Jump to:
2025,
2024,
2023,
2022,
2021,
2020,
2019,
2018,
2009
, Older
Jan 2011
2025
Martin Angelov: Analyzing Anycast Operator Diversity and Service Deployment
July 2025
July 2025
J.J. te Poel: A Comparative Study of Gravity-Based Centrality Models for Ranking Autonomous Systems in Directed Acyclic Graphs
July 2025
July 2025
Carolyn Alcaraz: Ranking Influential Reddit Users in the spread of Hate Speech : A BERT and PageRank-based approach
July 2025
July 2025
M. Flevaris: Evaluating the Integration of 5G Technology in Aviation Communication Systems
July 2025
July 2025
Rebecca Andrei: Election-Driven Trends in Reddit Hate Speech : A Clustering Approach to Target Analysis Before and During Trump Campaign Periods in USA
July 2025
July 2025
Rolf van Kleef: Discovery of Network Time Servers through Domain Names
July 2025
July 2025
Dan Gladkov: AI-Driven Analysis of Conti Ransomware Leaks for Perpetrator Identification and Victim Profiling
July 2025
July 2025
Ceylin Ece: Integrating Social Media and Large Language Models for Real-Time Traffic Incident Detection
July 2025
July 2025
Yousef Gouriye: Technical Profiling of Blocked Domains in Parental Control Systems
July 2025
July 2025
Alexandru Lungu: A Weaverlet-Based Interactive Dashboard for Temporal Analysis of Hate Speech on Reddit
July 2025
July 2025
T.P. Beld: Classifying IoT-Related Vulnerabilities in the CVE Dataset Using Large Language Models
July 2025
July 2025
Niek P. Damink: A Novel Heuristic for Directed Acyclic Graph Task Scheduling using Longest Betweenness Centrality
July 2025
July 2025
Luc Haaijer: Analyzing the Characteristics of DNS Namespace Scanners on the Public Internet
July 2025
July 2025
Narendra Setty: Towards Accurate and Optimized Booter Website Classification : Evaluating AI Models for Law Enforcement
July 2025
July 2025
Gonenc Turanli: Chronological Analysis of Green Hosting Distribution from 2021 to 2024
July 2025
July 2025
C.D. Sirbu: Examination of NTP Servers Through Censys Dataset
July 2025
July 2025
Olaf Adams: Analyzing YouTube Kids’ recommendation algorithm for content diversity
July 2025
July 2025
Thom Kastelein: Using a columnar data structure to analyse network telescope data
July 2025
July 2025
Pavlo Hrechko: Beyond 200 Hz : An Evaluation of Low-Rate IMU Sampling for Pedestrian Inertial Odometry
July 2025
July 2025
M.R. Albab: Severity vs Risk : The limitations of CVSS
April 2025
April 2025
Niels Rotmensen: An intelligent privacy-driven offloading algorithm for smart home applications
February 2025
February 2025
E. Loof: Calculating the carbon emissions of Dutch national government websites
February 2025
February 2025
E. Saado: Characterizing anycast convergence time for AS path prepends
February 2025
February 2025
Sandro Vrieling: Decommissioning base stations for a sustainable mobile network
February 2025
February 2025
Anna Smit: T-SCARS : A Time-Sensitive, Spatial Carbon-Aware Request Scheduler for Data Center Networks
February 2025
February 2025
Emir Akkaya: A Longitudinal Analysis of Short-Lived MOAS Prefixes on the Global Routing Table
February 2025
February 2025
P. Florian: Resource Profiling for Smart Home Machine Learning Applications
January 2025
January 2025
2024
Chris Josten: Geolocating anycast IP addresses using traceroute
July 2024
July 2024
I. Kępka: Analysis of SNMP through Censys Datasets
July 2024
July 2024
Ataberk Celebi: Saving Energy Through National Roaming: A New User Association Scheme
July 2024
July 2024
G.E. Evangelou: AWS, Azure, and Oracle Cloud : A comparative analysis of Open Ports
July 2024
July 2024
