attacks in exploitation frameworks
Authors: Rory Breuk, Albert Spruyt Supervisor: Marc Smeets
ReportPresentation Distributed Password Cracking Platform
Authors: Dimitar Pavlov, Gerrie Veerman Supervisor: Marc Smeets
ReportPresentation Securing an outsourced network: Detecting and preventing malware infections
Authors: Dennis Cortjens, Tarik El Yassem Supervisor: Ewout Meij

2010-2011

Research Project 2

ReportPresentation Measuring DNSSEC Validation
Author: Niels Monen Supervisor: Roland van Rijswijk
ReportPresentation Security of IPv6 and DNSSEC for penetration testers
Author: Vesselin Hadjitodorov Supervisor: Jaap van Ginkel
ReportPresentation Passive LAN information gathering
Author: Roy Duisters Supervisor: Marc Smeets
ReportPresentation PersLink Security
Authors: Eleonora Petridou, Pascal Cuylaerts Supervisors: Jo Lahaye, Martijn Stegeman
ReportPresentation Exploiting Jailbrakes
Author: Jochem van Kerkwijk Supervisors: Gijs Hollestelle, Derk Wieringa
ReportPresentation BufferBloat detection
Authors: Harald Kleppe, Danny Groenewegen Supervisor: Michiel Leenaars
ReportPresentation CurveCP protocol efficiency
Author: Thorben Krüger Supervisor: Jeroen Scheerder
ReportPresentation Comparing TCP connection performance over VPN-tunnels vs non-tunneled traffic
Authors: Berry Hoekstra, Damir Musulin Supervisor: Jan Just Keijser
ReportPresentation A mapping daemon for the Locator/ID Separation Protocol (LISP)
Author: Marek Kuczynski Supervisors: Job Snijders, Rager Ossel

Research Project 1

ReportPresentation Power measuremeents in DAS
Author: Vesselin Hadjitodorov Supervisors: Ralph Koning, Paola Grosso
ReportPresentation Desktop Virtualisatie
Author: Sudesh Jethoe Supervisors: unavailable
ReportPresentation Synergy of social networks defeat online privacy
Authors: Eleonora Petridou, Marek Kuczynski Supervisor: Marc Smeets
ReportPresentation Large scale GPU based password cracking
Authors: Jochem van Kerkwijk, Aleksandar Kasabov Supervisor: Marc Smeets
ReportPresentation Emulating network latency on high speed networks
Authors: Niels Monen, Berry Hoekstra Supervisors: Cosmin Dumitru, Ralph Koning
ReportPresentation Quality analysis of automated penetration testing tools
Authors: Harald Kleppe, Alexandre Miguel Ferreira Supervisors: Coen Steenbeek, Derk Wieringa
ReportPresentation Analysis of network measurement data
Authors: Roy Duisters, Damir Musulin Supervisors: Robert Kisteleki, Emile Aben
ReportPresentation Android Market monitoring
Authors: Bastiaan Wissingh, Thorben Krüger Supervisor: Michiel Leenaars
ReportPresentation OpenSSH automatic public key retrieval
Authors: Marc Buijsman, Pascal Cuylaerts Supervisor: Michiel Leenaars
ReportPresentation DNSSEC Certificate validation
Authors: Pieter Lange, Danny Groenewegen Supervisor: Michiel Leenaars
ReportPresentation DNS anomaly detection
Authors: Nick Barendregt, Hidde van der Heide Supervisors: Bart Roos, Sander Peters

2009-2010

Research Project 2

ReportPresentation HTTP session identification
Authors: Marcus Bakker, Kevin de Kok Supervisors: Bart Roos
ReportPresentation Self-adaptive Routing
Authors: Marvin Rambhadjan, Arthur van Kleef Supervisors: Rudolf Strijkers
ReportPresentation DFRWS Forensics Challenge 2010
Authors: Joeri Blokhuis, Axel Puppe Supervisors: Hans Wim Tinholt
ReportPresentation Performance measurement tools
Authors: Jeroen Vanderauwera, Alex Giurgiu Supervisors: Freek Dijkstra
ReportPresentation Evaluation of the Handle System to identify and retrieve digital objects
Authors: Taarik Hassenmahomed Supervisors: Paola Grosso, Andy Maltz
ReportPresentation SURFnet storage Design
Authors: Jeroen Klaver, Roel van der Jagt Supervisors: Rogier Spoor
ReportPresentation On Demand Grid on Cloud
Authors: Willem Toorop, Alain van Hoof Supervisors: Rudolf Strijkers, Paola Grosso
undisclosed Detecting illegal use in TomTom PND's
Authors: Daan Muller, Arthur Schutijser Supervisors: Jaap-Jan Boor, Karl Robinson
undisclosed Secure services on TomTom PND's
Authors: Cosmin Dumitru, Niek Timmers Supervisors: Jaap-Jan Boor
ReportPresentation Mail client IPv6 interoperabillity problems
Authors: Michiel Timmers, Sebastian Carlier Supervisors: Freek Dijkstra

