Below is a list of research projects per academic year.
Each year has two research project periods of one month each, called Research Project 1 and 2.
Research project 2 is the equivalent of the Master's Thesis.
Not all papers or presentations are represented since some are confidential.
See RP site
ReportPresentation | Server agnostic DNS augmentation using eBPF | |
---|---|---|
Author: Tom Carpaij | Supervisors: Willem Toorop, Luuk Hendriks | |
ReportPresentation | Incorporating post-quantum cryptography in a microservice environment | |
Author: Daan Weller, Ronald van der Gaag | Supervisors: Cedric Van Bockhaven, Itan Barmes, Vincent van Mieghem | |
ReportPresentation | Malicious behavior detection based on CyberArk PAS logs through string matching and genetic neural networks | |
Author: Mike Slotboom, Ivar Slotboom | Supervisors: Roel Bierens, Bartosz Czaszynski | |
ReportPresentation | Detecting Botnets Communicating with Command and Control Servers with DNS and NetFlow Data | |
Author: Hoang Huynh, Mathijs Visser | Supervisors: Eddie Bijnen | |
ReportPresentation | Advanced Persistent Threat detection for Industrial Control Systems | |
Author: Dominika Rusek, Steffan Roobol | Supervisors: Derre Hendrik, Deneut Tijl | |
ReportPresentation | Incentivize decentralized WiFi roaming through VPN on home routers | |
Author: | Supervisors: Peter Boers | |
ReportPresentation | Detecting Cobalt Strike beacons in NetFlow data | |
Author: Vincent van der Eijk, Coen Schuijt | Supervisors: Ralph Koning | |
ReportPresentation | Collecting telemetry data using P4 and RDMA | |
Author: Silke Knossen, Rutger Beltman | Supervisors: Joseph Hill, Paola Grosso | |
ReportPresentation | The integration of Ethernet Virtual Private Network in Kubernetes | |
Author: Frank Potter | Supervisors: Attilla de Groot | |
ReportPresentation | End-to-end security in LoRa and NB-IoT sensor networks. | |
Author: Niek van Noort, Jason Kerssens | Supervisors: Cedric Both | |
ReportPresentation | Performance comparison of VPN implementations WireGuard, strongSwan, and OpenVPN in a 1 Gbit/s environment | |
Author: Patrick Spaans, Erik Dekker | Supervisors: Aristide Bouix, Mohammad Al Najar | |
ReportPresentation | Analysis of Bypassing Detection by Microsoft Advanced Threat Analytics | |
Author: Edgar Bohte, Nick Offerman | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | Iris recognition using low resolution photographs from commodity sensors | |
Author: Roy Vermeulen | Supervisors: Zeno Geradts | |
ReportPresentation | Deepfake detection through PRNU and logistic regression analyses | |
Author: Catherine de Weever, Sebastian Wilczek | Supervisors: Zeno Geradts | |
ReportPresentation | Monitoring an EVPN-VxLAN fabric with BGP Monitoring Protocol | |
Author: Giacomo Casoni, Davide Pucci | Supervisors: Vivek Venkatraman, Donald Sharp, Attilla de Groot | |
ReportPresentation | Defragmenting DNS: Determining the optimal maximum UDP response size for DNS | |
Author: Axel Koolhaas, Tjeerd Slokker | Supervisors: Willem Toorop, Roland van Rijswijk-Deij | |
ReportPresentation | Using TURN Servers as Proxies | |
Author: Sean Liao | Supervisors: Cedric van Bockhaven, Jan Freudenreich | |
ReportPresentation | An Evaluation of IPFS as a Distribution Mechanism for RPKI Repository | |
Author: Dadepo Aderemi, Woudt van Steenbergen | Supervisors: Luuk Hendriks | |
ReportPresentation | Securing home Wi-Fi with WPA3 personal | |
Author: Raoul Dijksman, Erik Lamers | Supervisors: Arjan van der Vegt | |
ReportPresentation | Investigative Research of an IP Peering Service for NetherLight | |
Author: Arnold Buntsma, Mar Badias Simó | Supervisors: Gerben van Malenstein, Migiel de Vos, Max Mudde | |
ReportPresentation | Securing the Automatic Dependent Surveillance-Broadcast (ADS-B) protocol against spoofing | |
Author: Tim de Boer | Supervisors: Jan-Joris van Es, Nico de Gelder | |
ReportPresentation | Requirements for extracting ENF data to correctly timestamp a video | |
Author: Thomas Ouddeken, Niels den Otter | Supervisors: Zeno Geradts | |
ReportPresentation | Automated reverse-engineering of CAN messages using OBD-II and correlation coefficients | |
Author: Vincent Kieberl, Bram Blaauwendraad | Supervisors: Sander Ubink, Ruben Koeze | |
ReportPresentation | Securely accessing remote sensors in critical infrastructures. | |
Author: Pavlos Lontorfos | Supervisors: Cedric Both | |
ReportPresentation | Zero Trust Network Security Model in containerized environments | |
---|---|---|
Author: Catherine de Weever, Marios Andreou | Supervisors: Jeroen Scheerder | |
ReportPresentation | The Current State of DNS Resolversand RPKI Protection | |
Author: Erik Dekker, Marius Brouwer | Supervisors: Willem Toorop | |
ReportPresentation | Digital Forensic Investigation of Data Theft on the Google Cloud Platform | |
Author: Frank Wiersma, Tjeerd Slokker | Supervisors: Korstiaan Stam | |
ReportPresentation | APFS Slack Analysis and Detection of Hidden Data | |
Author: Axel Koolhaas, Woudt van Steenbergen | Supervisors: Danny Kielman | |
ReportPresentation | Elastic Named Data Network (NDN) for data centric application in cloud environments | |
Author: Sean Liao | Supervisors: Zhiming Zhao | |
ReportPresentation | Ibis Data Serialization in Apache Spark | |
Author: Dadepo Aderemi, Mathijs Visser | Supervisors: Jason Maassen, Adam Belloum | |
ReportPresentation | Anomaly Detection on Log Files Based on Simplicity Theory | |
Author: Giacomo Casoni, Mar Badias Simó | Supervisors: Giovanni Sileno | |
ReportPresentation | Analyzing and enhancing embedded software technologies on RISC-V64 using the Ghidra framework | |
Author: Patrick Spaans, Joris Jonkers Both | Supervisors: Alexandru Geana, Karolina Mrozek, Dana Geist | |
ReportPresentation | Security Evaluation on Amazon Web Services’ REST API Authentication Protocol Signature Version 4 | |
Author: Hoang Huynh, Jason Kerssens | Supervisors: Alex Stavroulakis, Aristide Bouix | |
ReportPresentation | Generating probable password candidates for the assessment of Dutch domain password hashes | |
Author: Tom Broumels | Supervisors: Pim Campers | |
ReportPresentation | Network Anomaly Detection in Modbus TCP Industrial Control Systems | |
Author: Philipp Mieden, Rutger Beltman | Supervisors: Bartosz Czaszynski | |
ReportPresentation | The influence of the training set size on the performance of the Robust Covariance Estimator as an anomaly detection algorithm on automotive CAN data | |
Author: Silke Knossen, Vincent Kieberl | Supervisors: Colin Schappin | |
ReportPresentation | Cybersecurity in Automotive Networks | |
Author: Arnold Buntsma, Sebastian Wilczek | Supervisors: Colin Schappin | |
ReportPresentation | Tunneling data over a Citrix virtual channel | |
Author: Ward Bakker, Niels den Otter | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | Using Mimikatz’ driver, Mimidrv, to disable Windows Defender in Windows | |
Author: Bram Blaauwendraad, Thomas Ouddeken | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | Detecting Fileless Malicious Behaviour of .NET C2 Agents using ETW | |
Author: Alexander Bode, Niels Warnars | Supervisors: Leandro Velasco, Jeroen Klaver | |
ReportPresentation | Scoring model for IoCs by combining open intelligence feeds to reduce false positives | |
Author: Jelle Ermerins, Niek van Noort | Supervisors: Leandro Velasco, João Carlos De Novais Marques | |
ReportPresentation | Using BGP Flow-Spec for distributed micro-segmentation | |
Author: Davide Pucci | Supervisors: Attilla de Groot | |
ReportPresentation | APFS checkpoint management behaviour in macOS | |
Author: Maarten van der Slik | Supervisors: Zeno Geradts, Ruud Schramp | |
ReportPresentation | Insight in Cyber Safety when Remotely Operating SCADA Systems of Dutch Critical Infrastructure Objects | |
Author: Tina Tami | Supervisors: Cedric Both | |
ReportPresentation | Mobility as a Service(MaaS) and Privacy | |
Author: Alexander Blaauwgeers | Supervisors: Alex Stavroulakis | |
ReportPresentation | Automated end-to-end e-mail component testing | |
---|---|---|
Author: Isaac Klop, Kevin Csuka | Supervisors: Michiel Leenaars | |
ReportPresentation | Availability analysis of SURFwireless | |
Author: Kasper van Brakel | Supervisors: Frans Panken | |
ReportPresentation | Scaling AMS-IX Route Servers | |
Author: David Garay | Supervisors: Stavros Konstantaras | |
ReportPresentation | IoT (D)DoS prevention and corporate responsibility: A model to prevent polluting the internet | |
Author: Swann Scholtes | Supervisors: Alex Stavroulakis | |
ReportPresentation | Pairing attacks on the Bluetooth Low Energy Protocol | |
Author: Vincent Breider, Marko Spithoff | Supervisors: Hidde-Jan Jongsma | |
ReportPresentation | Planning and Scaling a Named Data Network with Persistent Identifier Interoperability | |
Author: Kees de Jong, Anas Younis | Supervisors: Zhiming Zhao | |
ReportPresentation | Bypassing phishing protections with email authentication | |
Author: Adrien Raulot | Supervisors: Alex Stavroulakis, Marat Nigmatullin | |
ReportPresentation | Practical Implications of Graphene-SGX | |
Author: Robin Klusman, Derk Barten | Supervisors: Gijs Hollestelle | |
