University of Twente Student Theses

Login

Programme: Computer Science MSc (60300)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Number of items: 899.

Essay

A., E. (2014) Item availability restricted.

Aalbertsberg, A.P. (2018) Synthesis and development of a big data architecture for the management of radar measurement data.

Aanstoot, D. (2022) Graph rewriters as components.

Abeywardana, Hasini (2023) Near real-time analysis of tactics techniques and procedures of attacker groups on their relevancy to an Organisation.

Abraham, R. (2021) Symbolic LTL Reactive Synthesis.

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

Ahmed, A.B.H. (2020) Balancing security and usability in Web Single Sign-On.

Ahmed, Owais (2017) Item availability restricted.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Akujobi, Joshua Chukwukamneleanya (2021) A Model For Measuring Improvement Of Security In Continuous Integration pipelines : Metrics and Four-Axis Maturity Driven DevSecOps (MFAM).

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Aljabary, Mahmoud (2021) Automatic Generic Web Information Extraction at Scale.

Allah Bukhsh, Zaharah (2015) BPMN Plus : a modelling language for unstructured business processes.

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Anaigoundanpudur Karthikeyan, Naveenaa (2021) Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems.

Andrei, Vlad-Cristian (2023) The security impact of DNS and TLS on the websites reconnaissance process.

Ansar, M. (2024) Web Crawl Refusals: Insights From Common Crawl.

Antonowycz, A.J. (2024) Computing Electro-Optical and Radar coverage in near real-time.

Arconada Sousa, Luis (2023) Using Decision Tree Classifiers to Support Healthcare Diagnosis.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Arend, M.Q.T.P. van der (2023) The LAMP Framework - A language-agnostic code quality assurance framework for multi-paradigm languages.

Arican, Tugce (2019) Optimization of a patch-based finger vein verification with a convolutional neural network.

Arrieta Larraza, N. (2022) Few-shot deep learning models for acoustic scene classification in low-complexity scenarios.

Arva, Denis (2023) Secure Integration of Third-Party Code in SaaS.

Assen, M.H. van (2023) Integrating the Five Steps of Plotting: A Plotting Tool Design.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Açikalin, M.A. (2019) Profiling Recursive Resolvers at Authoritative Name Servers.

BOON, R.N. (2017) Automatic detection of anomalies in times series data Big data for smart maintenance.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Badin, Y. (2016) Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bakker, D.R. (2022) Autonomous emulation of adversary procedures in the (pre-)compromise domain.

Bakker, Jeffrey (2023) Short-Term Passenger Flow Forecasting in Public Transportation Networks Under Event Conditions.

Bakker, Michiel (2020) Model validation for stochastic hybrid automata.

Bakker, P.J. (2010) Train composition using motion as a common context.

Baligudam, R. (2022) A Systematic Study of Gender and Religion Bias in Stories.

Balk, Roland (2016) SQLento: database programming made easier.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Barbara, Mario Alessandro (2019) Proof of All : Verifiable Computation in a Nutshell.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Been, Henry (2013) Finding you on the Internet : Entity resolution on Twitter accounts and real world people.

Beernink, G.J. (2022) Taking the quantum leap: Preparing DNSSEC for Post Quantum Cryptography.

Beets, Fedor (2018) Privacy-preserving automated rental checking.

Beijnum, A.C.W. van (2023) Haly : Automated evaluation of hardening techniques in Android and iOS apps.

Beld, J.J. van de (2022) Multimodal post-operative complication prediction for elderly patients with hip fractures.

Berg, F.I. van der (2013) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Berg, T.M. van den (2016) Radar sensing for automotive parking distance control applications.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Bergsma, D. (2019) Porting tree-based hash table compression to GPGPU model checking.

Beukema, W.J.B. (2016) Enhancing Network Intrusion Detection through Host Clustering.

Beunder, K.M. (2018) Correlating features of malicious software to increase insight in attribution.

Beune, P.F. (2023) Lightweight Public Key Infrastructure for IoT.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Bhaskar, Rushvanth (2022) A Day in the Life of NTP : Analysis of NTPPool Traffic.

Bhowmick, Anubrata (2021) Markers of Brain Resilience.

Bie, D.R. de (2020) Image Similarity Ranking Applied to the Forensic Domain.

Bijl, M.H. de (2020) Encoder-Forecaster-Decoder: a Modular Deep Learning Framework for Cloudage Forecasting.

Bitew, Semere Kiros (2018) Logical structure extraction of electronic documents using contextual information.

Blankendal, Göran (2012) Building an Xtext compiler for Aspect-Oriented Languages based on ALIA4J.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Bloemen, V. (2015) On-The-Fly parallel decomposition of strongly connected components.

Blok, T. (2019) ZITA : a self learning tutoring assistant.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Boer, S.O. de (2021) Digital Identity : A cyber resilience evaluation of the European digital identity e-commerce requirements.

Boerman, J.G.J. (2023) Formal verification of a sequential SCC algorithm.

Boersma, Kitty (2023) So long and thanks for all the (big) fish : exploring cybercrime in Dutch Telegram groups.

Bogaard, C.H.M van den (2020) Thwarting File-Injection Attacks on Searchable Encryption via Client-side Detection.

Bolhuis, M. (2015) Estimating Creditworthiness using Uncertain Online Data.

Bolten, Marjolein (2024) Monitoring training load and identifying fatigue in young elite speed skaters using machine learning methods.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Boot, J.J.F. (2020) Defending against Access Pattern Attacks on Secure Range Query Schemes.

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Bos, J.P. (2021) Forecasting the controllability of electricity consumersusing sparse multi-granularity time series data.

Bos, P. (2021) Program verification for quantum algorithms.

Bos, Pieter (2006) Interacting with a virtual conductor.

Bos, Wouter F.A. (2024) Generating Piping & Instrumentation Diagrams from Static Fault Trees.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Boschma, R. (2020) Exploring the world of Container Stacking using Approximate Dynamic Programming.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Bosma, H.R. (2022) Audio-visual Correlation from Cross-modal Attention in Self-supervised Transformers on Videos of Musical Performances.

Bottinelli, Sara (2023) A Study of Organization Level E-mail Phishing Awareness.

Bouius, B A.G. (2015) Characterising the Ripple Effects of Introducing Energy-Awareness Functionality in Cyber-Physical-Systems Software in Cyber-Physical System software.

Bouma, G (2021) Web Server Loads under Visitor Surges : A Model-Based Prediction.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Braams, T.L. (2020) Impact of programming environments and practices on energy consumption.

Braber, Kommer (2007) A policy based MBU control system using OSGi.

Braham, K. (2018) Smart cities : crowd management using WiFi based infrastructure.

Brand, A. (2009) An investigation in qualities of software variability.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Brandt, Jacco Hermanus (2022) Effectiveness of Oblivious RAM in cloud storage services.

Brattinga, M. (2023) Protecting against internal attackers with hardware-aided proxy re-encryption.

Braşoveanu, R. (2021) Item availability restricted.