T.D. Hoven: Regularization Parameter Optimization in NIPA using Simulated Annealing
July 2024
July 2024
Yarden Sberlo: Enhancing Student Engagement in VLEs for Academic Success : Machine Learning Approach
July 2024
July 2024
Adamo Mariani: Beyond COPPA : Analysing Data Safety Across All Age Groups in Mobile Apps
July 2024
July 2024
D. Sava: Text-based classification of websites using self-hosted Large Language Models : An accuracy and efficiency analysis
July 2024
July 2024
Kyriaki Prodromou: Shaping Societal Impacts of Digital Marketing Campaigns
July 2024
July 2024
E. Zvirbulis: Automated detection of race conditions in DyNetKAT
July 2024
July 2024
J.G. de Haan: Control for Cooperative Autonomous Driving Vehicles at Roundabouts Inspired by Bird Flocking Behaviour
July 2024
July 2024
D. Asenov: A Data-driven Approach to Study the Influence of Social Media on Human Behaviours in Transportation
July 2024
July 2024
R. de Vries: Analysing targets of hate speech on X in the Netherlands using BERT-CNN
July 2024
July 2024
Tintin Wongthanaporn: Quantitative Analysis of IoT Data Generation in Smart Homes
July 2024
July 2024
Yolina Yordanova: Impact of User Interaction Patterns on Website Carbon Emissions Across Industries
July 2024
July 2024
B.E.R. ter Heegde: Building a Generalized DNS Resilience Tool using the Internet Yellow Pages
February 2024
February 2024
2023
T.F. Limbeek: Design and implementation of destination tracking and velocity control as an addition to a boids-inspired traffic simulation
November 2023
November 2023
Benjamin Othmer: An Empirical Study of Directory Service Dependencies
July 2023
July 2023
Pieter van Heijningen: Exploring The State of Rate Limiting in IPv6
July 2023
July 2023
Thomas van den Berg: The effect of IP prefixes on BGP visibility
July 2023
July 2023
S.S. Pandey: A Comparative study of BERT-CNN and GCN for Hate Speech Detection
July 2023
July 2023
An Pan: Party on? Inferring campus parties from WiFi logging
July 2023
July 2023
Beitske Flake: Network Inference-Based Prediction of Epidemics: A Case Study on Mexican State COVID-19 Infection Counts
July 2023
July 2023
Joris Bosman: Fine-tuning GPT-3 for data visualization code generation
July 2023
July 2023
J.C.W. Adamse: UAV deployment for flood-resilient mobile networks: a data-driven analysis for the Netherlands
July 2023
July 2023
W.J. Groote Veldman: Optimizing BLE Gateway Positioning in Aviation Industry: An Algorithm Based on Link Budget and Log-Distance Path Loss
July 2023
July 2023
S.J. Hoevers: Discourse on Discord : An analysis of relations between users
April 2023
April 2023
Robin Kreuger: Review of social media traffic at the DNS resolvers and their security implementation.
February 2023
February 2023
T. Stavropoulos: A comparative analysis of network data distribution in active DNS measurements. ZDNS vs OpenINTEL.
February 2023
February 2023
L. van der Horst: Saving energy in cellular networks through resource sharing
February 2023
February 2023
D. Vos: Losslessly compressing radio spectrum related data for archival
February 2023
February 2023
2022
A.C.W. van Beijnum: The state of DNSSEC provisioning automation
December 2022
December 2022
A. van Tilburg: Submodular functions and M-convex sets
August 2022
August 2022
L.W. Perik: An analysis of the decentralization and effectiveness of Lightning Network
August 2022
August 2022
A. van Tilburg: Submodular functions and M-convex sets
August 2022
August 2022
S. Veltmaat: Analysing 5G networks across the Netherlands and Switzerland
August 2022
August 2022
Pranav Chobdar: Comparing popular topics related to Covid-19 in Latin America and Europe