ReportPresentation | Technical feasibility of Segment Routing Traffic Engineering to steer traffic through VNFs | |
---|---|---|
Author: Ronald van der Gaag, Mike Slotboom | Supervisors: Marijke Kaat, Eyle Brinkhuis | |
ReportPresentation | Network Peering Dashboard for SURFnet | |
Author: David Garay | Supervisors: Jac Kloots, Marijke Kaat | |
ReportPresentation | Investigation of security on Chinese smartwatches | |
Author: Kasper van Brakel, Renee Witsenburg | Supervisors: Alex Stavroulakis | |
ReportPresentation | WhatsApp End-to-End Encryption: Are Our Messages Private? | |
Author: Pavlos Lontorfos, Tom Carpaij | Supervisors: Alex Stavroulakis | |
ReportPresentation | Probabilistic password recognition | |
Author: Tiko Huizinga | Supervisors: Zeno Geradts | |
ReportPresentation | Developing a contained and user emulated malware assessment platform | |
Author: Siebe Hodzelmans, Frank Potter | Supervisors: Vincent van Mieghem, Henri Hambartsumyan | |
ReportPresentation | Security evaluation of glucose monitoring applications for Android smartphones | |
Author: Roy Vermeulen, Edgar Bohte | Supervisors: Ruud Verbij | |
ReportPresentation | A Deep Dive into the Dark Web | |
Author: Coen Schuijt | Supervisors: Stijn van Winsen, Soufiane el Aissaoui | |
ReportPresentation | Client-side Attacks on the LastPass Browser Extension | |
Author: Derk Barten | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | Characterization of a Cortex-M4 based microcontroller using optical fault injection | |
Author: Jasper Hupkens, Dominika Rusek | Supervisors: Niek Timmers | |
ReportPresentation | Invisible Internet Project (I2P) | |
Author: Vincent Breider, Tim de Boer | Supervisors: Henri Hambartsumyan, Vincent van Mieghem, Fons Mijnen | |
ReportPresentation | A Comparative Security Evaluation for IPv4 and Ipv6 Addresses | |
Author: Erik Lamers, Vincent van der Eijk | Supervisors: Tobias Fiebig | |
ReportPresentation | Development of Techniques to Remove Kerberos Credentials from Windows Systems | |
Author: Nick Offerman, Steffan Roobol | Supervisors: Dima van de Wouw | |
ReportPresentation | Security By Default: A Comparative Security Evaluation of Default Configurations | |
---|---|---|
Author: Bernardus Jansen | Supervisors: Tobias Fiebig, Ralph Koning | |
ReportPresentation | Low-level writing to NTFS file systems | |
Author: Rick van Gorp | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | A Blockchain based Data Production Traceability System | |
Author: Sandino Moeniralam | Supervisors: Sjaak Koot | |
ReportPresentation | An analysis of the scale-invariance of graph algorithms: A case study. | |
Author: Tim van Zalingen | Supervisors: Merijn Verstraaten | |
ReportPresentation | Opcode statistics for detecting compiler settings | |
Author: Kenneth van Rijsbergen | Supervisors: Armijn Hemel | |
ReportPresentation | Optimal network design of SURFnet8, using TI-LFA and Segment Routing | |
Author: Péter Prjevara, Fouad Makioui | Supervisors: Marijke Kaat, Wouter Huisman | |
ReportPresentation | DDoS Defense Mechanisms for IXP Infrastructures | |
Author: Lennart van Gijtenbeek, Tim Dijkhuizen | Supervisors: Stavros Konstantaras | |
ReportPresentation | Content-based Classification of Fraudulent Webshops | |
Author: Sjors Haanen, Mick Cox | Supervisors: Marco Davids, Maarten Wullink | |
ReportPresentation | Bypassing Phishing Filters | |
Author: Shahrukh Zaidi | Supervisors: Rick van Galen, Alex Stavroulakis | |
ReportPresentation | Improving Semantic Quality of Topic Models for Forensic Investigations | |
Author: Henri Trenquier | Supervisors: Rob van Nieuwpoort, Carlos Martinez Ortiz | |
ReportPresentation | Using Fault Injection to weaken RSA public key verification | |
Author: Ivo van der Elzen | Supervisors: Ronan Loftus | |
ReportPresentation | Automated analysis of AWS infrastructures | |
Author: Peter Bennink | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | How to Spot the Blue Team | |
Author: Rick Lahaye | Supervisors: Marc Smeets | |
ReportPresentation | Towards predicting network device failures: An analysis of time-series and syslog data | |
Author: Henk van Doorn, Chris Kuipers | Supervisors: Marijke Kaat, Peter Boers | |
ReportPresentation | DoS on a Bitcoin Lightning Network channel. | |
Author: Willem Rens | Supervisors: Oskar van Deventer, Maarten Everts | |
ReportPresentation | Privacy analysis of DNS resolver solutions | |
Author: Jeroen van Heugten | Supervisors: Martin Hoffmann, Ralph Dolmans | |
ReportPresentation | Targeted GPS spoofing | |
Author: Luc Gommans, Bart Hermans | Supervisors: Ralph Moonen | |
ReportPresentation | Verifying email security techniques for Dutch organizations | |
Author: Vincent van Dongen | Supervisors: George Thessalonikefs, Ralph Dolmans | |
ReportPresentation | Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network | |
Author: Dirk Gaastra, Kotaiba Alachkar | Supervisors: Henri Hambartsumyan, Vincent van Mieghem | |
ReportPresentation | Tor: Hidden Service Intelligence Extraction | |
Author: João Carlos De Novais Marques | Supervisors: Rik van Duijn, Leandro Velasco | |
ReportPresentation | Microsoft Office Upload Center Cache Files in Forensic Investigations | |
---|---|---|
Author: Rick van Gorp, Kotaiba Alachkar | Supervisors: Yonne de Bruijn | |
ReportPresentation | Network Functions Virtualization | |
Author: Bernardus Jansen | Supervisors: Marijke Kaat | |
ReportPresentation | Pentest Accountability By Analyzing Network Traffic & Network Traffic Metadata | |
Author: Marko Spithoff, Henk van Doorn | Supervisors: Rick van Galen | |
ReportPresentation | An Analysis of Atomic Swaps on and between Ethereum Blockchains using Smart Contracts | |
Author: Peter Bennink, Lennart van Gijtenbeek | Supervisors: Oskar van Deventer, Maarten Everts | |
ReportPresentation | Virtual infrastructure partitioning and provisioning under nearly real-time constraints | |
Author: Andrey Afanas'yev | Supervisors: Zhiming Zhao, Arie Taal | |
ReportPresentation | Feasibility of Cryptocurrency on Mobile devices | |
Author: Sander Lentink, Anas Younis | Supervisors: Rick van Galen | |
ReportPresentation | Capability analyses of mdtmFTP | |
Author: Kees de Jong | Supervisors: Leon Gommans | |
ReportPresentation | Deanonymisation in Ethereum Using Existing Methods for Bitcoin | |
Author: Tim Dijkhuizen, Robin Klusman | Supervisors: Arno Bakker | |
ReportPresentation | Breaking CAPTCHAs on the Dark Web | |
Author: Dirk Gaastra, Kevin Csuka | Supervisors: Yonne de Bruijn | |
ReportPresentation | Improving Machine Learning based Intrusion and Anomaly Detection on SCADA and DCS using Case Specific Information | |
Author: Péter Prjevara | Supervisors: Dima van de Wouw | |
ReportPresentation | Framework for profiling critical pathrelated algorithms | |
Author: Henri Trenquier | Supervisors: Zhiming Zhao | |
ReportPresentation | Containerized Workflow Scheduling | |
Author: Isaac Klop | Supervisors: Zhiming Zhao | |
ReportPresentation | Categorizing container escape methodologies in multi-tenant environments | |
Author: Rik Janssen | Supervisors: Rick van Galen | |
ReportPresentation | Detection of Browser Fingerprinting by Static JavaScript Code Classification | |
Author: Sjors Haanen, Tim van Zalingen | Supervisors: Aidan Barrington | |
ReportPresentation | Large-scale Netflow Information Management | |
Author: Shahrukh Zaidi, Adrien Raulot | Supervisors: Marijke Kaat, Wim Biemolt | |
ReportPresentation | Plug-and-play Raspberry Pi-based video filtration system: A novel approach to real-time on the wire reversible PII anonymization in video streams using commodity hardware | |
Author: Swann Scholtes, Chris Kuipers | Supervisors: Junaid Chaudhry | |
ReportPresentation | Probabilistic Passphrase Cracking | |
Author: Luc Gommans | Supervisors: Melanie Rieback | |
ReportPresentation | Measuring Performance Overhead of Trans-encrypting HTTP Adaptive Streaming | |
---|---|---|
Author: Abe Wiersma | Supervisors: Oskar van Deventer | |
ReportPresentation | Formal verification of the implementation of the MQTT protocol in IoT devices | |
Author: Kris Mladenov | Supervisors: Rick van Galen | |
ReportPresentation | Automated embedding of dynamic libraries into iOS applications from GNU/Linux | |
Author: Marwin Baumann, Leandro Velasco | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | Security considerations in Docker Swarm networking | |
Author: Marcel Brouwers | Supervisors: Esan Wit | |
ReportPresentation | Calculating the Energy Consumption of a Website | |
Author: Anouk Boukema | Supervisors: Maarten de Waard | |
ReportPresentation | A hybrid system for automatic exchanges of routing information | |
Author: Stamatios Maritsas | Supervisors: Stavros Konstantaras | |
ReportPresentation | Improving the Energy Efficiency of SURFwireless | |
Author: Jeroen van Leur | Supervisors: Frans Panken, Marijke Kaat | |
ReportPresentation | Application aware digital objects access and distribution using Named Data Networking (NDN) | |
Author: Rahaf Mousa | Supervisors: Zhiming Zhao, Lucia D'Acunto, Paul Martin | |
ReportPresentation | Collecting, cataloguing and searching performance information of Cloud resources | |