Bree, R.J. van (2021) Data augmentation for regularizing learned world models in reinforcement learning.

Breggeman, Floris Tenzin (2023) An Authentication Service for Domestic Self-Hosting.

Brink, B. van den (2017) Orchestrating Similar Stream Processing Jobs to Merge Equivalent Subjobs.

Brink, K. van den (2022) FLEX : Force Linear to Exponential. Improving time series forecasting models for hydrological level using a scalable ensemble machine learning approach.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Broek, J.D.A. van den (2012) Design and implementation of an analog-to-time-to-digital convertor.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Broekhuis, Djurre (2014) Sousveillance on Intelligent Transportation Systems.

Broekhuis, S. B. (2023) Incorporating User Inputs for Improved JSON Schema Inference.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

Brouwer, R (2020) Learning Timed Mealy Machines of the Physical Processes of an Industrial Control System for Anomaly-based Attack Detection.

Brugman, Tristan (2017) A methodology for deriving aggregate social tie strengths from mobility traces.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Brunsveld, R.D. (2019) Determining the Satisfiability of Car Configuration Models in a Repetitive Manner.

Bui, Nhat (2021) Negomancer : Improvise. Adapt. Overcome. Transform.

Buit, L.J. (2017) Developing an easy-to-use Query language for verification of lighting systems.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Buuren, R.A. ten (2015) Domain-Specific Language Testing Framework.

Carvajal Gallardo, I. R. (2015) Privacy-preserving social DNA-based recommender.

Casano, F. (2019) Identifying how vendors and clients manage red teaming.

Cesar, M. (2021) End-to-end encrypted data in web applications.

Chattopadhyay, A. (2022) Resilience of DNS infrastructure against DDoS attacks.

Chavannes, J.P. (2021) Information extraction for court cases.

Chen, Peizhou (2024) Vulnerability Testing for WebAuthn.

Chen, Qiurui (2019) EEG hyperscanning study of team neurodynamics analysis during cooperative and competitive interaction.

Chinthu Rukmani Kumar, Jayanth (2021) Geometrical Social Networks.

Chivulescu, Dragos-Marian (2021) Balanced, as all things should be: PSD2 and cybersecurity risks.

Christou, G. (2023) On Services Exposed by DNS Infrastructure: A KINDNS Investigation.

Ciobotea, C. (2016) Improving payment authorization rates : by intelligently routing transactions.

Ciresica, V. (2023) Authentication method for Windows OS based on location classification using WiFi signals.

Coenraad, T (2018) Analist: A Tool for Improved Static Type Analysis for Ruby.

Colmenar Lamas, F.M. (2021) Analysis and comparison of Log Shipment solutions at AWS S3 for Windows 10.

Colombo, Riccardo (2020) On the escalation from Cyber Incidents to Cyber Crises.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Coniglio, Luigi (2019) Combining program synthesis and symbolic execution to deobfuscate binary code.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets : A study on regulation enforcement of forums in the online underground trading economy.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Court, M.A. de la (2020) Design of a model-driven platform for IoT event stream processing.

Couwenbergh, W. (2022) Detection of areas of interest in bending strain data for pipelines through 1D object detection.

Crest, Côme du (2018) Scalability & Trustlines Network architecture.

Crichlow, Matthias Caretta (2020) A study on Blue Team’s OPSEC failures.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Dai, L. (2019) Human perception of an adaptive agent's fear simulated based on TDRL Theory of emotions.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Damman, B. (2008) Representing PCTL counterexamples.

Danielecki, Daniel Mariusz (2019) Security first approach in development of Single-Page Application based on Angular.

Davanian, Ali (2017) Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

De Miguel Aramburu, A. (2020) Vulnerability management in organizations.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Dekker, A.P. (2021) Planning Self-Backhauled mmWave Networks with Multi-Connectivity.

Dekker, Bram (2023) Semi-supervised point cloud segmentation on railway data.

Derks, Theo (2006) Health at home.

Diallo, A.O. (2017) Traffic filtering based on subsystem component state.

Diepenmaat, J. (2009) Object XML mappings.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus "Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie".

Dijk, L.J. van (2021) AI as the assistant of the teacher : an adaptive math application for primary schools.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Dijk, P.A.H. van (2018) An efficient simulation of crosslinked RAFT copolymerization.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Dijkslag, M. (2021) Passive query-recovery attack against secure conjunctive keyword search schemes.

Dijkstra, R.S. (2022) How can the eradication phase of incident response for ransomware incidents be improved based on previous ransomware incidents?

Dikkers, E.J.W. (2004) Natural answer presentation through revision of syntactic patterns.

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Dirlik, S. (2013) A comparison of FFT processor designs.

Donckers, L. (2001) Energy Efficient TCP.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Donselaar, V.L. van (2015) Low latency asynchronous database synchronization and data transformation using the replication log.

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Dorenbos, H.M.R. (2021) Moldel : Predicting the 'Mol' in 'Wie is de Mol?' using machine learning and mathematical modelling.

Drechsel, Alexander (2019) Automatic instance-based matching of database schemas of web-harvested product data.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Driessen, Famke (2023) A quantitative assessment method for microservices granularity to improve maintainability.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Drijfhout, Wanno (2015) The Knowledge Cloud: Evolving the data management paradigm.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Duits, Ines (2019) The Post-Quantum Signal Protocol : Secure Chat in a Quantum World.

Dunning, V.A. (2021) Developing a Multi-Party MPC Compiler with Covert Security and Public Verifiability.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Ekambaranathan, Anirudh (2018) Using stylometry to track cybercriminals in darknet forums.

El Assal, Karim M. (2018) Predicting user loyalty in an education support web application based on usage data.

Elsinga, J.W. (2016) On a framework for domain independent heuristics in graph transformation planning.

Emous, Rob J. van (2019) Towards systematic black-box testing for exploitable race conditions in web apps.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Enendu, Somtochukwu (2019) Predicting Semantic Labels of Text Regions in Heterogeneous Document Images.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Engelenhoven, A. van (2023) CAST : Clustering Attention using Surrogate Tokens for Efficient Transformers.

Engers, V.P.G. van (2023) Efficient Deep Learning for Automotive Radar Perception.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Esquivel-Vargas, Herson (2016) Automatic deployment of specification-based intrusion detection in the BACnet Protocol.

Essen, T.M. van (2021) Investigations on Securing Repositories using Difference Analysis and Patch Applications on Encrypted Files.

Evers, Florine (2016) The Content and Tone of the Media Coverage with regard to the Refugee Crisis in Dutch Popular and Quality Newspapers.

Evers, Sander (2004) Form follows function : Editor GUIs in a functional style.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Verification Experiments.

Eyk, Jan-Niclas van (2023) Fighting Phishing at the Website Host.

Facchini, Stefano (2024) Prediction of fuel usage consumption in the airline industry.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Ferronato, Giovanni (2020) IoT White Worms : design and application.

Fleur, S. la (2018) Static Analysis of Symbolic Transition Systems with Goose.

Floor, D. (2024) Code comprehension in the multi-paradigm environment Kotlin.

