University of Twente Student Theses

Login

Programme: Internet Science and Technology MSc (60032)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2004 | 2003
Number of items: 58.

2019

Geuze, N.J. (2019) Energy management in smart grids using timed automata.

Dzulqarnain, Dzulqarnain (2019) Investigating IoT malware characteristics to improve network security.

Sharman, S.S. (2019) Item availability restricted.

Conrads, J.G. (2019) DDoS Attack fingerprint extraction tool : making a flow-based approach as precise as a packet-based.

Naziris, Sotirios (2019) Infrastructure as code : towards dynamic and programmable IT systems.

2018

Schutijser, C.J.T.M. (2018) Towards automated DDoS abuse protection using MUD device profiles.

2017

Sarrionandia Uriarte, Nora (2017) Efficiency of broadcasting in vehicular networks by means of 5G device-to-device communications.

Larizgoitia Burgaña, Jon (2017) Design and evaluation of a link-state routing protocol for Internet-Wide Geocasting.

Ozaita Araico, Alejandro (2017) Detection of the crowdedness of a place sensing the devices in the area.

2016

Braak, J.C. ter (2016) Radiolocalisation at construction sites.

Moscoviter, D. (2016) Improving spatial indexing and searching for location-based DNS queries.

Wicaksana, M.A. (2016) IPv4 vs IPv6 Anycast Catchment: a Root DNS Study.

2015

Meijerink, B.J. (2015) Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks.

Chromik, Justyna Joanna (2015) Booters (black)list.

Slootweg, M.H.F. (2015) Implementing and Characterising Medical Implantable Wireless Communication Using the Microsemi ZL70102 : And Prototyping a Load Measurement Tool for Unicompartmental Knee Replacement Operations.

Hageman, Kaspar (2015) The Performance of ECC Algorithms in DNSSEC: A Model-based Approach.

2014

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX.

Biesbroek, Rudolf (2014) Last-mile lightpath services : on packet-switched shared infrastructure.

Kamphuis, Gertjan (2014) Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs.

Bolhuis, M (2014) Using an NFC-equipped mobile phone as a token in physical access control.

Wierbosch, Mark (2014) It is raining packets.

Steeg, D.P.M.H. van der (2014) Essay #65875

2013

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

2012

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

Chen, Zhen (2012) Workflow management solution for a security management application.

2011

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

2010

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

2009

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Ravesteijn, W. van (2009) Connecting distributed e-health applications by means of a generic control protocol.

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

2008

Kaijen, J.A.H. (2008) Management of risk & information security data.

Vries, A.J.K. de (2008) Improving reliability of streaming radio.

Broekhuizen, V.P. (2008) Security for EPC discovery services.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

2007

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Vlasveld, J. (2007) On context in context-aware ICT applications.

2006

Ingberg, G. (2006) Location aware performance measurements.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

2004

Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

2003

Min, Volker J.T. (2003) Transport accounting management in a multi-access technologies environment.

This list was generated on Thu Apr 2 06:02:59 2020 CEST.