Author: Olaf Elzinga | Supervisors: Zhiming Zhao, Arie Taal | |
ReportPresentation | Feasibility of ILA as Network Virtualization Overlay in multi-tenant, multi-domain Cloud | |
Author: Tako Marks | Supervisors: Lukasz Makowski, Paola Grosso | |
ReportPresentation | Parallelization of BGP for route server functionality: A protocol and implementation study | |
Author: Jenda Brands, Patrick de Niet | Supervisors: Stavros Konstantaras, Aris Lambrianidis | |
ReportPresentation | eBPF Based Networking | |
Author: Nick de Bruijn | Supervisors: Lukasz Makowski, Paola Grosso | |
ReportPresentation | Session based high bandwidth throughput testin | |
Author: Bram ter Borch | Supervisors: David Groep, Tristan Suerink | |
ReportPresentation | Freenet Darknet Mapping | |
Author: Kees Halvemaan | Supervisors: Yonne de Bruijn, Lennart Haagsma | |
ReportPresentation | Discriminating reflective (D)DoS attack tools at the reflector | |
Author: Fons Mijnen, Max Grim | Supervisors: Lennart Haagsma | |
ReportPresentation | Segment Routing in Container Networks | |
Author: Ben de Graaff | Supervisors: Marijke Kaat | |
ReportPresentation | Unintended metadata leakage at the Dutch Government | |
Author: Auke Zwaan | Supervisors: Alex Stavroulakis, Sukalp Bhople | |
ReportPresentation | Kerberos Credential Thievery (GNU/Linux) | |
Author: Arne Zismer, Ronan Loftus | Supervisors: Cedric van Bockhaven | |
ReportPresentation | Thinking in possibilities for federated log out. | |
---|---|---|
Author: Marcel den Reijer, Fouad Makioui | Supervisors: Thijs Kinkhorst, Joost van Dijk | |
ReportPresentation | Extending the range of NFC capable devices | |
Author: Sandino Moeniralam, Bart Hermans | Supervisors: Jordi van den Breekel, Jarno van de Moosdijk | |
ReportPresentation | Automatic comparison of photo response non uniformity (PRNU) on Youtube | |
Author: Marcel Brouwers, Rahaf Mousa | Supervisors: Zeno Geradts | |
ReportPresentation | Repurposing defensive technologies for offensive Red Team operation | |
Author: Arne Zismer, Kris Mladenov | Supervisors: Ari Davies | |
ReportPresentation | Security and Performance Analysis of Encrypted NoSQL Database | |
Author: Abe Wiersma, Max Grim | Supervisors: Fatih Turkmen | |
ReportPresentation | Android 7 File Based Encryption and the Attacks Against It | |
Author: Marwin Baumann, Ronan Loftus | Supervisors: Rick van Galen | |
ReportPresentation | Advantages of Anomaly Detection Between the Controlling Unit and the Process Devices of an Industrial Control System | |
Author: Rick Lahaye, Anouk Boukema | Supervisors: Coen Steenbeek, Dima van de Wouw | |
ReportPresentation | Hiding in open sight: Dynamic profiles for malware communication | |
Author: João Carlos De Novais Marques, Mick Cox | Supervisors: Cedric van Bockhaven, Ari Davies | |
ReportPresentation | Website fingerprinting attacks against Tor Browser Bundle: a comparison between HTTP/1.1 and HTTP/2 | |
Author: Kees Halvemaan, Tako Marks | Supervisors: David Vaartjes, Jurgen Kloosterman | |
ReportPresentation | Techniques for detecting compromised IoT devices | |
Author: Ivo van der Elzen, Jeroen van Heugten | Supervisors: Rogier Spoor | |
ReportPresentation | Automated Windows lab Deployment | |
Author: Vincent van Dongen, Fons Mijnen | Supervisors: Marc Smeets | |
ReportPresentation | Reliable Library Identification Using VMI Techniques | |
Author: Leandro Velasco, Nick de Bruijn | Supervisors: Ralph Koning, Ben de Graaff | |
ReportPresentation | Browser forensics: adblocker extensions. | |
Author: Willem Rens | Supervisors: Johannes de Vries | |
ReportPresentation | Designing an open source DMARC aggregation tool | |
---|---|---|
Author: Yadvir Singh | Supervisors: Michiel Leenaars | |
ReportPresentation | Design Exploration of Transparency Enhancing Technology for Government | |
Author: Thijs Houtenbos | Supervisors: Guido van 't Noordende | |
ReportPresentation | Adding An Unusual Transport To The Serval Project | |
Author: Alexandros Tsiridis, Joseph Hill | Supervisors: Paul Gardner-Stephen | |
ReportPresentation | Taking a closer look at IRATI | |
Author: Koen Veelenturf | Supervisors: Marijke Kaat, Ralph Koning | |
ReportPresentation | Machine Detectable Network Behavioural Commonalities for Exploits and Malware | |
Author: Alexandros Stavroulakis | Supervisors: Adrianus Warmenhoven | |
ReportPresentation | On the feasibility of converting AMS-IX to an Industrial-Scale Software Defined Internet Exchange Point | |
Author: Siem Hermans, Jeroen Schutrup | Supervisors: Joris Claassen, Arien Vijnn | |
ReportPresentation | Power Efficiency of Hypervisor-based Virtualization versus Container-based Virtualization | |
Author: Jeroen van Kessel | Supervisors: Arie Taal, Paola Grosso | |
ReportPresentation | Analysing the feasibility of portable passive detection of Advanced Persistent Threats | |
Author: Guido Kroon | Supervisors: Marco Davids, Cristian Hesselman | |
ReportPresentation | Namecoin as alternative to the Domain Name System | |
Author: Xander Lammertink | Supervisors: Marco Davids, Cristian Hesselman | |
ReportPresentation | Dynamic access control analysis in WordPress plugins | |
Author: Frank Uijtewaal | Supervisors: Patrick Jagusiak | |
ReportPresentation | TLS Session Key Extraction from Memory on iOS Devices | |
Author: Thomas Curran, Marat Nigmatullin | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | Developing an Ethereum Blockchain Application | |
Author: Nikolaos Triantafyllidis | Supervisors: Oskar van Deventer, Erwin Middelesch | |
ReportPresentation | Extremely Sensitive Communication: secure, secret, and private e-mail | |
Author: Loek Sangers | Supervisors: Ruud Verbij | |
ReportPresentation | Partition under disruption improves computer network delivery | |
Author: Lukasz Makowski | Supervisors: Marc Makkes | |
ReportPresentation | Restoring TCP sessions with a DHT | |
Author: Peter Boers | Supervisors: Attilla de Groot, Pete Lumbis, Rama Darbha | |
ReportPresentation | Bypassing 802.1X in an IPv6 configured network | |
Author: Ruben de Vries, Robert Diepeveen | Supervisors: Henri Hambartsumyan, Arris Huijgen | |
ReportPresentation | SDIO as a new peripheral attack vector | |
Author: Thom Does, Dana Geist | Supervisors: Cedric Van Bockhaven | |
ReportPresentation | The Design of Malware on Modern Hardware: Malware Inside Intel SGX Enclaves | |
Author: Jeroen van Prooijen | Supervisors: Marc X. Makkes, Kaveh Razavi | |
ReportPresentation | Using Sensitive Information on Android 6 Based Smartphones | |
Author: Romke van Dijk | Supervisors: Ruud Verbij | |
ReportPresentation | A systematic approach towards GNSS receiver vulnerability analysis on Remotely Piloted Aircraft Systems | |
Author: Mike Maarse | Supervisors: René Wiegers, Judith van Bruggen | |
ReportPresentation | Modifying existing applications for 100 Gigabit Ethernet | |
Author: Jelte Fennema | Supervisors: Migiel de Vos | |
ReportPresentation | P4 VPN Authentication: Authentication of VPN Traffic on a Network Device with P4 | |
Author: Jeroen Klomp | Supervisors: Ronald van der Pol, Marijke Kaat | |
ReportPresentation | (Aster)-picking through the pieces of short URL services | |
---|---|---|
Author: Peter Boers | Supervisors: Ruud Verbij | |
ReportPresentation | BGP Hijack Alert System | |
Author: Bram ter Borch | Supervisors: Jeroen van der Ham, Gert Vliek | |
ReportPresentation | Exfiltrating Data from Managed Profiles in Android for Work | |
Author: Thomas Curran | Supervisors: Paul van Iterson | |
ReportPresentation | (Aster)-picking through the pieces of short URL services | |
Author: Robert Diepeveen | Supervisors: Ruud Verbij | |
ReportPresentation | Portable RFID Bumping Device | |
Author: Romke van Dijk | Supervisors: Ari Davies | |
ReportPresentation | Subverting Android 6.0 fingerprint authentication | |
Author: Thom Does | Supervisors: Rick van Galen | |
ReportPresentation | Misusing Open Services on the Internet | |
Author: Jelte Fennema | Supervisors: Rick van Galen | |
ReportPresentation | Jailbreak/Root Detection Evasion Study on iOS and Android | |
Author: Dana Geist | Supervisors: Roel Bierens | |
ReportPresentation | Misusing Open Services on the Internet | |
Author: Ben de Graaff | Supervisors: Rick van Galen | |
ReportPresentation | Docker Overlay Network | |
Author: Siem Hermans | Supervisors: Paola Grosso | |
ReportPresentation | Investigating the Potential for SCTP to be used as a VPN Transport Protocol | |
Author: Joseph Hill | Supervisors: Ralph Koning, Junaid Chaudhry | |
ReportPresentation | Recursive InterNetwork Architecture | |
Author: Jeroen Klomp | Supervisors: Marijke Kaat, Ralph Koning | |
ReportPresentation | Recursive InterNetwork Architecture | |
Author: Jeroen van Leur | Supervisors: Marijke Kaat, Ralph Koning | |
ReportPresentation | Subverting Android 6.0 fingerprint authentication | |
Author: Mike Maarse | Supervisors: Rick van Galen | |
ReportPresentation | Performance measurement and tuning of remote acquisition | |
Author: Lukasz Makowski | Supervisors: Ruud Schramp, Zeno Geradts, Erwin van Eijk | |
ReportPresentation | Penetration Testing Auditability | |