Florijn, W.J. (2019) Information retrieval by semantically grouping search query data.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Fobbe, Franziska (2023) Look at this, not that! – Improving the alignment of PIP-Net with domain knowledge.

Fokkema, J. (2016) Using a challenge to improve face spoofing detection.

Fontein, R.L.H. (2023) Investigating DNS Information Flow In Corporate Networks.

Fonville, M.E. (2015) The virtual machine delivery network.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Gansel, Antoine (2023) Sub-quadratic Privacy Preserving Cohort Selection.

García-Mauriño Taboada, Migue (2021) IOCMonitor: Automatic extraction of cyber threat intelligence from open source data using NLP and Machine Learning.

Gebremariam, T.H. (2023) Digital Twin and Securing IoT Applications in Industry 4.0.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Geretto, Elia (2018) A QBDI-based Fuzzer Targeting Magic Bytes Comparisons.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Giessen, D. van de (2018) Implementing and Scaling HanzeNet.

Gijsen, Stijn (2015) Runtime Permission Checking in Concurrent Java Programs.

Gilbers, Jander (2022) Automatic Inference of Fault Trees using Reinforcement Learning.

Gnutti, Alessandro (2021) Study on the cyber risk inside a museal entity.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Gougoulis Dimitriadis, E. (2022) Sixthsense : outdoor collision avoidance assistant for the blind and visually impaired.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Greuter, K.O. (2024) A Repository for Testing Compliance to the Internet of Things (IoT) Security Standards.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Groot Roessink, J. (2023) Influence of Biological Cues on Monocular Depth Estimation.

Groot Roessink, R. (2020) Experimental review of the IKK query recovery attack : Assumptions, recovery rate and improvements.

Grooters, T. (2023) Analysis of automated Virtual Machine generation and automation around system testing at TKH Airport Solutions.

Gupta, Amit Kumar (2017) Security risk analysis of automotive ethernet networks.

Gupta, C. (2021) HoneyKube : designing a honeypot using microservices-based architecture.

Gupta, Y. (2021) Aspect Based Sentiment Classification of Multilingual Customer Reviews.

Guru Rao, Sathvik (2022) Ontology Matching using Domain-specific knowledge and Semantic Similarity.

Haalstra, O.N.R. (2020) Browser Anti-Fingerprinting as a pathway to Impersonation and Fraud.

Haan, T. de (2018) BLE Localization using switched-beam angle of arrival for pallet localization in warehouses.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Haasjes, R.E.Y. (2019) Metamodel transformations between UML and OWL.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Harleman, T. (2011) Towards a generic model for audit trails.

Harmes, J.P.M. (2020) A threat model analysis of audio recording on mobile health care applications.

Harten, A. van (2023) The role of WebSDR usage in open source intelligence gathering during geopolitical events.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures : Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Hazekamp, C. (2018) Inferring animal social interaction using proximity based on BLE and LoRa.

He, Wenruo (2022) Augmenting and Graph Scaling for Context-Aware Citation Recommendations.

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Heer, G.W.A. de (2014) Instance Pointcuts.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Heeringa, T.J. (2022) The Effect of Higher Order Activation Functions on Infinitely wide Neural Networks.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Hegeman, Erik (2011) InfoSupport : On the Quality of Quality Models.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Heijblom, A.R. (2016) Using features of models to improve state space exploration.

Heijden, G.A.M. van der (2022) Building a sense inventory for Dutch healthcare abbreviations.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Heikamp, F. (2018) Gray-box Network Fuzzing using Genetic Algorithms and Code Coverage.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Hendriks, C. (2020) Proactively detecting crafted domains using active DNS measurements.

Hendriks, Max (2023) Consider it Parsed!

Hendriks, Remi (2023) Improving anycast census at scale.

Hengst, Kimberly (2020) Best Practices in Cloud Incident Handling.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Herbowo, Keanu Nurherbyanto (2022) Comparing Zero-Knowledge Proof Protocols for Practical Open Source Self-Sovereign Identity Systems.

Hessels, Ruben (2023) A Data Quality Assessment of the Suspicious Transactions.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Heus, Steven de (2020) Designing and Evaluating an Educational Board Game.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Heuver, Rien / P.R. (2020) Generating facial morphs through PCA and VAE.

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

Hijum, S. van (2016) Symbolic model checking of timed automata using LTSmin.

Hindriks, H.N. (2016) Vulnerability analysis of cyber security modelling language models using probabilistic logic.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Hobo, Emile Michel (2004) The General Theory of Consciousness : The Abstract Definition of the Processes Required for the Emergence of Consciousness.

Hoekstra, Æ. S. (2021) Deobfuscating third party libraries in Android applications using library detection tools.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Hofstra, Matthijs (2018) Integrating Formal Methods Tools : A Case Study.

Hoheisel, R.E. (2022) Ransomware as a tool for diversion and coverup. A possible modus operandi for advanced persistent threats? A (practical) Investigation into the Use of Ransomware as Masquerade and Distraction.

Hol, M.C. (2018) Using user workflow analysis to create insights in content-intensive applications : Combining Process Mining and Model-Driven Engineering to create a reusable, scalable and user-friendly solution.

Hollander, Emiel (2010) Dynamic access control.

Hollander, J.P. (2021) Verification of a model checking algorithm in VerCors.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Honig, J.J. (2020) Incremental symbolic execution.

Hoogervorst, R.W.P. (2018) A model-driven data-analysis architecture enabling reuse and insight in open data.

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Hop, Ivan J. (2022) On the Performance of Algorithms for Quantitative Verification.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Houtsma, R. (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Houtsma, Ramon (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Hove, D. ten (2010) Change management within SysML requirements models.

Hove, K.W. van (2022) Threat analysis of RPKI relying party software.

Hristov, I. (2018) A system for improving analysis of complexes in real estate asset management.

Hufen, N.D. (2024) Understanding consumer contesting strategies : The impact of Cialdini’s principles of scarcity and social proof with brand credibility on persuasion knowledge and contesting strategies.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware : Performance comparison between traditional- and centralized antivirus.

Huisman, Rolf (2007) Bugspray for composition filters.

Huistra, D.J. (2016) Automated generation of attack trees by unfolding graph transformation systems.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Hurne, I. van (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

Höfer, Christina (2013) Privacy-Preserving : Charging for eMobility.

Iadarola, Giacomo (2018) Graph-based classification for detecting instances of bug patterns.

Ikink, D.T.R. (2020) Security for an Internet-of-Things Network in the Context of a Dairy Management System.

Imre, Baris (2023) Using a Multi-Scale Patching With Vision Transformers for 3D Image Segmentation.

Inoue Nakagawa, P. (2021) Semantic Description of Explainable Machine Learning Workflows.

Ion, Diana-Elena (2021) Decentralized Finance Analysis.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Itäpelto, T.M. (2022) Item availability restricted.

Jafarli, Sevinj (2022) Providing DNS Security in Post-Quantum Era with Hash-Based Signatures.