Research Project 1

ReportPresentation Trustworthiness of Cyber Infrastructure for e-Science
Authors: Niels Monen, Berry Hoekstra Supervisors: unavailable
ReportPresentation Horse-ID
Authors: Vic Ding, Laurens Bruinsma Supervisors: Jeroen van Beek
ReportPresentation Bright Cluster Manager inc. Failover Research
Authors: Cosmin Dumitru, Niek Timmers Supervisors: Martijn de Vries
ReportPresentation Security Virtual Infrastructure; Study possible security issues with a virtual infrastructure
Authors: Niels Monen, Berry Hoekstra Supervisors: unavailable
ReportPresentation SSD performance
Authors: Daan Muller, Sebastian Carlier Supervisors: Ronald van der Pol
ReportPresentation Load simulation on [Open]Solaris systems
Authors: Alain van Hoof Supervisors: Jeroen Roodhart
ReportPresentation SURFnet Cloud Computing Design
Authors: Arthur Schutijser, Marvin Rambhadjan Supervisors: Rogier Spoor
ReportPresentation GPU-based password cracking
Authors: Roel van der Jagt, Marcus Bakker Supervisors: Marc Smeets
report unavailable Presentation Automatic Network Configuration in Clouds
Authors: Alex Giurgiu Supervisors: Rudolf Strijkers, Paola Grosso
ReportPresentation Modern Age Burglars
Authors: Kevin de Kok, Jeroen Klaver Supervisors: Christiaan Roselaar
ReportPresentation Des-Plus encryptie on IP over the powernet: HomePlug Security
Authors: Jeroen Vanderauwera, Axel Puppe Supervisors: Christiaan Roselaar

2008-2009

Research Project 2

ReportPresentation Online Banking: Attacks & Defences
Authors: Dominic van den Ende, Tom Hendrickx Supervisors: Jan Joris Vereijken, Kino Verburg
ReportPresentation 802.1ah in NetherLight; an application proposal
Author: Sevickson Kwidama Supervisors: Ronald van der Pol, Mark Meijerink
ReportPresentation Ad-hoc trust associations with Trust Anchor Repositories
Author: Stefan Roelofs Supervisor: Yuri Demchenko
ReportPresentation Implementation difference between DNScurve and DNSsec
Author: Cornel de Jong Supervisor: Fred Mobach
ReportPresentation IPv4 ARP/IPv6 ND Sponge Daemon
Authors: Niels Sijm, Marco Wessel Supervisor: Steven Bakker
ReportPresentation Design and development of a SAN Alarm system
Authors: Adriaan van der Zee, Yanick de Jong Supervisors: Leon Gommans
ReportPresentation The DFRWS 2009 Challenge
Authors: Wouter van Dongen, Alain van Hoof Supervisor: Ruud van Baar
ReportPresentation Car security: remote keyless entry and go systems
Authors: Jarno van de Moosdijk, Dick Visser Supervisors: Hans Ijkel, Stan Hegt, Pieter Ceelen
ReportPresentation IP multicast routing on AMS-IX
Authors: Attilla De Groot, Yuri Schaeffer Supervisors: Ariën Vijn, Martin Pels
ReportPresentation Busting the ghost on the web: real time detection of drive-by-infections
Authors: Thijs Kinkhorst, Michael van Kleij Supervisors: Bart Roos, Sander Peters