Author: Stamatios Maritsas | Supervisors: Christopher Mills | |
ReportPresentation | Docker Overlay Network | |
Author: Patrick de Niet | Supervisors: Paola Grosso | |
ReportPresentation | Jailbreak/Root Detection Evasion Study on iOS and Android | |
Author: Marat Nigmatullin | Supervisors: Roel Bierens | |
ReportPresentation | UsnJrnl Parsing for File System History | |
Author: Jeroen van Prooijen | Supervisors: Kevin Jonkers | |
ReportPresentation | Portable RFID Bumping Device | |
Author: Loek Sangers | Supervisors: Ari Davies | |
ReportPresentation | BGP Hijack Alert System | |
Author: Jeroen Schutrup | Supervisors: Jeroen van der Ham, Gert Vliek | |
ReportPresentation | WIFI espionage using a UAV | |
Author: Yadvir Singh | Supervisors: Rick van Galen | |
ReportPresentation | Comparison of parallel and distributed implementation of the MST algorithm | |
Author: Alexis Sireta | Supervisors: Ana Varbanescu | |
ReportPresentation | Penetration Testing Auditability | |
Author: Alexandros Tsiridis | Supervisors: Christopher Mills | |
ReportPresentation | UsnJrnl Parsing for File System History | |
Author: Frank Uijtewaal | Supervisors: Kevin Jonkers | |
ReportPresentation | Exfiltrating Data from Managed Profiles in Android for Work | |
Author: Ruben de Vries | Supervisors: Paul van Iterson | |
ReportPresentation | Malicious Domain Name Detection System | |
Author: Auke Zwaan | Supervisors: Marco Davids, Cristian Hesselman, Maarten Wullink | |
ReportPresentation | Improving the Performance of an IP-over-P2P Overlay for Nested Cloud Environments | |
---|---|---|
Author: Dragos-Laurentiu Barosan | Supervisors: Renato Figueiredo, Kaveh Razavi, Ana Oprescu | |
ReportPresentation | Crawling the USENET for DMCA | |
Author: Eddie Bijnen | Supervisors: Niels Sijm, Arno Bakker | |
ReportPresentation | Analysis of DNS Resolver Performance Measurements | |
Author: Hamza Boulakhrif | Supervisors: Willem Toorop, Yuri Schaeffer | |
ReportPresentation | Container Network Solutions | |
Author: Joris Claassen | Supervisors: Paola Grosso | |
ReportPresentation | Remote Acquisition Boot environment | |
Author: Dennis Cortjens | Supervisors: Ruud Schramp | |
ReportPresentation | The use of workflow topology observables in a Security Autonomous Response Network | |
Author: Adriaan Dens | Supervisors: Marc Makkes, Robert Meijer | |
ReportPresentation | Graph500 in the public cloud | |
Author: Harm Dermois | Supervisors: Ana Varbanescu | |
ReportPresentation | Network utilization with SDN in on-demand application-specific Networks | |
Author: Ioannis Grafis | Supervisors: Marc Makkes | |
ReportPresentation | PTP Switches Accuracy and Hollow Core Fiber Latency | |
Author: Martin Leucht | Supervisors: Cees de Laat | |
ReportPresentation | Functional breakdown of decentralised social networks | |
Author: Wouter Miltenburg | Supervisors: Michiel Leenaars | |
ReportPresentation | Zero-effort Monitoring | |
Author: Julien Nyczak | Supervisors: Rick van Rein | |
ReportPresentation | PTP Switches Accuracy and Hollow Core Fiber Latency | |
Author: Carlo Rengo | Supervisors: Cees de Laat | |
ReportPresentation | Measuring The Impact of Docker on Network I/O Performance | |
Author: Ardho Rohprimardho | Supervisors: Cees de Laat | |
ReportPresentation | Remote data acquisition of IskraME372 GPRS smart meter | |
Author: Nikolaos Sidiropoulos | Supervisors: Max Hovens, Rick van Galen | |
ReportPresentation | Discovery method for a DNSSEC validating stub resolver | |
Author: Xavier Torrent Gorjón | Supervisors: Willem Toorop | |
ReportPresentation | Automated configuration of BGP on edge routers | |
Author: Tarcan Turgut | Supervisors: Stavros Konstantaras, Benno Overeinder | |
ReportPresentation | Automated configuration of BGP on edge routers | |
Author: Stella Vouteva | Supervisors: Stavros Konstantaras, Benno Overeinder | |
ReportPresentation | HTTP Header Analysis | |
Author: Roland Zegers | Supervisors: Renato Fontana | |
ReportPresentation | Pre-boot RAM acquisition and compression | |
Author: Martijn Bogaard | Supervisors: Ruud Schramp, Zeno Geradts, Erwin van Eijk | |
ReportPresentation | Circumventing Forensic Live-Acquisition Tools On Linux | |
Author: Yonne de Bruijn | Supervisors: Arno Bakker, Jaap van Ginkel | |
ReportPresentation | Extremely Secure Communication | |
Author: Daniel Romão | Supervisors: Martijn Sprengers, Ruud Verbij, Jarno Roos | |
ReportPresentation | Online events registration with minimal privacy violation | |
Author: Niels van Dijkhuizen | Supervisors: Jeroen van der Ham | |
ReportPresentation | Security evaluation of smart-cars' remote control Applications | |
Author: Florian Ecard | Supervisors: Cees de Laat | |
ReportPresentation | Proving the wild jungle jump | |
Author: James Gratchoff | Supervisors: Niek Timmers | |
ReportPresentation | Securing the SDN northbound interface | |
Author: Jan Laan | Supervisors: Haiyun Xu | |
ReportPresentation | CoinShuffle anonymity in the Block chain | |
Author: Jan-Willem Selij | Supervisors: Roberta Piscitelli, Oskar van Deventer | |
ReportPresentation | An Overview on Hiding and Detecting Stego-data in Video Streams | |
Author: Alexandre Ferreira | Supervisors: Zeno Geradts | |
ReportPresentation | StealthWare - Social Engineering Malware | |
Author: Joey Dreijer | Supervisors: Jeroen van Beek | |
ReportPresentation | Security intelligence data mining | ||
---|---|---|---|
Author: Nikolaos Triantafyllidis, Diana Rusu | Supervisors: Henri Hambartsumyan | ||
ReportPresentation | Teleporting virtual machines | ||
Author: Carlo Rengo, Harm Dermois | Supervisors: Oskar van Deventer | ||
ReportPresentation | Fine-grained control of LAMP component versions for Hosting Companies | ||
Author: Xander Lammertink | Supervisors: Michiel Leenaars | ||
ReportPresentation | DANE verification test suite report | ||
Author: Guido Kroon, Hamza Boulakhrif | Supervisors: Michiel Leenaars | ||
ReportPresentation | Monitoring DNSSEC | ||
Author: Martin Leucht, Julien Nyczak | Supervisors: Rick van Rein | ||
ReportPresentation | Protecting against relay attacks forging increased distance reports | ||
Author: Xavier Torrent Gorjón | Supervisors: Martijn Sprengers | ||
ReportPresentation | Feasibility and Deployment of Bad USB | ||
Author: Stella Vouteva | Supervisors: Martijn Sprengers | ||
ReportPresentation | Evaluating the security of the KlikAanKlikUit Internet Control Station 1000 | ||
Author: Roland Zegers | Supervisors: Martijn Sprengers | ||
ReportPresentation | Study on a known-plaintext attack on ZIP encryption | ||
Author: Dragos-Laurentiu Barosan | Supervisors: Armijn Hemel | ||
ReportPresentation | Large-scale drive-by download detection: visit | n. process. analyse. report. | |
Author: Adriaan Dens, Martijn Bogaard | Supervisors: Jop van der Lelie, Wouter Katz | ||
ReportPresentation | Trusted Network Initiative to combat DDos attacks | ||
Author: Jeroen van Kessel, Alexandros Stavroulakis | Supervisors: Marc Gauw | ||
ReportPresentation | Peeling the Google Public DNS Onion | ||
Author: Ardho Rohprimardho, Tarcan Turgut | Supervisors: Roland van Rijswijk - Deij | ||
ReportPresentation | Security automation and optimization using HP-NA | ||
Author: Florian Ecard | Supervisors: Olivier Willm | ||
ReportPresentation | Preventing Common Attacks on Critical Infrastructure | ||
Author: Koen Veelenturf, Wouter Miltenburg | Supervisors: Oscar Koeroo | ||
ReportPresentation | Evaluation of the security of a high class UAV telemetry communication link | ||
Author: Yonne de Bruijn, James Gratchoff | Supervisors: Martijn Sprengers | ||
ReportPresentation | DNSsec Revisited | |
---|---|---|
Author: Anastasios Poulidis, Hoda Rohani | Supervisors: Jeroen Scheerder | |
ReportPresentation | Controlled DDoS Security Testing | |
Author: Mike Berkelaar | Supervisors: Pieter Westein | |
ReportPresentation | Search optimization through JPEG quantization tables using a decision tree learning approach | |
Author: Sharon Gieske | Supervisors: Marcel Worring, Zeno Geradts | |
ReportPresentation | Anomaly Detection on Internet Content Filter Data | |
Author: Peter van Bolhuis | Supervisors: Sjoerd Peerlkamp, Johannes Ijkel | |
ReportPresentation | Implementing Security Control Loops in Security Autonomous Response Networks | |
Author: Hristo Dimitrov | Supervisors: Marc Makkes, Robert Meijer | |
ReportPresentation | Measuring the deployment of DNSSEC over the Internet | |
Author: Nicolas Canceill | Supervisors: Benno Overeinder, Willem Toorop | |
ReportPresentation | Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests | |
Author: Sebastiaan Vlaszaty | Supervisors: Casper Joost Eyckelhof | |
ReportPresentation | Using EVPN to minimize ARP traffic in an IXP environment | |
Author: Stefan Plug, Lutz Engels | Supervisors: Kay Rechtien, Thorben Krüger | |
ReportPresentation | Rich Identity Provisioning | |
Author: Jos van Dijk | Supervisors: Michiel Leenaars | |
ReportPresentation | Implementing proximity based device-to-device communication in commercial LTE networks in The Netherlands | |
Author: Remco van Vugt | Supervisors: Bastiaan Wissingh | |
ReportPresentation | Android patching from an MDM perspective | |