July 2022
July 2022
Z. Shi: Mining and Utilizing Patent Related Data in Quantifying the Societal Impact of Security Technologies
July 2022
July 2022
E. Gaisins: Are We All Back on Campus?
July 2022
July 2022
Arjan Blankestijn: Millimeter-Wave Connectivity in Real World Vehicle-To-Vehicle Network Scenarios
July 2022
July 2022
Roman Khavrona: Analysing Internet route changes related to the Russia-Ukraine war using BGP historical data
July 2022
July 2022
B.M. Gerretzen: Information leakage via Certificate Transparency
July 2022
July 2022
G.O. Stanculeanu: Assessing Russia’s isolation from the web following their invasion of Ukraine using the DNS root system
July 2022
July 2022
T.F. Niculae: Edge server placement on traffic lights for smart city services
July 2022
July 2022
Malek Assaad: Link Vulnerability Aware Task Deployment over Edge and Cloud
July 2022
July 2022
B. Batenburg: Performance of DNS over QUIC
February 2022
February 2022
B.J. Meyers: Analysing the resilience of 5G networks in the Netherlands
February 2022
February 2022
2021
J.A. Braakhuis: Design of a Reactive DNS Measurement System
July 2021
July 2021
A.C. Olteanu: Tracing Covid-19 domain name clusters on the internet
July 2021
July 2021
W. van Beijnum: The state of DNSSEC provisioning automation
July 2021
July 2021
Sian Hallsworth: Metrics for Efficiency of Spectrum Sharing in Wireless Networks
July 2021
July 2021
M. Resing: Should network operators hop on the data plane?
July 2021
July 2021
P.F. Beune: Classifying the Network Capacity of the Dutch IPv4 Address Space
July 2021
July 2021
Remus G. Niculescu: Analysis on the Evolution of Mobile Network Characteristics from NetBravo Dataset
July 2021
July 2021
S.C. Monteiro: An internet-wide analysis of TLS configurations of public LDAP servers
July 2021
July 2021
D.D. Janssen: Data-Driven Analysis of Cellular Network Resilience in the Netherlands
July 2021
July 2021
J.J. Meerhof: Loop-breaking Approaches for Vehicle Route Planningwith Multi-agent Q-routing
July 2021
July 2021
G.C. Maan: Analysing Cooperative Awareness Message generation around intersections based on macroscopic traffic parameters
February 2021
February 2021
Konstantin Averkin: You are the weakest link - identifying single-rack points of failure in the DNS
February 2021
February 2021
T. E. Pinke: Investigating Certification Authority Authorization Records' Effect on Existing Certificates
January 2021
January 2021
Joppe Blondel: Distributed Control Algorithm for Cooperative Autonomous Driving Vehicles Inspired by Flocking Behaviour
January 2021
January 2021
2020
T. Grooters: Analysing certificate transparency logs for let’s encrypt customer behaviour
July 2020
July 2020
M. Macarie: DNS bitsquatting in the wild
July 2020
July 2020
F.J. Nijeboer: Detection of HTTPS encrypted DNS traffic
July 2020
July 2020
G.W.R. Vredeveld: Invaluable measurement networks and their critical infrastructure : Uptime discrepancy localization and network improvements
July 2020
July 2020
N. van Noort: Machine Learning for monitoring attacks in the cloud
July 2020
July 2020
Thomas Stouten: Hide and seek : different scan methods to analyse peer-to-peer based blockchain networks
July 2020
July 2020
B.M. Oude Roelink: On the security of authentication when linking federated identities
July 2020
July 2020
D. Šatcs: Understanding the lightning network capability to route payments
July 2020
July 2020
D.L.M. Lummen: An analysis of Link and Node Level Resilience on Network Resilience
July 2020
July 2020
J.J. Sonneveld: A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks
July 2020
July 2020
F. van Jaarsveld: Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations
July 2020
July 2020
R.H.H.G.M. Linssen: Vulnerability of DNS name servers against BGP hijacking
February 2020
February 2020
J.J. Smits: What does a Domain Name Say
February 2020
February 2020
D.J. Lijcklama à Nijeholt: Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior
February 2020
February 2020
L.W.L. Jansen: Comparing cloud security directions between the Academia and the Industry
February 2020
February 2020
J. van der Velden: Blacklist, do you copy? Characterizing information flow in public domain blacklists
February 2020
February 2020
S.T.H. Peters: Distribution of advertisements on YouTube among several content categories
February 2020
February 2020