Jagannatha, P. (2016) Detecting Exploit kits using Machine Learning.

Jansen, Joost (2019) Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC.

Jansen, L.J.A. (2022) Assessing smart home security : a Zigbee case study.

Jansen, L.W.L. (2022) About the effect of white-box membership inference attacks on federated learning in large networks.

Janssen, Bas (2016) Determining truth in tweets using feature based supervised statistical classifiers.

Janssen, Dylan Damian (2024) Design and Implementation of new features for Runtime Permission Verification in Concurrent Java Programs using VerCors.

Jayagopal, Tarun Narain (2021) VICE-GAN: Video Identity-Consistent Emotion Generative Adversarial Network.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Jeeva, Joshua Anith Singh (2023) Risk Assessment of Humanoid Robot EVE-r3.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Jiang, Yuling (2023) Patch-Based Morphing Attack Detection.

Jong, Koen de (2019) Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Jong, T. de (2017) Using Requirement Templates to Automate Requirements Formalization.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Joseph, A.M. (2023) Investigating vision transformers for human activity recognition from skeletal data.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Jundt, O. (2017) Fashion product entity matching.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Juursema, J.A.J. (2018) Improving visual role mining using metadata.

Jánosi, József-Hunor (2023) Two-Stage Overfitting of Neural Network-Based Video Coding In-Loop Filter.

Kahraman, G.M. (2020) Characterizing Sender Policy Framework configurations at scale.

Kalbiyev, A. (2022) Affective dialogue generation for video games.

Kamies, Bram (2020) Abeona: A generalized framework for state space exploration algorithm composition.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Kampen, C.M. van (2022) Zero Downtime Schema Migrations in Highly Available Databases.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Kantharajappa, Kushal (2023) Point localization on 3D hand meshes and point clouds.

Karampatzakis, E. (2015) Item availability restricted.

Karchev, F. (2019) IOT device profiling for Honeypot generation.

Karlsson, August (2023) Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT.

Karsten, Jarik (2022) Improving usability at BetterBe through API analysis.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kazmi, Syeda Nazish (2019) Access Control Process for a SaaS Provider.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Keijer, BSc J.S. (2021) Unsupervised Anomaly-Based Network Intrusion Detection Using Auto Encoders for Practical Use.

Keijzer, N. (2020) The new generation of ransomware : an in depth study of Ransomware-as-a-Service.

Keller, Kristian M.Sc. (2016) A day ahead electricity storage flexibility prediction for peak shaving.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Kemp, Tim (2020) An algorithmic approach to a conjecture of Chvátal on toughness and hamiltonicity of graphs.

Kempen, Lindsay (2022) ExpressTTS: Augmentation for Speech Recognition with Expressive Speech Synthesis.

Kerkers, M. (2017) Assessing the Security of IEC 60870-5-104 Implementations using Automata Learning.

Kerkhoven, Tim (2023) Monitoring Service-level Agreements for Logistics Service Providers.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Kester, J.J. (2018) CheckMerge: A System for Risk Assessment of Code Merges.

Ketelaar, J.G. (2012) Controller design for a bipedal robot with variable stiffness actuators.

Keuper, D. (2012) XNU : a security evaluation.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Khan, Etienne (2022) Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers.

Khasuntsev, N.A. (2021) Automatic Detection of Misconfigurations of AWS Identity and Access Management Policies.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Kippers, Richard Gerrit (2021) Methodology for reconstruction of 3D Building Models using 3D-CityJSON and Floor Plans.

Klanberg, Indrek (2019) Simulated Silicon Dopant networks : optimizing simulations, searching for boolean gates and visualization.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Klein Brinke, J. (2018) Device-free sensing and deep learning : analyzing human behavior through CSI using neural networks.

Klein Essink, B. (2018) iFat: an Interface for Fault/Attack Trees.

Kleverwal, J. (2015) Supervised text classification of medical triage reports.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Knippers, D. (2014) Querying Uncertain Data in XML.

Kobes, W.J. (2023) Governmental domain name management : policy versus practice.

Kock, Joeri (2019) A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules.

Kock, Ties de (2019) Visualization recommendation in a natural setting.

Koehorst, G.S. (2023) Generating natural language triage advice at Dutch out-of-hours primary care centers.

Koelewijn, Dirk (2022) Transformers on a Diet: Semi-Supervised Generative Adversarial Networks for Reducing Transformers' Hunger for Data in Aspect-Based Sentiment Analysis.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Kok, Guido (2010) Cloud computing & confidentiality.

Kok, M.R. (2023) Household electricity load forecasting for demand side management applications.

Kokkelkoren, R. (2019) Catching Flux-networks in the open.

Koldenhof, Dylan (2023) Neural Network Backdoor Removal by Reconstructing Triggers and Pruning Channels.

Kolev, Stiliyan (2019) Automation of software vulnerability monitoring for third party products in large IT companies.

Konijn, Jan-Paul (2022) Multi-domain Cyber-attack Detection in Industrial Control Systems.

Konings, S. (2020) Source code metrics for combined functional and Object-Oriented Programming in Scala.

Kooij, D. (2022) A Study on the Evolution of the Dutch Web.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Koopman, Michael (2019) A framework for detecting and preventing security vulnerabilities in continuous integration/continuous delivery pipelines.

Korevaar, Cornelis Willem (2010) A time-frequency localized signal basis for multi-carrier communication.

Korpershoek, J.J. (2020) Profiling encryption algorithms using ARM-based cache eviction attacks.

Kortekaas, Y.A.M. (2020) Access Pattern Hiding Aggregation over Encrypted Databases.

Korthout, N. (2017) Towards an architecture design for a future societal energy supply system.

Kortstra, Wybren (2020) Automatic Registration of Clinical Auditsfor Head and Neck Oncology at MST.

Koukoulis, Yannis (2016) Dual laser fault injection.

Krak, R. (2017) Cycle-Accurate Timing Channel Analysis of Binary Code.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Kroon, E. (2009) Layered configuration management for software product lines.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Kruk, D.A. van der (2015) A domain-specific language for specifying distributed real-time software system configurations.

Kuiper, Guus (2013) Guaranteed-throughput improvement techniques for connectionless ring networks.

Kuipers, J.H. (2017) Anycast for DDoS.

Kumar, Atul (2015) Security Analysis of Mobile Payment Systems.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Kurnia, Aldi Doanta (2023) Interoperability Simulator for Data Spaces.

Laan, J.H. van der (2021) Incremental verification of physical access control systems.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Laat, Martin de (2019) Design and validation of Software Requirements Specification evaluation checklist.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Lanting, Peter (2015) Multi-level views in a SUM-based environment.

Laso, P. (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable mri.

Laso Mielgo, Pablo (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable MRI.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Lathouwers, S.A.M. (2018) Reasoning About the Correctness of Sanitizers.

Laverman, G.J. (2016) Java Code Virtualization of Industrial-strength Java Code.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Le, T.N.H. (2022) Aggregation in probabilistic databases : implemented for DuBio.

Le, Van Huynh (2016) Analyzing white-box designs for differential computation analysis resistance.