Author: Cedric Van Bockhaven | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
ReportPresentation | Open Data analysis to retrieve sensitive information regarding national-centric critical infrastructures | |
Author: Renato Fontana | Supervisors: Benno Overeinder, Ralph Dolmans | |
ReportPresentation | Timestomping NTFS | |
Author: Wicher Minnaard | Supervisors: Kevin Jonkers, Marco van Loosen | |
ReportPresentation | Securing the last mile of DNS with CGA-TSIG | |
Author: Marc Buijsman | Supervisors: Matthijs Mekking, Jeroen van der Ham | |
ReportPresentation | Detecting routing anomalies with RIPE Atlas | |
Author: Todor Yakimov | Supervisors: Jeroen van der Ham, Barry van Kampen | |
ReportPresentation | Feasibility of attacks against weak SSL/TLS ciphers | |
Author: Kim van Erkelens | Supervisors: Marc Smeets, Jeroen van der Ham | |
ReportPresentation | Information Centric Networking for Delivering Big Data with Persistent Identifiers | |
Author: Andreas Karakannas | Supervisors: Zhiming Zhao | |
ReportPresentation | Combating DNS amplification using cookies | |
Author: Sean Rijs | Supervisors: Roland van Rijswijk-Deij | |
ReportPresentation | Peer-to-Peer Botnet Detection Using Netflow | |
Author: Connor Dillon | Supervisors: Pepijn Janssen | |
ReportPresentation | Covert channel detection using flow data | |
Author: Guido Pineda Reyes | Supervisors: Pepijn Janssen | |
ReportPresentation | Practical Security and Key Management | |
Author: Magiel van der Meer | Supervisors: Jeroen van der Ham, Marc Smeets | |
ReportPresentation | Software Defined VPNs | |
Author: George Thessalonikefs, Stavros Konstantaras | Supervisors: Rudolf Strijkers | |
ReportPresentation | Bootable Linux CD / PXE for the remote acquisition of multiple computers | |
Author: Dennis Cortjens | Supervisors: Zeno Geradts, Ruud Schramp | |
ReportPresentation | Remote data acquisition on block devices in large environments | |
Author: Eric van den Haak | Supervisors: Zeno Geradts, Ruud Schramp | |
ReportPresentation | Beacon detection in PCAP files | |
Author: Leendert van Duijn | Supervisors: Robert Jan Mora | |
ReportPresentation | Cross-realm Kerberos implementations | |
Author: Mick Pouw, Esan Wit | Supervisors: Michiel Leenaars | |
ReportPresentation | Mice and Elephants | |
---|---|---|
Author: Ioannis Giannoulatos | Supervisor: Ronald van der Pol | |
ReportPresentation | Evaluating the Network Performance of ExoGENI Cloud Computing System | |
Authors: Andreas Karakannas, Tasos Poulidis | Supervisors: Paola Grosso, Ralph Koning | |
ReportPresentation | A closer look at SQRL | |
Author: Jos van Dijk | Supervisors: Henri Hambartsumyan, Hugo Ideler | |
ReportPresentation | Calculating Total System Availability | |
Authors: Azad Kamaliroosta, Hoda Rohani | Supervisor: Betty Gommans | |
ReportPresentation | Information loss to public networks | |
Authors: Peter van Bolhuis, Jan-Willem Selij | Supervisor: Steven Raspe | |
ReportPresentation | Secure Sockets Layer Health Assessment | |
Authors: Eric van den Haak, Mick Pouw | Supervisors: Thijs Kinkhorst, Teun Nijssen | |
ReportPresentation | DDOS protection measures for Electronic Payment Systems | |
Authors: Joris Claassen, Sean Rijs | Supervisor: Stefan Dusée | |
ReportPresentation | Cryptanalysis of, and practical attacks against E-Safenet encryption | |
Authors: Cedric Van Bockhaven, Jan Laan | Supervisor: Armijn Hemel | |
ReportPresentation | OpenFlow (D)DoS Mitigation | |
Authors: Mike Berkelaar, Connor Dillon | Supervisor: Hidde van der Heide | |
ReportPresentation | Detecting IP Hijacking Through Server Fingerprinting | |
Authors: Eddie Bijnen, Magiel van der Meer | Supervisors: Douwe Schmidt, Sacha van Geffen | |
ReportPresentation | DDoS Detection and Alerting | |
Authors: Daniel Cabaça Romão, Niels van Dijkhuizen | Supervisor: Rogier Spoor | |
ReportPresentation | MySQL record carving | |
Authors: Leendert van Duijn, Esan Wit | Supervisor: Kevin Jonkers | |
ReportPresentation | Data Map | |
Authors: Sharon Gieske, Thijs Houtenbos | Supervisors: Jeroen van der Ham, Barry van Kampen | |
ReportPresentation | Security assessment on a VXLAN-based network | |
Author: Guido Pineda Reyes | Supervisors: Sander Ruiter, Maarthen Kastanja, Maarten Dammers | |
ReportPresentation | Evaluation of the feasible attacks against RFID tags for access control systems | |
Authors: Hristo Dimitrov, Kim van Erkelens | Supervisors: Henri Hambartsumyan, Hugo Ideler | |
ReportPresentation | PIRE ExoGENI – ENVRI Preparation for Big Data Science | |
Authors: Ioannis Grafis, Stavros Konstantaras | Supervisors: Ana Oprescu, Zhiming Zhao | |
ReportPresentation | ElectroMagnetic Fault Injection Characterization | |
Author: George Thessalonikefs | Supervisors: Niek Timmers, Albert Spruyt | |
ReportPresentation | NetFlow Anomaly Detection; finding covert channels on the network | |
Author: Joey Dreijer | Supervisors: Sjoerd Peerlkamp, Johannes Ijkel | |
ReportPresentation | Architecture of dynamic VPNs in OpenFlow | |
---|---|---|
Author: Michiel Appelman | Supervisor: Rudolf Strijkers | |
ReportPresentation | Research cache rebuilding for different browsers | |
Authors: Iwan Hoogendoorn, Edwin Schaap | Supervisors: Zeno Geradts, Ruud van Baar | |
ReportPresentation | OpenFlow network virtualization with FlowVisor | |
Author: Sebastian Dabkiewicz | Supervisor: Ronald van der Pol | |
ReportPresentation | Discovery and Mapping of the Dutch National Critical IP Infrastructure | |
Authors: Razvan Oprea, Fahimeh Alizadeh | Supervisor: Benno Overeinder | |
ReportPresentation | Load balancing in ESB based service platform | |
Author: Nick Barendregt | Supervisor: Yuri Demchenko | |
ReportPresentation | Performance optimisation of webmail | |
Authors: Periklis Stefopoulos, Katerina Barmpopoulou | Supervisor: Michiel Leenaars | |
ReportPresentation | OpenFlow at AMS-IX | |
Authors: Hanieh Bagheri, Victor Boteanu | Supervisor: Martin Pels | |
ReportPresentation | BGP route origin validation | |
Authors: Javy de Koning, Remy de Boer | Supervisors: Jac Kloots, Marijke Kaat | |
ReportPresentation | Reliable Client-Server Connections | |
Authors: Rene Klomp, Thijs Rozekrans | Supervisor: Michiel Leenaars | |
ReportPresentation | Using git to circumvent censorship of access to the Tor network | |
Authors: Bjorgvin Ragnarsson, Pieter Westein | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
ReportPresentation | OpenFlow Enlightenment; Extending lightpaths through the campus network | |
Authors: Diederik Vandevenne, Tjebbe Vlieg | Supervisors: Marijke Kaat, Ronald van der Pol | |
ReportPresentation | Detection of client-side e-banking fraud using a heuristic model | |
Authors: Jurgen Kloosterman, Tim Timmermans | Supervisor: Steven Raspe | |
ReportPresentation | GNUnet and PSYC integration | |
Author: Gabor Toth | Supervisor: Christian Grothoff | |
ReportPresentation | Gaining insight into network hygiene a visual analytics approach | |
Author: Tarik El Yassem | Supervisor: Martijn van der Heide | |
ReportPresentation | Automated vulnerability scanning and exploitation | |
Authors: Thijs Houtenbos, Dennis Pellikaan | Supervisors: Jop van der Lelie, Bart Roos | |
ReportPresentation | Analysis of DNS amplification attack packets | |
Author: Pieter Lexis | Supervisors: Marcel Worring, Matthijs Mekking | |
ReportPresentation | Data from home routers for forensics purposes | |
Author: Tobias Fiebig | Supervisor: Andreas Schuster | |
ReportPresentation | Metasploit-able honeypots | |
Author: Wouter Katz | Supervisors: Jop van der Lelie, Bart Roos | |
ReportPresentation | Preventing DNS Amplification Attacks using white- and greylisting | |
Author: Ralph Dolmans | Supervisor: Maurits van der Schee | |
ReportPresentation | Traffic Volume vs. Network Inspection | |
---|---|---|
Authors: Fahimeh Alizadeh, Rawi Ramdhan | Supervisor: Jeroen Scheerder | |
ReportPresentation | Linux Open Source Distributed Filesystem | |
Author: Remco van Vugt | Supervisor: Walter de Jong | |
ReportPresentation | FileSender Terabyte Challenge | |
Authors: Rene Klomp, Edwin Schaap | Supervisor: Jan Meijer | |
ReportPresentation | Using random sampling as a way to determine disk complexity | |
Author: Nicolas Canceill | Supervisors: Zeno Geradts, Erwin van Eijk | |
ReportPresentation | Time skew analysis using web cookies | |
Author: Bjorgvin Ragnarsson | Supervisors: Zeno Geradts, Marnix Kaart | |
ReportPresentation | SSH Botnet Member Credential Collection using Connect Back Honeypots | |
Author: Tobias Fiebig | Supervisor: Jaap van Ginkel | |
ReportPresentation | Defending against DNS reflection amplification attacks | |
Authors: Thijs Rozekrans, Javy de Koning | Supervisor: Matthijs Mekking | |
ReportPresentation | Remote relay attack on RFID access control systems using NFC enabled devices | |
Authors: Pieter Westein, Wouter van Dullink | Supervisor: Bart Roos | |
ReportPresentation | Topology discovery | |
Authors: Dennis Pellikaan, Diederik Vandevenne | Supervisor: Freek Dijkstra | |
ReportPresentation | Using wavelengths outside of the Telecom spectrum | |
Authors: Stefan Plug, Remy de Boer | Supervisor: Erik Radius | |