Research Project 1

ReportPresentation Verschillende toepassingen voor virtualisatie
Author: Dominic van den Ende Supervisor: Fred Mobach
ReportPresentation Implementing OpenLISP with LISP + ALT
Author: Attilla De Groot Supervisor: Benno Overeinder
ReportPresentation Browser Security
Author: Wouter van Dongen Supervisors: Marc Smeets, Hans Ijkel
ReportPresentation Stream Control Transport Protocol
Author: Taarik Hassenmahomed Supervisor: Ronald van der Pol
ReportPresentation Troubleshooting Grid authentication from the client side
Author: Adriaan van der Zee Supervisors: Jan Just Keijser, David Groep
ReportPresentation Xen Hypervisor security in VM isolation
Author: Yanick de Jong Supervisor: Fred Mobach
ReportPresentation XEN VGA passthrough
Author: Yuri Schaeffer Supervisor: Mendel Mobach
ReportPresentation Using XEN Technology for Green IT
Author: Arthur van Kleef Supervisors: Ralph Koning, Cees de Laat
ReportPresentation Feasibility study Network Access Control (NAC)
Author: Stefan Roelofs Supervisor: Marcel Verbruggen
ReportPresentation Universal Plug and Play Eventing vulnerabilities
Author: Joeri Blokhuis Supervisor: Armijn Hemel
ReportPresentation Top40 cache compared to LRU and LFU
Author: Alain van Hoof Supervisor: Dick Snippe
ReportPresentation Research on OpenID and its integration within the GravityZoo framework
Author: Jarno van de Moosdijk Supervisor: Marcel van Birgelen
ReportPresentation Desktop sharing with SIP
Author: Willem Toorop Supervisor: Michiel Leenaars
ReportPresentation DNSCurve Analysis
Author: Michiel Timmers Supervisor: J. Scheerder
ReportPresentation Cloud Computing
Author: Tom Hendrickx Supervisor: Jan Meijer
ReportPresentation In depth abuse statistics
Authors: Michiel Timmers, Arthur van Kleef Supervisors: Carel van Straten, JP Velders

2007-2008

Research Project 2

ReportPresentation Slimme meters
Authors: Bart Roos, Sander Keemink Supervisors: Hans Ijkel, Jeroen van Beek, Marc Smeets
ReportPresentation Multicast in a PBT enabled CineGrid network
Author: Igor Idziejczak Supervisors: Ralph Koning, Paola Grosso
ReportPresentation High performance TFTP and DHCP for network booting cluster computers
Author: Matthew Steggink Supervisor: Martijn de Vries
ReportPresentation Security en privacy in het Landelijk Schakelpunt
Author: Niels Sijm Supervisor: Guido van 't Noordende
undisclosed Evaluate the safety of Microsoft Office documents
Author: Cornel de Jong Supervisor: undisclosed
undisclosed Cross-country disaster recovery with Geant2
Author: Marco Wessel Supervisor: undisclosed
ReportPresentation Detecting inconsistencies in INRDB data
Author: Peter Ruissen Supervisors: Tiziana Refice, Daniël Karrenberg
ReportPresentation Usability- en efficientieverbeteringen Mailman
Author: Rudy Borgstede Supervisor: Michiel Leenaars
ReportPresentation Streaming and storing CineGrid data: A study on optimization methods
Author: Sevickson Kwidama Supervisors: Ralph Koning, Paola Grosso, Peter Hinrich
ReportPresentation pNFS, high speed parallel open standard file access
Author: Thijs Stuurman Supervisor: Jan Meijer
ReportPresentation Wireless protocol analysis using GNUradio
Author: Alex Verduin Supervisors: Karst Koymans, Maurits van der Schee

Research Project 1

ReportPresentation Haalbaarheidsstudie implementatie IPv6 bij de Nederlandse Publieke Omroep (NPO)
Authors: Bart Roos, Marco Wessel Supervisors: Ed van Vuuren, Dirk-Jan van Helmond
ReportPresentation Online authentication methods; Evaluate the strength of online authentication methods
Author: Cornel de Jong Supervisors: Gijs Hollestelle, Tom Schuurmans
ReportPresentation Security and Reliability of Automated Waste Registration in The Netherlands
Authors: Dick Visser, Thijs Kinkhorst Supervisors: Jeroen van Beek, Marc Smeets, Hans Ijkel
undisclosed Mobile devices security; degree of risk, mobile devices pose to a company's confidential data
Authors: Ralph Laclé, Sevickson Kwidama Supervisor: Cees de Laat
ReportPresentation Detection of peer-to-peer botnets
Authors: Igor Idziejczak, Matthew Steggink Supervisors: Rogier Spoor, Wim Biemolt
ReportPresentation Implementing Snort into SURFids
Authors: Michael van Kleij, Sander Keemink Supervisors: Rogier Spoor, Wim Biemolt
ReportPresentation Security model for hybrid token-based networking models
Author: Rudy Borgstede Supervisor: Yuri Demchenko
ReportPresentation Improving scalability of the AMS-IX network; analyzing load adaptive TE concepts and solutions
Authors: Stefan Deelen, Reinier Schoof Supervisors: Henk Steenman, Paola Grosso
undisclosed HoneyClients; Low interaction detection methods
Authors: Thijs Stuurman, Alex Verduin Supervisors: Rogier Spoor, Wim Biemolt