Ledelay, Joël (2023) Verification of distributed locks : a case study.

Leefer van Leeuwen, Maxmilian (2023) Color Emotions without Blue Light : Effect of a Blue Light Filter on the Emotional Perception of Colors.

Leemreize, T. (2021) Analyzing fileless malware for the .NET Framework through CLR profiling.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Leeuwen, P. van (2020) FPGA-on-FPGA emulation using subgraph homeomorphism.

Legoy, V.S.M. (2019) Retrieving ATT&CK tactics and techniques in cyber threat reports.

Lenthe, J.M. van (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Leur, C. de (2015) Permission-based separation logic for Scala.

Li, Q. (2022) Co-attention-based pairwise learning for author name disambiguation.

Li, R. (2022) Automatic IMU-to-segment labelling using deep learning approaches.

Li, S. (2022) MBench : a benchmark suite designed for database schema migration.

Liberato, M. (2022) SecBERT : Analyzing reports using BERT-like models.

Lin, Y. (2010) Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Liu, Dou (2021) Knowledge Graph Driven Conversational Virtual Museum Guide.

Liu, Yujie (2023) Testing and Mutation Testing for GPU Kernels.

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Lorini, Giulia (2022) Addressing the Ransomware threat: TTP-based defensive recommendations and a strategy for achieving resilience.

Lu, C. (2020) Deep sleep stage detection.

Lucas, R.H. (2022) Supervised contrastive learning to overcome inconsistencies in exhaled breath data.

Lukman, Ivan (2019) Complete Characterization of Publicly Available Domain Blacklists.

Lummen, D.L.M. (2023) Is Telegram the new Darknet? A comparison of traditional and emerging digital criminal marketplaces.

Löwik, R.C.P. (2018) Tracking of wireless devices: is it possible and solvable?

Maan, H.C. (2016) Item availability restricted.

Maat, GJ ter (2016) Towards a scalable environment for traffic information services.

Maat, Roel ter (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Macarie, Mihai (2023) Fuzzing Android Automotive's CAN interface.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Majkut, Kristóf (2023) k-Anonymization Module Prepared for Change : a flexible architecture for the easy replaceability of algorithms and data sources with proof-of-concept implementation.

Man, R.J.P. de (2019) A formalisation of EMF by expressing Ecore as GROOVE graphs.

Mansour, Noor (2024) Facilitating Industrial B2B e-Auctions through Multi-Agent and Retrieval Augmented Large Language Models.

Mansvelder, F.M. (2022) Dutch language specific KPI exploration and recommendation for maintenance scheduling.

Maranatha, Yesaya Galatia (2023) Auditable Data Sharing in Logistic Data Space: Design and Implementation of IDS Clearing House for Logistic Data Space.

Marenco Zúñiga, Andrés (2014) Federated Aggregated Search.

Martakis, A. (2015) Framework for Enterprise Uncertainty-Driven Decision-Making : FEUD.

Masud, Muhammad Ahmed (2019) An Open Source Intelligence (OSINT) framework for online investigations.

Meerhof, J.J. (2023) Membership Inference Attacks on Federated Horizontal Gradient Boosted Decision Trees.

Mehra, A. (2020) Deepfake detection using capsule networks with long short-term memory networks.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Meijer, Gerben (2020) Producing high quality face morphs using GANs.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Meijer, L. (2021) Test case shrinking for Model Based Testing on Symbolic Transition Systems.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Meijerink, M.J. (2018) A visual DSL for automating business processes.

Meijerink, M.M.J. (2019) Anomaly-based detection of lateral movement in a Microsoft Windows environment.

Meijerman, T.R.I. (2023) Blocking Techniques on Privacy-Preserving Record Linkage.

Meijs, K.J. (2004) Generating natural narrative speech for the Virtual Storyteller.

Meinderts, S. (2021) Exploring the applicability of a data-driven approach on recommending in-store replenishments for fashion retailers.

Meinsma, D. (2018) Digging up Malware.

Melotti, D. (2021) Reversing and Fuzzing the Google Titan M Chip.

Mendler, Gereon (2023) Gossip Layer Optimization for the IOTA Network.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Merdis, Vasileios (2019) Wireless communication protocols for home automation exploring the security and privacy aspects of smart home IoT devices communicating over the Z-Wave protocol.

Michorius, J.A.R. (2018) Fair Machine Learning.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Middelesch, E.W. (2015) Anonymous and hidden communication channels : a perspective on future developments.

Miedema, Lukas (2020) QuickInterp - Improving interpreter performance with superinstructions.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Mishra, M.K. (2023) Generating Video Game Quests From Stories.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Mo, Alexander (2023) Transformer Offline Reinforcement Learning for Downlink Link Adaptation.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Mols, Emiel (2012) Sharding Spotify search.

Monshouwer, R. (2020) Detection of subclinical ketosis in dairy cows using behaviour sensor data.

Morad, Peshmerge (2023) Towards a Standard Fine-Grained Part-of-Speech Tagging for Northern Kurdish.

Morgese, Luca (2021) Stepping out of the MUD : contextual network threat information for IoT devices with manufacturer-provided behavioural profiles.

Mourik, F.G. van (2023) IterSHAP: an XAI feature selection method for small high-dimensional datasets.

Muis, Allard (2009) Patterns in data conversion.

Mulder, Henk (2019) Performance of program verification with VerCors.

Muller, M.W. (2023) SPaS: Sparse Parameterized Shortcut Connections for Dynamic Sparse-to-Sparse Training.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Möllering, Helen (2019) Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.

Müller, M. C. (2015) SIDekICk - Detecting Malicious Domain Names in the .nl Zone.

Nass, Mathieu (2020) Wi-Fi based range-only constraint integration in RTAB-Map.

Nauta, M. (2018) Temporal causal discovery and structure learning with attention-based convolutional neural networks.

Neele, Thomas (2016) GPU implementation of partial-order reduction.

Nelson, D.J. (2022) Privacy-preserving counterfactual explanations to help humans contest AI-based decisions.

Neupane, Nischal (2023) Explaining Hiccup Predictor using Layerwise Relevance Propagation.

Ngaffo Gouanfo, C.N.P (2022) Overcoming Selection Bias in Bayesian Network Construction.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Nguyen, ir. H.M. (2019) Formal verification of a red-black tree data structure.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Nguyen, Thuy (2021) Cross-applicability of ML classification methods intended for (non-)functional requirements.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Ni, Z. (2020) An improved Java-based single sign-on solution.

Nielen, J.J. van (2023) Dynamic Detection and Classification of Persistence Techniques in Windows Malware.

Niesink, S.W.R. (2017) Improving biomedical information retrieval with pseudo and explicit relevance feedback.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Nisslmueller, Utz (2022) LOLBin detection through unsupervised learning : An approach based on explicit featurization of the command line and parent-child relationships.

Niu, Z. (2022) Develop and adopt the organizational cybersecurity culture in the Covid-19 teleworking scenario.