ReportPresentation | GreenSONAR; A multi-domain energy profiling system based on perfSONAR | |
Authors: Lutz Engels, Todor Yakimov | Supervisors: Paola Grosso, Karel van der Veldt, Hao Zhu | |
ReportPresentation | Monitoring GreenClouds; Evaluating the trade-off between Performance and Energy Consumption in DAS-4 | |
Authors: Renato Fontana, Katerina Barmpopoulou | Supervisors: Karel van der Veldt, Hao Zhu, Paola Grosso | |
ReportPresentation | Tinfoil attack; A study on the security threats and weaknesses of GSM-based communication in BMW car | |
Authors: Thijs Houtenbos, Jurgen Kloosterman | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
ReportPresentation | Malware Analysis on Carberp | |
Authors: Wouter Katz, Ralph Dolmans | Supervisors: Henri Hambartsumyan, Martijn Knuiman, Coen Steenbeek | |
ReportPresentation | Image-based localization of pictures using Google Streetview images | |
Authors: Bas Vlaszaty, Tim Timmermans | Supervisor: John Schavemaker | |
ReportPresentation | Additional certificate verification methods for TLS client applications | |
Authors: Gabor Toth, Tjebbe Vlieg | Supervisor: Michiel Leenaars | |
ReportPresentation | Advanced Metering Infrastructure | |
---|---|---|
Author: Vic Ding | Supervisor: Jan Amoraal | |
ReportPresentation | Electromagnetic Fault Injection (EMFI) on System-on-a-Chips (SoC) / Smartcards | |
Author: Sebastian Carlier | Supervisor: Niek Timmers | |
ReportPresentation | Secure Internet Banking on Insecure Hosts | |
Author: Christos Tziortzios | Supervisors: Martijn Knuiman, Sander Vos | |
ReportPresentation | Fault injection model for the XMEGA64A3 | |
Author: Albert Spruyt | Supervisor: Niek Timmers | |
ReportPresentation | Visualizing attacks on honeypots | |
Authors: Jop van der Lelie, Rory Breuk | Supervisor: Bart Roos | |
ReportPresentation | Green computing in IEEE 802.3az enabled clusters | |
Authors: Joris Soeurt, Dimitar Pavlov | Supervisors: Zhiming Zhao, Paola Grosso | |
ReportPresentation | Discovering Path MTU black holes using RIPE Atlas | |
Authors: Maikel de Boer, Jeffrey Bosma | Supervisor: Benno Overeinder | |
ReportPresentation | OpenDNSSEC | |
Author: Aleksandar Kasabov | Supervisor: Yuri Schaeffer | |
ReportPresentation | Torrent monitoring and statistics | |
Author: Hidde van der Heide | Supervisor: Jeroen van der Ham | |
ReportPresentation | Social media crawling | |
Authors: Yannick Scheelen, Daan Wagenaar | Supervisor: Marc Smeets | |
ReportPresentation | Multipath TCP | |
Author: Gerrie Veerman | Supervisor: Ronald van der Pol | |
ReportPresentation | Time Sensitive Application Transport | |
Author: Mohammad Shafahi | Supervisors: Cees de Laat, Erik-Jan Bos | |
ReportPresentation | Content Delivery Network Interconnection | |
Author: Bastiaan Wissingh | Supervisor: Ray van Brandenburg | |
ReportPresentation | OpenFlow | |
---|---|---|
Authors: Iwan Hoogendoorn, Joris Soeurt | Supervisor: Ronald van der Pol | |
ReportPresentation | Performance Analysis of OpenFlow Hardware | |
Authors: Michiel Appelman, Maikel de Boer | Supervisor: Ronald van der Pol | |
Report presentation unavailable | IPv6 risks and vulnerabilities | |
Author: Fred Wieringa | Supervisors: unavailable | |
ReportPresentation | Bootstrapping the Internet of the Future | |
Author: Mohammad Shafahi | Supervisor: Rudolf Strijkers | |
ReportPresentation | l/O Load Scheduler for Grid Mass Storage | |
Author: Christos Tziortzios | Supervisor: Walter de Jong | |
ReportPresentation | DNS-Based Authentication of Named Entries (DANE) | |
Author: Pieter Lexis | Supervisor: Bert Hubert | |
ReportPresentation | Automatic end-host configuration | |
Author: Sebastian Dabkiewicz | Supervisor: Jeroen van der Ham | |
ReportPresentation | Traffic anomaly detection using a distributed measurement network | |
Authors: Razvan Oprea | Supervisor: Emile Aben | |
ReportPresentation | Camera Identification on YouTube | |
Authors: Yannick Scheelen, Jop van der Lelie | Supervisors: Marcel Worring, Zeno Geradts | |
ReportPresentation | Ranking of manipulated images in a large set using error level analysis | |
Authors: Jeffrey Bosma, Daan Wagenaar | Supervisor: Marcel Worring | |
ReportPresentation | Integrating DMA attacks in exploitation frameworks | |
Authors: Rory Breuk, Albert Spruyt | Supervisor: Marc Smeets | |
ReportPresentation | Distributed Password Cracking Platform | |
Authors: Dimitar Pavlov, Gerrie Veerman | Supervisor: Marc Smeets | |
ReportPresentation | Securing an outsourced network: Detecting and preventing malware infections | |
Authors: Dennis Cortjens, Tarik El Yassem | Supervisor: Ewout Meij | |
ReportPresentation | Measuring DNSSEC Validation | |
---|---|---|
Author: Niels Monen | Supervisor: Roland van Rijswijk | |
ReportPresentation | Security of IPv6 and DNSSEC for penetration testers | |
Author: Vesselin Hadjitodorov | Supervisor: Jaap van Ginkel | |
ReportPresentation | Passive LAN information gathering | |
Author: Roy Duisters | Supervisor: Marc Smeets | |
ReportPresentation | PersLink Security | |
Authors: Eleonora Petridou, Pascal Cuylaerts | Supervisors: Jo Lahaye, Martijn Stegeman | |
ReportPresentation | Exploiting Jailbrakes | |
Author: Jochem van Kerkwijk | Supervisors: Gijs Hollestelle, Derk Wieringa | |
ReportPresentation | BufferBloat detection | |
Authors: Harald Kleppe, Danny Groenewegen | Supervisor: Michiel Leenaars | |
ReportPresentation | CurveCP protocol efficiency | |
Author: Thorben Krüger | Supervisor: Jeroen Scheerder | |
ReportPresentation | Comparing TCP connection performance over VPN-tunnels vs non-tunneled traffic | |
Authors: Berry Hoekstra, Damir Musulin | Supervisor: Jan Just Keijser | |
ReportPresentation | A mapping daemon for the Locator/ID Separation Protocol (LISP) | |
Author: Marek Kuczynski | Supervisors: Job Snijders, Rager Ossel | |
ReportPresentation | Power measuremeents in DAS | |
---|---|---|
Author: Vesselin Hadjitodorov | Supervisors: Ralph Koning, Paola Grosso | |
ReportPresentation | Desktop Virtualisatie | |
Author: Sudesh Jethoe | Supervisors: unavailable | |
ReportPresentation | Synergy of social networks defeat online privacy | |
Authors: Eleonora Petridou, Marek Kuczynski | Supervisor: Marc Smeets | |
ReportPresentation | Large scale GPU based password cracking | |
Authors: Jochem van Kerkwijk, Aleksandar Kasabov | Supervisor: Marc Smeets | |
ReportPresentation | Emulating network latency on high speed networks | |
Authors: Niels Monen, Berry Hoekstra | Supervisors: Cosmin Dumitru, Ralph Koning | |
ReportPresentation | Quality analysis of automated penetration testing tools | |
Authors: Harald Kleppe, Alexandre Miguel Ferreira | Supervisors: Coen Steenbeek, Derk Wieringa | |
ReportPresentation | Analysis of network measurement data | |
Authors: Roy Duisters, Damir Musulin | Supervisors: Robert Kisteleki, Emile Aben | |
ReportPresentation | Android Market monitoring | |
Authors: Bastiaan Wissingh, Thorben Krüger | Supervisor: Michiel Leenaars | |
ReportPresentation | OpenSSH automatic public key retrieval | |
Authors: Marc Buijsman, Pascal Cuylaerts | Supervisor: Michiel Leenaars | |
ReportPresentation | DNSSEC Certificate validation | |
Authors: Pieter Lange, Danny Groenewegen | Supervisor: Michiel Leenaars | |
ReportPresentation | DNS anomaly detection | |
Authors: Nick Barendregt, Hidde van der Heide | Supervisors: Bart Roos, Sander Peters | |
ReportPresentation | HTTP session identification | |
---|---|---|
Authors: Marcus Bakker, Kevin de Kok | Supervisors: Bart Roos | |
ReportPresentation | Self-adaptive Routing | |
Authors: Marvin Rambhadjan, Arthur van Kleef | Supervisors: Rudolf Strijkers | |
ReportPresentation | DFRWS Forensics Challenge 2010 | |
Authors: Joeri Blokhuis, Axel Puppe | Supervisors: Hans Wim Tinholt | |
ReportPresentation | Performance measurement tools | |
Authors: Jeroen Vanderauwera, Alex Giurgiu | Supervisors: Freek Dijkstra | |
ReportPresentation | Evaluation of the Handle System to identify and retrieve digital objects | |
Authors: Taarik Hassenmahomed | Supervisors: Paola Grosso, Andy Maltz | |
ReportPresentation | SURFnet storage Design | |
Authors: Jeroen Klaver, Roel van der Jagt | Supervisors: Rogier Spoor | |
ReportPresentation | On Demand Grid on Cloud | |
Authors: Willem Toorop, Alain van Hoof | Supervisors: Rudolf Strijkers, Paola Grosso | |
undisclosed | Detecting illegal use in TomTom PND's | |
Authors: Daan Muller, Arthur Schutijser | Supervisors: Jaap-Jan Boor, Karl Robinson | |
undisclosed | Secure services on TomTom PND's | |
Authors: Cosmin Dumitru, Niek Timmers | Supervisors: Jaap-Jan Boor | |
ReportPresentation | Mail client IPv6 interoperabillity problems | |
Authors: Michiel Timmers, Sebastian Carlier | Supervisors: Freek Dijkstra | |
ReportPresentation | Trustworthiness of Cyber Infrastructure for e-Science | |
---|---|---|
Authors: Niels Monen, Berry Hoekstra | Supervisors: unavailable | |
ReportPresentation | Horse-ID | |
Authors: Vic Ding, Laurens Bruinsma | Supervisors: Jeroen van Beek | |
ReportPresentation | Bright Cluster Manager inc. Failover Research | |
Authors: Cosmin Dumitru, Niek Timmers | Supervisors: Martijn de Vries | |