2006-2007

Research Project 2

reportpresentation Scale-free Optical Networks
Authors: Carol Meertens, Joost Pijnaker Supervisor: Freek Dijkstra, Jeroen van der Ham
reportpresentation Store and Forward Architecture to support CineGrid
Author: Daniël Sánchez Supervisor: Paola Grosso, Jeroen Roodhart
reportpresentation LAN-2 Hybrid
Authors: Gerben van Malenstein, Coen Steenbeek Supervisor: Ronald van der Pol
reportpresentation A Zero Day Warning System
Authors: Michael Rave, Rob Buijs Supervisor: Scott A. McIntyre
reportpresentation Veiligheid van Update Mechanismen
Authors: Peter Ruissen, Robert Vloothuis Supervisor: Jeroen van Beek, Hans IJkel
reportpresentation Beveiliging van Wegwerp OV-rittenkaart
Authosr: Pieter Siekerman, Maurits van der Schee Supervisor: Jaap van Ginkel, Cees de Laat
reportpresentation The PERFSonar Framework
Authors: Peter Tevenier, Tijmen van den Brink Supervisor: Ronald van der Pol, Paola Grosso
reportpresentation Path Computation Element in the SURFnet6 network
Authors: Patrick van Abswoude, Ralph Koning Supervisor: Ronald van der Pol

Research Project 1

reportpresentation Intrusion Detection System Sensors
Authors: Coen Steenbeek, Michael Rave Supervisors: Rogier Spoor, Jan van Lith, Kees Trippervitz
reportpresentation RIPE-NCC
Authors: Daniël Sanchèz, Joost Pijnaker Supervisor: Daniël Karrenberg
reportpresentation CERT Noodnet
Authors: Gerben van Malenstein, Robert Vloothuis Supervisor: Jan Meijer
reportpresentation Xen Guest Migration in a Dynamic Environment
Author: Lotte-Sara Laan Supervisor: Cees de Laat
reportpresentation Xen based High Availability Backup Environment
Author: Marju Jalloh, Peter Ruissen Supervisor: Cees de Laat
reportpresentation SSL HSM en Accelerator Testbank
Author: Maurits van der Schee, Stefan Deelen Supervisor: Jan Meijer
reportpresentation Expansion of the SURFNet IDS
Author: Pieter Siekerman, Rob Buijs Supervisors: Rogier Spoor, Jan van Lith, Kees Trippervitz
reportpresentation Open Recursive Nameservers
Author: Patrick van Abswoude, Peter Tavenier Supervisors: Karst Koymans, JP Velders
reportpresentation Detecting peer-to-peer botnets
Author: Reinier Schoof, Ralph Koning Supervisors: Wim Biemolt, Rogier Spoor
reportpresentation UCLP2 Evaluation
Author: Tijmen van den Brink, Carol Meertens Supervisors: Ronald van der Pol, Paola Grosso

2005-2006

Research Project 2

undisclosed Beveiliging Belastingsdienst: CERT
Author: Gert Bon, Jimmy Macé Supervisor: Norien Kuiper
reportpresentation ``Cut Through Switching/routing'' op een Internet Exchange
Author: René Jorissen, Lourens Bordewijk Supervisor: Henk Steenman
reportpresentation Integration of MPI support in a large-scale grid deployment
Author: Richard de Jong, Matthijs Koot Supervisors: David Groep, Jeff Templon, Louis Poncet
undisclosed Beveiliging Belastingsdienst: Vertrouwd Toegangspad
Author: Steffen van Loon, Fangbin Liu Supervisor: Norien Kuiper
reportpresentation Voice over IP. status en toekomst
Author: Bas Eenink, Antoine Schonewille Supervisor: Rob Denekamp
reportpresentation GMPLS
Author: Rob Prickaerts, Mark Meijerink Supervisors: Ronald van der Pol, Paola Grosso
reportpresentation Benefits and tradeoffs of application-specific WAN acceleration technologies on different latency and loss scenarios
Author: Dirk-Jan van Helmond, Marc Smeets Supervisor: Saverio Pangoli