C. Schmit: Smoothed analysis of the ICP algorithm for arbitrary probability distributions
January 2020
January 2020
2019
N.A. Khasuntsev: Accurate and Efficient Classification of Cyber Security Documents
October 2019
October 2019
Christodoulos Tziampazis: Exposure Assessment on Medical Devices in the Netherlands
July 2019
July 2019
R. Oliemans: WHOIS versus GDPR
July 2019
July 2019
D.A. Bleeker: DoS attack on recursive resolvers with DNSSEC key-tag collisions
July 2019
July 2019
M.A.A. Hultermans: A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions
July 2019
July 2019
K.W. van Hove: Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator
July 2019
July 2019
Matthijs Vos: Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints
July 2019
July 2019
Julik Keijer: Automated DDoS mitigation based on known attacks using a Web Application Firewall
April 2019
April 2019
Dirk Koelewijn: Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter
April 2019
April 2019
W.J. Kobes: Efficient and accurate classification of cyber security related documents
April 2019
April 2019
D.R. Bakker: Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation
March 2019
March 2019
Older bachelor assignments
Robin F.Pronk: Impact of IPv6 on WiFibased networks
July 2016
July 2016
Dirk Maan: Validation of Internet Census 2012
February 2014
February 2014
Maarten Aertsen: A close examination of the public Teredo infrastructure and its application in connectivity monitoring
March 2012
March 2012
Yu Qiao: Evaluating the Impact of Large Vehicles in Vehicular Communication
March 2012
March 2012
Harm te Hennepe: Analysing uplink performance in relay-enabled LTE-networks
February 2012
February 2012
Martijn Bolhuis: On Access Network Identification - ADSL & Cable
February 2012
February 2012
Elger van der Wel: Hybrid Broadcast Broadband TV
December 2011
December 2011
Wouter Kooij: Self-Management of Optical Switching
December 2011
December 2011
Gertjan Kamphuis: Behavior patterns on a wireless campus network
July 2011
July 2011
Ivo Noppen: Roaming on a wireless campus network
December 2010
December 2010
Rolf Biesbroek: On the Performance of Grooming Strategies for Offloading IP Flows onto Lightpaths in Hybrid Networks
May 2010
May 2010
Rick Hofstede: Performance measurements of NfDump and MySQL and the development of a SURFmap plug-in for NfSen
July 2009
July 2009
Christiaan Ottow: A scalable architecture for video-editing web applications
January 2009
January 2009
Peter Lebbing: Design of a DCC monitor
December 2008
December 2008
Daan van der Sanden: Detecting UDP attacks using packet symmetry with only flow data
July 2008
July 2008
Joris Kinable: Detection of network scan attacks using flow data
June 2008
June 2008
Maarten Burghout: Experimental analysis of the impact of RTT differences on the throughput of two competing TCP flows
June 2008
June 2008
Bram Noordzij: Data multicasting for the IJkdijk as a large-scale sensor network
Maart 2008
Maart 2008
Robert van Harten: TCP behavior in an Always Best Connected Multi-Radio Access Network
Nov 2007
Nov 2007
Gijs van den Broek: Periodicity of SNMP Traffic
August 2007
August 2007
Thomas Schellekens: Ternary Line Codes and their Efficiency
June 2007
June 2007
Martijn Baars: Experimental Analysis of a secure PFP
March 2007
March 2007
Jorrit Schippers: Analysis of SNMP usage in the real world
February 2007
February 2007
Ivo Grondman: Identifying short-term periodicities in Internet traffic
January 2007
January 2007
Lucas van der Ploeg: Small TCP/IP stacks for micro controllers
December 2006
December 2006
Sander Ruitenbeek: Game theory in adaptive ad-hoc wireless networks
June 2006
June 2006
Laurens Hobert: Visualizing the limiting factors for the speed of TCP in realtime
June 2006
June 2006
Jesse Kaijen: Quality Control of Voice-over-IP
October 2005
October 2005
Mark Timmer: Analysis of TCP flows in the Surfnet network
August 2005
August 2005
Bert Baesjou: Analysis and improvement of TCP Hybla
August 2005
August 2005
Vincent van Kooten: Michiel Uithol: Network monitoring with available flow measurement techniques
part 1; part 2)
July 2005
part 1; part 2)
July 2005
Ruud Klaver: Experimental Validation of the "TCP Friendly" formula
April 2005
April 2005
Jeroen Idserda: TCP/IP modelling in OMNeT++
July 2004
July 2004
INDIVIDUAL RESEARCH PROJECTS
Chenxi Lei: Cooperative Adaptive Cruise Control model study based on traffic & network simulationJan 2011