ReportPresentation | Security Virtual Infrastructure; Study possible security issues with a virtual infrastructure | |
Authors: Niels Monen, Berry Hoekstra | Supervisors: unavailable | |
ReportPresentation | SSD performance | |
Authors: Daan Muller, Sebastian Carlier | Supervisors: Ronald van der Pol | |
ReportPresentation | Load simulation on [Open]Solaris systems | |
Authors: Alain van Hoof | Supervisors: Jeroen Roodhart | |
ReportPresentation | SURFnet Cloud Computing Design | |
Authors: Arthur Schutijser, Marvin Rambhadjan | Supervisors: Rogier Spoor | |
ReportPresentation | GPU-based password cracking | |
Authors: Roel van der Jagt, Marcus Bakker | Supervisors: Marc Smeets | |
report unavailable Presentation | Automatic Network Configuration in Clouds | |
Authors: Alex Giurgiu | Supervisors: Rudolf Strijkers, Paola Grosso | |
ReportPresentation | Modern Age Burglars | |
Authors: Kevin de Kok, Jeroen Klaver | Supervisors: Christiaan Roselaar | |
ReportPresentation | Des-Plus encryptie on IP over the powernet: HomePlug Security | |
Authors: Jeroen Vanderauwera, Axel Puppe | Supervisors: Christiaan Roselaar | |
ReportPresentation | Online Banking: Attacks & Defences | |
---|---|---|
Authors: Dominic van den Ende, Tom Hendrickx | Supervisors: Jan Joris Vereijken, Kino Verburg | |
ReportPresentation | 802.1ah in NetherLight; an application proposal | |
Author: Sevickson Kwidama | Supervisors: Ronald van der Pol, Mark Meijerink | |
ReportPresentation | Ad-hoc trust associations with Trust Anchor Repositories | |
Author: Stefan Roelofs | Supervisor: Yuri Demchenko | |
ReportPresentation | Implementation difference between DNScurve and DNSsec | |
Author: Cornel de Jong | Supervisor: Fred Mobach | |
ReportPresentation | IPv4 ARP/IPv6 ND Sponge Daemon | |
Authors: Niels Sijm, Marco Wessel | Supervisor: Steven Bakker | |
ReportPresentation | Design and development of a SAN Alarm system | |
Authors: Adriaan van der Zee, Yanick de Jong | Supervisors: Leon Gommans | |
ReportPresentation | The DFRWS 2009 Challenge | |
Authors: Wouter van Dongen, Alain van Hoof | Supervisor: Ruud van Baar | |
ReportPresentation | Car security: remote keyless entry and go systems | |
Authors: Jarno van de Moosdijk, Dick Visser | Supervisors: Hans Ijkel, Stan Hegt, Pieter Ceelen | |
ReportPresentation | IP multicast routing on AMS-IX | |
Authors: Attilla De Groot, Yuri Schaeffer | Supervisors: Ariën Vijn, Martin Pels | |
ReportPresentation | Busting the ghost on the web: real time detection of drive-by-infections | |
Authors: Thijs Kinkhorst, Michael van Kleij | Supervisors: Bart Roos, Sander Peters | |
ReportPresentation | Verschillende toepassingen voor virtualisatie | |
---|---|---|
Author: Dominic van den Ende | Supervisor: Fred Mobach | |
ReportPresentation | Implementing OpenLISP with LISP + ALT | |
Author: Attilla De Groot | Supervisor: Benno Overeinder | |
ReportPresentation | Browser Security | |
Author: Wouter van Dongen | Supervisors: Marc Smeets, Hans Ijkel | |
ReportPresentation | Stream Control Transport Protocol | |
Author: Taarik Hassenmahomed | Supervisor: Ronald van der Pol | |
ReportPresentation | Troubleshooting Grid authentication from the client side | |
Author: Adriaan van der Zee | Supervisors: Jan Just Keijser, David Groep | |
ReportPresentation | Xen Hypervisor security in VM isolation | |
Author: Yanick de Jong | Supervisor: Fred Mobach | |
ReportPresentation | XEN VGA passthrough | |
Author: Yuri Schaeffer | Supervisor: Mendel Mobach | |
ReportPresentation | Using XEN Technology for Green IT | |
Author: Arthur van Kleef | Supervisors: Ralph Koning, Cees de Laat | |
ReportPresentation | Feasibility study Network Access Control (NAC) | |
Author: Stefan Roelofs | Supervisor: Marcel Verbruggen | |
ReportPresentation | Universal Plug and Play Eventing vulnerabilities | |
Author: Joeri Blokhuis | Supervisor: Armijn Hemel | |
ReportPresentation | Top40 cache compared to LRU and LFU | |
Author: Alain van Hoof | Supervisor: Dick Snippe | |
ReportPresentation | Research on OpenID and its integration within the GravityZoo framework | |
Author: Jarno van de Moosdijk | Supervisor: Marcel van Birgelen | |
ReportPresentation | Desktop sharing with SIP | |
Author: Willem Toorop | Supervisor: Michiel Leenaars | |
ReportPresentation | DNSCurve Analysis | |
Author: Michiel Timmers | Supervisor: J. Scheerder | |
ReportPresentation | Cloud Computing | |
Author: Tom Hendrickx | Supervisor: Jan Meijer | |
ReportPresentation | In depth abuse statistics | |
Authors: Michiel Timmers, Arthur van Kleef | Supervisors: Carel van Straten, JP Velders | |
ReportPresentation | Slimme meters | |
---|---|---|
Authors: Bart Roos, Sander Keemink | Supervisors: Hans Ijkel, Jeroen van Beek, Marc Smeets | |
ReportPresentation | Multicast in a PBT enabled CineGrid network | |
Author: Igor Idziejczak | Supervisors: Ralph Koning, Paola Grosso | |
ReportPresentation | High performance TFTP and DHCP for network booting cluster computers | |
Author: Matthew Steggink | Supervisor: Martijn de Vries | |
ReportPresentation | Security en privacy in het Landelijk Schakelpunt | |
Author: Niels Sijm | Supervisor: Guido van 't Noordende | |
undisclosed | Evaluate the safety of Microsoft Office documents | |
Author: Cornel de Jong | Supervisor: undisclosed | |
undisclosed | Cross-country disaster recovery with Geant2 | |
Author: Marco Wessel | Supervisor: undisclosed | |
ReportPresentation | Detecting inconsistencies in INRDB data | |
Author: Peter Ruissen | Supervisors: Tiziana Refice, Daniël Karrenberg | |
ReportPresentation | Usability- en efficientieverbeteringen Mailman | |
Author: Rudy Borgstede | Supervisor: Michiel Leenaars | |
ReportPresentation | Streaming and storing CineGrid data: A study on optimization methods | |
Author: Sevickson Kwidama | Supervisors: Ralph Koning, Paola Grosso, Peter Hinrich | |
ReportPresentation | pNFS, high speed parallel open standard file access | |
Author: Thijs Stuurman | Supervisor: Jan Meijer | |
ReportPresentation | Wireless protocol analysis using GNUradio | |
Author: Alex Verduin | Supervisors: Karst Koymans, Maurits van der Schee |
ReportPresentation | Haalbaarheidsstudie implementatie IPv6 bij de Nederlandse Publieke Omroep (NPO) | |
---|---|---|
Authors: Bart Roos, Marco Wessel | Supervisors: Ed van Vuuren, Dirk-Jan van Helmond | |
ReportPresentation | Online authentication methods; Evaluate the strength of online authentication methods | |
Author: Cornel de Jong | Supervisors: Gijs Hollestelle, Tom Schuurmans | |
ReportPresentation | Security and Reliability of Automated Waste Registration in The Netherlands | |
Authors: Dick Visser, Thijs Kinkhorst | Supervisors: Jeroen van Beek, Marc Smeets, Hans Ijkel | |
undisclosed | Mobile devices security; degree of risk, mobile devices pose to a company's confidential data | |
Authors: Ralph Laclé, Sevickson Kwidama | Supervisor: Cees de Laat | |
ReportPresentation | Detection of peer-to-peer botnets | |
Authors: Igor Idziejczak, Matthew Steggink | Supervisors: Rogier Spoor, Wim Biemolt | |
ReportPresentation | Implementing Snort into SURFids | |
Authors: Michael van Kleij, Sander Keemink | Supervisors: Rogier Spoor, Wim Biemolt | |
ReportPresentation | Security model for hybrid token-based networking models | |
Author: Rudy Borgstede | Supervisor: Yuri Demchenko | |
ReportPresentation | Improving scalability of the AMS-IX network; analyzing load adaptive TE concepts and solutions | |
Authors: Stefan Deelen, Reinier Schoof | Supervisors: Henk Steenman, Paola Grosso | |
undisclosed | HoneyClients; Low interaction detection methods | |
Authors: Thijs Stuurman, Alex Verduin | Supervisors: Rogier Spoor, Wim Biemolt | |
reportpresentation | Scale-free Optical Networks | |
---|---|---|
Authors: Carol Meertens, Joost Pijnaker | Supervisor: Freek Dijkstra, Jeroen van der Ham | |
reportpresentation | Store and Forward Architecture to support CineGrid | |
Author: Daniël Sánchez | Supervisor: Paola Grosso, Jeroen Roodhart | |
reportpresentation | LAN-2 Hybrid | |
Authors: Gerben van Malenstein, Coen Steenbeek | Supervisor: Ronald van der Pol | |
reportpresentation | A Zero Day Warning System | |
Authors: Michael Rave, Rob Buijs | Supervisor: Scott A. McIntyre | |
reportpresentation | Veiligheid van Update Mechanismen | |
Authors: Peter Ruissen, Robert Vloothuis | Supervisor: Jeroen van Beek, Hans IJkel | |
reportpresentation | Beveiliging van Wegwerp OV-rittenkaart | |
Authosr: Pieter Siekerman, Maurits van der Schee | Supervisor: Jaap van Ginkel, Cees de Laat | |
reportpresentation | The PERFSonar Framework | |
Authors: Peter Tevenier, Tijmen van den Brink | Supervisor: Ronald van der Pol, Paola Grosso | |
reportpresentation | Path Computation Element in the SURFnet6 network | |
Authors: Patrick van Abswoude, Ralph Koning | Supervisor: Ronald van der Pol | |
reportpresentation | Intrusion Detection System Sensors | |
---|---|---|
Authors: Coen Steenbeek, Michael Rave | Supervisors: Rogier Spoor, Jan van Lith, Kees Trippervitz | |
reportpresentation | RIPE-NCC | |
Authors: Daniël Sanchèz, Joost Pijnaker | Supervisor: Daniël Karrenberg | |
reportpresentation | CERT Noodnet | |
Authors: Gerben van Malenstein, Robert Vloothuis | Supervisor: Jan Meijer | |