Noltes, Johan (2011) Data location compliance in cloud computing.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Noort, W (2016) Gathering intelligence from the Bitcoin peer-to-peer network.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

Nyante, K.A. (2018) Secure Identity Management on the Blockchain.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Odyurt, Uraz (2016) Bring your own authenticator/authentication security in physical access control systems.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Ong-A-Fat, K.K. (2017) Context Aware GPS Error Correction.

Onis, Ramon (2018) Does your model make sense? : Automatic verification of timed systems.

Oonk, N.M.J. (2018) Attribute Extraction from Darknet Markets and the Applicability of Transfer Learning.

Oorschot, D.H.M.A. van (2023) VCLLVM: A Transformation Tool for LLVM IR programs to aid Deductive Verification.

Oortwijn, W.H.M (2015) Distributed Symbolic Reachability Analysis.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Oosterhout, Janneke van (2023) Formal Verification of Lightweight Decentralized Attribute-based Encryption.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Orij, J. (2016) Self-adaptation to concept drift in web-based anomaly detection.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Oude Weernink, M.J.P. (2018) Developing a system for the integration of vehicle data.

Ouden, J.J.A. den (2016) A quest for the best automated tests : Estimating software reliability based on Spec Explorer's on-the-fly test results.

Outersterp, R.M. van (2016) Partitioning of Spatial Data in Publish-Subscribe Messaging Systems.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Overkamp, N.M. (2024) ReScan : High performance mass scan responder.

Paalvast, Olivier (2022) Representing Ultra Low Dose CT scans as Chest X-Rays : how far can and do we need to go?

Padje, J. van 't (2020) The impact of the Dutch weather on the health of horses.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Palm, A.J. (2021) Using business intelligence to analyse sport associations' financial data.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Pandey, Vaidehi (2021) Self-supervised semantic segmentation based on self-attention.

Papadopoulos, Antonios (2019) The quest of "dethroning" passwords from (web)authentication schemes.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Parzian, Alessio (2015) Java Card Bytecode Verification. Designing a novel verification system.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Pathak, Shreyasi (2018) Automatic structuring of breast cancer radiology reports for quality assurance.

Patil, Samarjeet Singh (2021) Automated Vulnerability Detection in Java Source Code using J-CPG and Graph Neural Network.

Pavlov, V. (2022) Security aspects of digital twins in IoT platform.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Peeters, BSc Bart (2022) Exploring human relationship recognition in egocentric videos using deep learning techniques.

Peeters, J.J. (2016) Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Perenzoni, Stefano (2022) Understanding athletes preferences of sport activities through ranking based news feed recommendation.

Peters, M.D.J. (2022) Extending explainability of generative classifiers with prototypical parts.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Pham, Nguyen Hoang Dung (2022) Dynamically Allocating Network Resources for Teleoperation Applications using Intent-based Inference.

Pijnenborg, I. (2016) Methodological guideline to find suitable design patterns to implement adaptability.

Pištek, Andrej (2023) Dynamic variable reordering for Binary Decision Diagrams.

Plass, Martijn J.A. (2007) Rules Decomposition for Distributed Context Processing.

Pool, T.J. (2017) Drone swarming and combat management : visualizing and managing an autonomously functioning swarm of drones with as mediator Combat Management System(CMS).

Poozhiyil, Aditya (2023) Exploring Multimodal Data for Crime Recognition.

Popa, Andrei (2023) Gotta adjust them all! : Dynamic Difficulty Adjustment of Role-Playing Games Through Procedural Generation of Non-Player Characters.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Postema, J.T. (2019) Explaining system behaviour in radar systems.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Prasad, Akshay (2022) Investigating whether typosquatting targets children.

Prins, J. (2020) Proactive recognition of domain abuse.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Prodea, A (2021) Identifying critical source code at method level by performing threshold-based and clustering algorithms on software metrics.

Provoost, Jesper C. (2021) Improving Operational Efficiency In EV Ridesharing Fleets By Predictive Exploitation of Idle Times.

Prudnikova, Anna (2019) Standardized security assessment framework for ICS devices and pilot project.

Punter, C.M. (2010) Multi-source entity resolution.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Raghuraman, C. (2021) Detecting anomalies in programmable logic controllers through parameter modeling.

Rai, Shubham (2020) Behavioral Threat Detection : detecting Living of Land Techniques.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Ramón Gómez, Nerea (2022) An end-to-end approach to a Reinforcement Learning application in the transport logistics.

Ravishankaran, Charan (2021) Impact on how AI in automobile industry has affected the type approval process at RDW.

Redelijkheid, M.N.F. de (2023) Monitoring network traffic and responding to malicious traffic for IoT devices in 5G network slices.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Reesink, T.B.J. (2020) Creating 3D faces from 2D images using GANs.

Rekker, W. (2022) Verification of a SysML railway specification with a translation to UPPAAL.

Rengers, J.J. (2022) DDS in a Zero Trust Cloud Native Environment in the Naval Domain.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Rietberg, Max (2023) Quantified Photoacoustics for Carotid Artery Imaging.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Ritsema, Stan (2023) A Disentangled Representation Learning Approach for Deblurring Microscopy Images.

Ritterfeld, Thom (2016) On-demand app development.

Riva, Giovanni Maria (2019) Privacy architecting of GDPR-compliant high-tech systems : the PAGHS methodology.

Rodday, Nils Miro (2015) Exploring Security Vulnerabilities of Unmanned Aerial Vehicles.

Roelink, M.J. (2022) zk-SCHNAPS : enforcing arbitrary password policies in a zero-knowledge password protocol.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Romkema, J.F. (2020) Development of a NOx Emission Model using advanced regression techniques.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Roode, G. de (2022) User privacy in cryptocurrencies.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Rooijen, J. van (2020) Sustainability of cancer drug prices using UPPAAL.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Roos, M.C. de (2024) Faster Mutation Testing through Simultaneous Mutation Testing.

Roppelt, J.C. (2019) Security risks surrounding cryptocurrency usage : a study on the security risks of cryptocurrencies and how security perception affects usage.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Ros, K. M. (2019) Airport restroom cleanliness prediction using real time user feedback data and classification techniques.

Rotari, Cristian (2020) Secure and transparent dispute resolution system in supply chains using hyperledger fabric.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Rubbens, R.B. (2020) Improving Support for Java Exceptions and Inheritance in VerCors.

Ruis, F.A. (2021) Independent prototype propagation graph for compositional zero-shot recognition.

Rump, Arthur (2023) Apollo++: Automated Assessment of Learning Outcomes in Programming Projects.

Rus, A.C. (2023) NAISS : Network Authentication of Images to Stop e-Skimmers.

Sadad, Akhyar (2019) Reusable machine learning framework for predicting future system performance : a comparison study of validation strategy on WWTP time series data.

Saeed, Aaqib (2017) Deep physiological arousal detection in a driving simulator.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Samiksha, Samiksha (2021) Investigating an association between DDoS and Phishing attacks.

Santiago Garcia, Eric (2022) Country-independent MRTD layout extraction and its applications.