Research Project 1

reportpresentation Ictivity VoIP Consultancy
Authors: René Jorissen, Rob Prickaerts Supervisor: Ewout van Dijck
reportpresentation Veiligheid c.q. beveiliging van de SURFnet IDS dienst
Authors: Lourens Bordewijk, Jimmy Macé Supervisor: Rogier Spoor
reportpresentation DNS statistieken bruikbaar als spy-, ad-, malware, botnet en virus detector?
Authors: Dirk-Jan van Helmond, Antoine Schonewille Supervisors: Rogier Spoor, Wim Biemolt
undisclosed Virtualisatie en distributie
Authors: Richard de Jong, Bas Eenink Supervisor: Martin Maas
reportpresentation Covert channels
Authors: Matthijs Koot, Marc Smeets Supervisor: Eric Nieuwland
reportpresentation Versleutelalgoritmes voor wachtwoorden
Authors: Steffen van Loon, Gert Bon Supervisor: Jeroen van Beek
reportpresentation SURFnet IDS project honeypot
Authors: Mark Meijerink, Jonel Spellen Supervisor: Rogier Spoor
reportpresentation HPC Parallel File System
Author: Fangbin Liu Supervisors: Huub Stoffers, Ans Sullot

2004-2005

Research Project 2

reportpresentation Bestands- en Schijfencryptie
Authors: Marya Steenman, Thijs van den Berg Supervisor: Xander Jansen
reportpresentation BGP (D)DoS Diversion
Authors: Wouter Borremans, Ruben Valke Supervisor: Jan Hoogenboom
reportpresentation Centralised patch management
Authors: Jelmer Barhorst, Martin Pels Supervisor: Frank Pinxt
reportpresentation Distributed File Systems - Inzetbaar als data consistentie houder?
Authors: Jan van Lith, Maarten Michels Supervisor: Fred Mobach
reportpresentation High Availability Services
Authors: Arjan Dekker, Remco Hobo Supervisor: Jaap van Ginkel
reportpresentation Systeembeheer in het MKB
Author: Jeffrey Barendse Supervisor: Mark van der Zwaag
reportpresentation TCP/IP stack extensies
Authors: Pieter de Boer, Martijn Rijkeboer Supervisor: Jan Meijer
undisclosed Beveiliging banktransacties
Authors: Bart Dorlandt, Carlos Groen Supervisors: Roeland Kluit, Martien Arends
reportpresentation SURFNet Intrusion Detection Systemss
Authors: Kees Trippelvitz, Harm-Jan Blok Supervisor: Rogier Spoor

Research Project 1

undisclosed Onderzoek naar machine virtualisatie technieken
Authors: Martijn Rijkeboer, Jelmer Barhorst Supervisor: Jan Meijer
report Onderzoek naar de problematiek van invoering van IPv6 in een organisatie zoals die van het SNB Lab
Authors: Jan van Lith, Marya Steenman Supervisors: Mendel Mobach, Wim Biemolt
report Voor- en nadelen van Sender Policy Framework
Authors: Thijs van den Berg, Kees Trippelvitz Supervisors: Jeroen Scheerder, Karst Koymans
report MonALISA
Authors: Harm-Jan Blok, Bart Dorlandt Supervisors: Freek Dijkstra, Bas van Oudenaarde
report User Controlled LightPath, UCLP
Authors: Ruben Valke, Remco Hobo Supervisors: Bas van Oudenaarde, Freek Dijkstra
report Loganalyse en IDS
Authors: Carlos Groen, Arjan Dekker Supervisor: Fred Mobach
report Host Based Intrusion Detection Systemen
Authors: Martin Pels, Pieter de Boer Supervisor: Jaap van Ginkel
report Clustering with OpenMosix
Authors: Wouter Borremans, Maarten Michels Supervisor: Harris Sunyoto
report Universele Configuratie Methode
Author: Jeffrey Barendse Supervisor: Marten Hoekstra