reportpresentation | Xen Guest Migration in a Dynamic Environment | |
Author: Lotte-Sara Laan | Supervisor: Cees de Laat | |
reportpresentation | Xen based High Availability Backup Environment | |
Author: Marju Jalloh, Peter Ruissen | Supervisor: Cees de Laat | |
reportpresentation | SSL HSM en Accelerator Testbank | |
Author: Maurits van der Schee, Stefan Deelen | Supervisor: Jan Meijer | |
reportpresentation | Expansion of the SURFNet IDS | |
Author: Pieter Siekerman, Rob Buijs | Supervisors: Rogier Spoor, Jan van Lith, Kees Trippervitz | |
reportpresentation | Open Recursive Nameservers | |
Author: Patrick van Abswoude, Peter Tavenier | Supervisors: Karst Koymans, JP Velders | |
reportpresentation | Detecting peer-to-peer botnets | |
Author: Reinier Schoof, Ralph Koning | Supervisors: Wim Biemolt, Rogier Spoor | |
reportpresentation | UCLP2 Evaluation | |
Author: Tijmen van den Brink, Carol Meertens | Supervisors: Ronald van der Pol, Paola Grosso | |
undisclosed | Beveiliging Belastingsdienst: CERT | |
---|---|---|
Author: Gert Bon, Jimmy Macé | Supervisor: Norien Kuiper | |
reportpresentation | ``Cut Through Switching/routing'' op een Internet Exchange | |
Author: René Jorissen, Lourens Bordewijk | Supervisor: Henk Steenman | |
reportpresentation | Integration of MPI support in a large-scale grid deployment | |
Author: Richard de Jong, Matthijs Koot | Supervisors: David Groep, Jeff Templon, Louis Poncet | |
undisclosed | Beveiliging Belastingsdienst: Vertrouwd Toegangspad | |
Author: Steffen van Loon, Fangbin Liu | Supervisor: Norien Kuiper | |
reportpresentation | Voice over IP. status en toekomst | |
Author: Bas Eenink, Antoine Schonewille | Supervisor: Rob Denekamp | |
reportpresentation | GMPLS | |
Author: Rob Prickaerts, Mark Meijerink | Supervisors: Ronald van der Pol, Paola Grosso | |
reportpresentation | Benefits and tradeoffs of application-specific WAN acceleration technologies on different latency and loss scenarios | |
Author: Dirk-Jan van Helmond, Marc Smeets | Supervisor: Saverio Pangoli |
reportpresentation | Ictivity VoIP Consultancy | |
---|---|---|
Authors: René Jorissen, Rob Prickaerts | Supervisor: Ewout van Dijck | |
reportpresentation | Veiligheid c.q. beveiliging van de SURFnet IDS dienst | |
Authors: Lourens Bordewijk, Jimmy Macé | Supervisor: Rogier Spoor | |
reportpresentation | DNS statistieken bruikbaar als spy-, ad-, malware, botnet en virus detector? | |
Authors: Dirk-Jan van Helmond, Antoine Schonewille | Supervisors: Rogier Spoor, Wim Biemolt | |
undisclosed | Virtualisatie en distributie | |
Authors: Richard de Jong, Bas Eenink | Supervisor: Martin Maas | |
reportpresentation | Covert channels | |
Authors: Matthijs Koot, Marc Smeets | Supervisor: Eric Nieuwland | |
reportpresentation | Versleutelalgoritmes voor wachtwoorden | |
Authors: Steffen van Loon, Gert Bon | Supervisor: Jeroen van Beek | |
reportpresentation | SURFnet IDS project honeypot | |
Authors: Mark Meijerink, Jonel Spellen | Supervisor: Rogier Spoor | |
reportpresentation | HPC Parallel File System | |
Author: Fangbin Liu | Supervisors: Huub Stoffers, Ans Sullot |
reportpresentation | Bestands- en Schijfencryptie | |
---|---|---|
Authors: Marya Steenman, Thijs van den Berg | Supervisor: Xander Jansen | |
reportpresentation | BGP (D)DoS Diversion | |
Authors: Wouter Borremans, Ruben Valke | Supervisor: Jan Hoogenboom | |
reportpresentation | Centralised patch management | |
Authors: Jelmer Barhorst, Martin Pels | Supervisor: Frank Pinxt | |
reportpresentation | Distributed File Systems - Inzetbaar als data consistentie houder? | |
Authors: Jan van Lith, Maarten Michels | Supervisor: Fred Mobach | |
reportpresentation | High Availability Services | |
Authors: Arjan Dekker, Remco Hobo | Supervisor: Jaap van Ginkel | |
reportpresentation | Systeembeheer in het MKB | |
Author: Jeffrey Barendse | Supervisor: Mark van der Zwaag | |
reportpresentation | TCP/IP stack extensies | |
Authors: Pieter de Boer, Martijn Rijkeboer | Supervisor: Jan Meijer | |
undisclosed | Beveiliging banktransacties | |
Authors: Bart Dorlandt, Carlos Groen | Supervisors: Roeland Kluit, Martien Arends | |
reportpresentation | SURFNet Intrusion Detection Systemss | |
Authors: Kees Trippelvitz, Harm-Jan Blok | Supervisor: Rogier Spoor |
undisclosed | Onderzoek naar machine virtualisatie technieken | |
---|---|---|
Authors: Martijn Rijkeboer, Jelmer Barhorst | Supervisor: Jan Meijer | |
report | Onderzoek naar de problematiek van invoering van IPv6 in een organisatie zoals die van het SNB Lab | |
Authors: Jan van Lith, Marya Steenman | Supervisors: Mendel Mobach, Wim Biemolt | |
report | Voor- en nadelen van Sender Policy Framework | |
Authors: Thijs van den Berg, Kees Trippelvitz | Supervisors: Jeroen Scheerder, Karst Koymans | |
report | MonALISA | |
Authors: Harm-Jan Blok, Bart Dorlandt | Supervisors: Freek Dijkstra, Bas van Oudenaarde | |
report | User Controlled LightPath, UCLP | |
Authors: Ruben Valke, Remco Hobo | Supervisors: Bas van Oudenaarde, Freek Dijkstra | |
report | Loganalyse en IDS | |
Authors: Carlos Groen, Arjan Dekker | Supervisor: Fred Mobach | |
report | Host Based Intrusion Detection Systemen | |
Authors: Martin Pels, Pieter de Boer | Supervisor: Jaap van Ginkel | |
report | Clustering with OpenMosix | |
Authors: Wouter Borremans, Maarten Michels | Supervisor: Harris Sunyoto | |
report | Universele Configuratie Methode | |
Author: Jeffrey Barendse | Supervisor: Marten Hoekstra |
report | Real-Time and Quality of Service Facilities for Wireless Networks | |
---|---|---|
Authors: Eric Hos, Niels Visser | Supervisor: Jeroen Scheerder | |
report | Performance van een op Web Services gebaseerde AAA service binnen een J2EE application server omgeving | |
Authors: Aziz Ait Messaoud, Redouan Lahit | Supervisors: Yuri Demchenko, Cees de Laat | |
unavailable | Virtual Network Experiments with User Mode Linux | |
Authors: Jeroen van der Ham, Gert Jan Verhoog | Supervisors: Karst Koymans, Jeroen Scheerder | |
report | Traffic Engineering op een Force10 | |
Authors: Marco van Doorn, Roeland Kluit | Supervisors: Cees de Laat, Freek Dijkstra | |
unavailable | Het grootschalig inzetten van Zigbee-technologie in een bedrijfsomgeving | |
Authors: Eelco Driel, Ronald Wezeman | Supervisor: Rob Meijer | |
report | Distributed Intrusion Detection Platform | |
Authors: Jeroen van Beek, Tjerk Nan | Supervisor: Jaap van Ginkel | |
unavailable | Beveiliging Portal Interpay (undisclosed) | |
Authors: Sander Bootsma, Daniël Hilster | Supervisors: Ramses Hoek, Jan Mastenbroek, Rob Meijer | |
unavailable | Cyberauthoring, SANE 2004 paper | |
Author: Arjen Krap | Supervisors: Karst Koymans, Jeroen Scheerder | |
unavailable | IPv4 to IPv6 Migration | |
Authors: Aziz Ahrouch, Samir Ezzine | Supervisor: Karst Koymans | |
report | Verbetering convergentietijd klantaansluitingen SURFnet | |
Authors: Leendert van Doesburg, Andree Toonk | Supervisors: Dennis Paus, Jeroen Scheerder | |
report | Multicast Configuration | |
Author: Thijs Hodiamont | Supervisors: Leonard Knijff, Cees de Laat | |
report | Distributed Mail | |
Authors: Jaap Bouwsma, Robert Visser | Supervisor: Jeroen Scheerder | |
report | Disrupting Wireless Networks | |
Authors: Dennis Marinus, Martijn Meijer | Supervisor: Mark Burgess |
report | Onderzoek naar een professionele ICT infrastructuur | |
---|---|---|
Authors: Leendert van Doesburg, Andree Toonk | Supervisor: Jeroen Scheerder | |
unavailable | Setting up a Virtual Network Laboratory with User-Mode Linux | |
Author: Arjen Krap | Supervisor: Karst Koymans | |
report | G5 Performance Report | |
Authors: Daniël Hilster, Niels Visser | Supervisors: Freek Dijkstra, Cees de Laat | |
unavailable | Single sign-on | |
Authors: Martijn Meijer, Jaap Bouwsma | Supervisor: Jeroen Scheerder | |
unavailable | Linux/PPC Netbooting Analyzed | |
Authors: Jeroen van der Ham, Thijs Hodiamond | Supervisor: Jeroen Scheerder | |
report | Licenties onder de loep | |
Authors: Marco van Doorn, Roeland Kuit | Supervisor: Rob Meijer | |
unavailable | Een overzicht van de gangbare methoden in de spambestrijding | |
Authors: Eelco Driel, Ronald Wezeman | Supervisor: Rob Meijer | |
report | IPv6 Monitoring Web Services | |
Authors: Jeroen van Beek, Gert Jan Verhoog | Supervisors: Remco Poortinga, Karst Koymans | |
undisclosed | Meten en monitoren bij SURFnet | |
Authors: Dennis Marinus, Tjerk Nan | Supervisors: Dennis Paus, Erik-Jan Bos, Cees de Laat | |
unavailable | Generic Authentication, Authorization and Accounting | |
Authors: Sander Bootsma, Eric Hos | Supervisors: Leon Gommans, Bas van Oudenaarde, Cees de Laat | |
report | Evaluatie van de beveiligingsarchitectuur van Collaboratory.nl | |
Authors: Aziz Ait Messaoud, Redouan Lahit | Supervisors: Yuri Damchenko, Cees de Laat | |
unavailable | Migratie van Sendmail naar Postfix | |
Authors: Sander Hollaar, Samir Ezzine | Supervisors: Jeroen Roodhart, Gert Poletiek, Karst Koymans | |
unavailable | ICT Consultancy | |
Author: Samir Ezzine | Supervisors: Jeroen Roodhart, Karst Koymans | |
report | Zeroconf | |
Authors: Robert Visser, Aziz Ahrouch | Supervisor: Jeroen Scheerder |