Sartori, Damiano (2020) Redactable Blockchain : how to change the immutable and the consequences of doing so.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Schaik, Eric van (2022) Improving the Informativeness of Abstractive Opinion Summarization.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

Schmit, C. (2022) Offloading Strategies for the Rendering Process in Edge-enabled Virtual Reality Games.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Scholten, Arnaut (2021) Efficient matching of heterogeneous roadmap data at Rijkswaterstaat.

Scholten, C.P.B. (2021) Automatic detection of zero-day attacks in high-interaction IoT honeypots using static analysis techniques.

Scholten, Jeroen (2022) Gain insights in the logistic processes at Amsterdam Schiphol Airport and determine solutions to limit capacity bottlenecks.

Scholten, R.H.D. (2020) Secure biometric verification in a malicious attacker model setting.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Schrijver, G. (2024) Evaluating Generalisability, Limitations, and Adaptations in Social Network Analytics-Based Insurance Fraud Detection.

Schroer, G.H. (2016) Feasibility of End-To-End Encryption using Attribute Based Encryption in Health Care.

Schultewolter, M. (2016) Verification of user information.

Schutte, J.J. (2019) Design of a development platform to monitor and manage Low Power, Wide Area WSNs.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Scrinzi, F. (2015) Behavioral Analysis of Obfuscated Code.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Senden, J.M.J. (2015) Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injuction using harmonic waves.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Serban, A.C. (2017) Context based personalized ranking in academic search.

Sessink, Danique (2020) Creating and Maintaining Organizational Security Awareness in SMEs.

Sessink, Joost (2023) Parallelising a probabilistic model checker.

Shafee, T. (2022) Governance of cloud storage - A secure cloud storage strategy to maximize data sovereignty.

Sharma, A.K. (2023) Securing the Digital Frontier : Identifying and Closing Security Gaps with MITRE ATT&CK and Open-Source Detection Controls.

Shyvakov, O. (2017) Developing a security framework for robots.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Sierink, T.G. (2022) Active Reconstruction Attacks on 2D Range Databases.

Siers, W.H. (2019) Generating specifications for JSON APIs for formal and semantic use.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Singhal, A.A. (2022) Improving extreme multi-label text classification with sentence level prediction.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Sivasubramanian, Kimsukha Selvi (2020) A comparative analysis of Post-Quantum Hash-based Signature Algorithm.

Slatman, H. (2016) Unboxing security analytics : towards effective data driven security operations.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Sloten, Jeroen van (2004) From SNMP to Web services-based network management.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Smits, J.P.G. (2022) Callisto - Selecting Effective Mutation Operators for Mutation Testing.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Smulders, Edwin (2013) User Space Memory Analysis.

Socha, Konrad (2023) Fuzzy Markov chains.

Sokolovas, Erikas (2023) Multimodal Neural Networks and Data Preprocessing for Ship Trajectory Prediction Using AIS, Radar, ENC and Weather Data.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Sonderen, T. (2019) A Manual for Attack Trees.

Song, X. (2020) Generative Adversarial Networks of Missing Sensor Data Imputation for 3D Body Tracking.

Sonneveld, J.J. (2023) Profiling Users by Access Behaviour Using Data Available to a Security Operations Center.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Spel, Jip (2018) Monotonicity in Markov chains.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Spenkelink, J.S. (2018) Consumer-deployable network intrusion detection in public clouds.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Sridhar Bangalore Venugopal, Sridhar Bangalore Venugopal (2019) Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints.

Srivastava, Siddhartha (2019) Benchmarking Facebook's Prophet, PELT and Twitter's Anomaly detection and automated deployment to cloud.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Stapel, F.T.A. (2023) Automated Grade Classification and Route Generation with Affordances on Climbing Training Boards.

Stapersma, Paul (2012) Efficient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Starink, J.A.L (2021) Analysis and automated detection of host-based code injection techniques in malware.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Steerneman, E.H. (2022) Exploring the effect of merging techniques on the performance of merged sparse neural networks in a highly distributed setting.

Stegeman, Lars (2018) Solitor : runtime verification of smart contracts on the Ethereum network.

Stekelenburg, A.V. (2024) Solving Parity Games: Combining Progress Measures and Tangle Learning.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Stevens, Stefanie Antonia (2017) Job satisfaction and work-life balance: an explorative study on remote workers.

Stikkelorum, M.J. (2020) Automated discovery of BACnet relations from bus traffic.

Stoian, N.A. (2022) Towards deep learning frameworks for the analysis of magnetic flux leakage captures.

Stokkink, Gerjan (2012) Quiescent transition systems.

Stortelder, R. (2019) Enabling centralized access to a reactive architecture for hardware control systems.

Stottelaar, Bas G.B. (2015) Practical cyber-attacks on autonomous vehicles.

Stouten, Thomas (2024) Modeling the effectiveness of treatment for Rheumatoid Arthritis with UPPAAL.

Stribos, R. (2023) A comparison of anomaly detection algorithms with applications on recoater streaking in an additive manufacturing process.

Stritzl, David (2019) Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant.

Strooisma, Ale (2016) A monitoring solution for multi-language software.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Sugumaran, Shyamprasad (2021) Monitoring the daily change in cow's body weight in relation to cow health and behavior.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Sun, Mengjie (2023) Ad Quality Analysis : Data Scientist Internship Report.

Sustronk, J.J. (2022) Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption.

Szabó, Réka (2018) Penetration testing of AWS-based environments.

Sánchez Ortiz, Elvira (2020) Zero-Knowledge Proofs applied to finance.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

Tabudlo, M.J. (2022) An Exploration of Cow Positioning Data Related Insights.

Tagliaro, Carlotta (2021) Item availability restricted.

Tahir, A. (2018) Predicting Young Soccer Players Peak Potential with Optimal Age.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Teesselink, T. (2019) Identifying Application Phases in Mobile Encrypted Network Traffic.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Terpstra, E. (2017) Designing a requirements engineering process for performance monitoring.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software : using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Theodorus, Abraham (2020) Restoration of damaged face statues using deep generative inpainting model.

Thijssen, P.G.H. (2020) OCL constraints in GROOVE.

Timmer, I.R. (2018) Anomaly Detection of malicious TLS traffic.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Tintelen, B.F.M. van (2022) Feature extraction and selection on sparse, complex, sensor-based exhaled-breath data sets.

Tjeerdsma, R. (2017) Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Torbecke, Janina (2017) Symbolic Model Checking with Partitioned BDDs in Distributed Systems.

Torres Cano, Andrés Felipe (2019) Automatic aviation safety reports classification.

Trienes, Jan (2019) Comparing rule-based, feature-based and deep neural methods for de-identification of Dutch medical records.

Tujner, Zsolt (2019) Quantum-safe TOR, post-quantum cryptography.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Uithol, Michiel (2008) Security in domain-driven design.

Ullah, I. (2016) Detecting Lateral Movement Attacks through SMB using BRO.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Varris, V. (2020) Using adversarial reinforcement learning to evaluate he IMMUNE risk-assesment.