2003-2004

Research Project 2

report Real-Time and Quality of Service Facilities for Wireless Networks
Authors: Eric Hos, Niels Visser Supervisor: Jeroen Scheerder
report Performance van een op Web Services gebaseerde AAA service binnen een J2EE application server omgeving
Authors: Aziz Ait Messaoud, Redouan Lahit Supervisors: Yuri Demchenko, Cees de Laat
unavailable Virtual Network Experiments with User Mode Linux
Authors: Jeroen van der Ham, Gert Jan Verhoog Supervisors: Karst Koymans, Jeroen Scheerder
report Traffic Engineering op een Force10
Authors: Marco van Doorn, Roeland Kluit Supervisors: Cees de Laat, Freek Dijkstra
unavailable Het grootschalig inzetten van Zigbee-technologie in een bedrijfsomgeving
Authors: Eelco Driel, Ronald Wezeman Supervisor: Rob Meijer
report Distributed Intrusion Detection Platform
Authors: Jeroen van Beek, Tjerk Nan Supervisor: Jaap van Ginkel
unavailable Beveiliging Portal Interpay (undisclosed)
Authors: Sander Bootsma, Daniël Hilster Supervisors: Ramses Hoek, Jan Mastenbroek, Rob Meijer
unavailable Cyberauthoring, SANE 2004 paper
Author: Arjen Krap Supervisors: Karst Koymans, Jeroen Scheerder
unavailable IPv4 to IPv6 Migration
Authors: Aziz Ahrouch, Samir Ezzine Supervisor: Karst Koymans
report Verbetering convergentietijd klantaansluitingen SURFnet
Authors: Leendert van Doesburg, Andree Toonk Supervisors: Dennis Paus, Jeroen Scheerder
report Multicast Configuration
Author: Thijs Hodiamont Supervisors: Leonard Knijff, Cees de Laat
report Distributed Mail
Authors: Jaap Bouwsma, Robert Visser Supervisor: Jeroen Scheerder
report Disrupting Wireless Networks
Authors: Dennis Marinus, Martijn Meijer Supervisor: Mark Burgess

Research Project 1

report Onderzoek naar een professionele ICT infrastructuur
Authors: Leendert van Doesburg, Andree Toonk Supervisor: Jeroen Scheerder
unavailable Setting up a Virtual Network Laboratory with User-Mode Linux
Author: Arjen Krap Supervisor: Karst Koymans
report G5 Performance Report
Authors: Daniël Hilster, Niels Visser Supervisors: Freek Dijkstra, Cees de Laat
unavailable Single sign-on
Authors: Martijn Meijer, Jaap Bouwsma Supervisor: Jeroen Scheerder
unavailable Linux/PPC Netbooting Analyzed
Authors: Jeroen van der Ham, Thijs Hodiamond Supervisor: Jeroen Scheerder
report Licenties onder de loep
Authors: Marco van Doorn, Roeland Kuit Supervisor: Rob Meijer
unavailable Een overzicht van de gangbare methoden in de spambestrijding
Authors: Eelco Driel, Ronald Wezeman Supervisor: Rob Meijer
report IPv6 Monitoring Web Services
Authors: Jeroen van Beek, Gert Jan Verhoog Supervisors: Remco Poortinga, Karst Koymans
undisclosed Meten en monitoren bij SURFnet
Authors: Dennis Marinus, Tjerk Nan Supervisors: Dennis Paus, Erik-Jan Bos, Cees de Laat
unavailable Generic Authentication, Authorization and Accounting
Authors: Sander Bootsma, Eric Hos Supervisors: Leon Gommans, Bas van Oudenaarde, Cees de Laat
report Evaluatie van de beveiligingsarchitectuur van Collaboratory.nl
Authors: Aziz Ait Messaoud, Redouan Lahit Supervisors: Yuri Damchenko, Cees de Laat
unavailable Migratie van Sendmail naar Postfix
Authors: Sander Hollaar, Samir Ezzine Supervisors: Jeroen Roodhart, Gert Poletiek, Karst Koymans
unavailable ICT Consultancy
Author: Samir Ezzine Supervisors: Jeroen Roodhart, Karst Koymans
report Zeroconf
Authors: Robert Visser, Aziz Ahrouch Supervisor: Jeroen Scheerder

This topic does not exist yet

You've followed a link to a topic that doesn't exist yet. If permissions allow, you may create it by clicking on “Create this page”.