Vasileiadis, Leonidas (2019) Remote runtime detection of tampering and of dynamic analysis attempts for Android apps.

Vasterd, M.F.J. (2021) Generative adversarial models for privacy-preserving release mechanisms.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Veen, H. van der (2015) Composing a more complete and relevant Twitter dataset.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Veen, S.E. van der (2024) A Formal Proof for the Correctness of Tangle Learning.

Veenstra, A. (2021) Accelerating mixed-level coverage array generation.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Ven, F.R. (2020) Forecasting yearly unplanned maintenance on underground waste containers based on maintenance history and demographics.

Venis, A.J. van de (2015) Recommendations using DBpedia : how your Facebook profile can be used to find your next greeting card.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Vercammen, S.A.A. (2014) Displaying intermediate results for on-going searches.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Verkuil, B. (2021) Automatic failure analysis for big data-driven industry.

Verkuil, S. (2016) CiteRep - Journal Citation Statistics for Library Collections using Document Reference Extraction Techniques.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Verver, Maks (2013) Practical improvements to parity game solving.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Visser, N.S. (2015) Fully automated web harvesting using a combination of new and existing heuristics.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Vonk, Jeroen (2016) Bisimulation Reduction with MapReduce.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Voortman, N.E.F. (2022) Modelling OSA Diagnosis and Treatment using UPPAAL.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Vos, Matthijs (2022) Capability Maturity Measurement of a Security Operations Center through Analysis Detection.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Vries, J. de (2015) The Generation of Booter (black)lists.

Vries, L.J.W. de (2021) Detection of DoH tunnelling : comparing supervised with unsupervised learning.

Vries, M.P. de (2022) Private Information Retrieval applied to Biometric Verification.

Vries, R.H. de (2021) Clash of Clangs : differential testing of srcML and Clang.

Vries, S.H.S. de (2016) Achieving 128-bit Security against Quantum Attacks in OpenVPN.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Vulpoiu, Ruxandra (2018) Machine Learning Applications in Financial Advisory.

Vuolo, M.R. (2024) Towards applications’ fingerprinting through the usage of NetFlow/IPFIX technology.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Wal, Djurre van der (2018) Translating AWN networks to the mCRL2 model checker: en route to formal routing protocol development.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Wal, P.R.D. van der (2023) Diversifying Multilayer Perceptron Ensembles in a Truly Sparse Context.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Walsh, Ricky (2022) Finding Balance: A Study of Class Imbalance in Deep Learning Classification of Breast Cancer.

Wang, Q. (2016) A reference architecture for integration platforms.

Wang, R. (2021) The potential role of using humor-framed crisis response on post-crisis corporate reputation and purchase intention.

Wang, Wenhui (2021) Finding and Exploiting Vulnerabilities in Embedded TCP/IP Stacks.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Weener, Jeroen (2021) Libertas: A Backward Private Dynamic Searchable Symmetric Encryption Scheme Supporting Wildcard Search.

Weening, J. (2024) Classifying Companies Based on Textual Webpage Data: A Comparative Analysis.

Weers, F.R.T. (2022) MaskCLIP : masking improves transfer for visual models trained with natural language supervision.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Wels, S.J. (2019) Guaranteed-TX : The exploration of a guaranteed cross-shard transaction execution protocol for Ethereum 2.0.

Wessels, P.D. (2018) Leveraging behavioural domain models in Model-Driven User Interface Development with GLUI.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Wevers, Gerben (2014) Hardware accelerator sharing within an MPSOC with a connectionless NOC.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Wiedijk, R.R.A. (2019) Code Instrumentation with Mod-BEAM.

Wiefferink, C.A. (2022) APEx: Zero-shot Cross-Knowledge Graph Named Entity Extraction leveraging Wikification.

Wiefferink, T.W. (2018) Combining usage and profile data for retrospectively analyzing usability of applications with funnels.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Wieren, H.D. van (2019) Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path.

Wieren, J.J. van (2020) Rolling contact fatigue defects on the Dutch railway: a data-driven analysis.

Wijburg, K.M. (2020) The state of statechains : exploring statechain improvements.

Wilde, Lisa de (2016) A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization.

Willemsen, M.J. (2018) Improving diagnosis by Grouping Test Cases to Reduce Complexity.

Windhouwer, Dennis (2014) The Modularity of the Resource Utilization Model in Python.

Winkel, J.D. te (2006) Applying Composition Filters to C.

Winkel, K.J. (2004) Upgrading Reactive Agents with Narrative Inspired Technology : What is the story?

Winsen, Stijn van (2017) Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles.

Winters, A. (2023) Automated control prioritization based on generating sector-based threat profiles.

Wit, Jeroen de (2013) Continuous forensic readiness.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

Witlox, K.H.D. (2022) Secure Blocking for Record Linkage.

Witt, S.J. (2023) An Internet-wide investigation of publicly accessible databases.

Wittingen, E.M. (2024) Deductive verification for SYCL.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

Wolters, N.H. (2016) Analysis of Attack Trees with Timed Automata (transforming formalisms through metamodeling).

Xu, J. (2024) Leveraging disagreement among annotators for text classification.

Yenidogan, Berk (2020) 30-Days post-operative mortality prediction of elderly hip fracture patients.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Zagema, S.G.C. (2024) FedNIP : A Statistical Heterogeneity Aware Dynamic Ranking Algorithm for Federated Learning.

Zamani, M.R. (2018) Post-Quantum Secure Authentication Methods Suitable For Quantum Key Distribution.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Zandbergen, Nikki (2023) QuestionMark : designing a benchmark for probabilistic databases.

Zande, M.J. van de (2019) Leveraging zero-knowledge succinct arguments of knowledge for efficient verification of outsourced training of artificial neural networks.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

Zanetti, Nicola (2015) Concept-drift in web-based IDS : evaluating current capabilities & future challenges.

Zarghami, S. (2013) Middleware for Internet of things.

Zeilstra, J. (2016) Reasoning about Active Object Programs.

Zeilstra, Pieter (2023) Explainable Diagnoses Prediction For General Practitioners.

Zeng, Y. (2023) Learning data augmentation policies for computer vision using additive Fourier-basis noise.

Zhang, Shu (2015) How do technical companies use microblogging?

Zhang, xuhao (2023) Design and Impact of Activation Functions for Sparse Neural Networks.

Zhu, Tingting (2022) The Media Bias of COVID-19 in Different Countries.

Zijden, W. van der (2017) Multi-Tenant Customizable Databases.

Zubavičius, R. (2023) Fluid properties estimation and pressure drop sensing based on Coriolis flow sensor using machine learning.

Zwan, J.M. van der (2020) Detection and tracking of events using open source data.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

Zwet, Dennis van der (2020) Assessing road quality and driver behavior using movement sensors in wrist worn devices.

Şakar, Ö.F.O. (2020) Extending support for axiomatic data types in VerCors.

Internship Report

Huber, Maximilian (2023) Internship report.

This list was generated on Thu May 23 06:05:13 2024 CEST.