Finished Master Assignments
- Finished Master Assignments
- Enhancing Email Security with Deep Learning Cloud-Based Image Steganography Detection
- Improving the Failover Time of Distributed Mission-Critical Systems
- The fallout of Windows code injection in benign programs
- Implementing Ensemble Machine Learning Models for Anomaly Detection in Credit Risk Data Quality
- CLAIR: Generating On-Demand Low-Code Application Documentation through Knowledge Graph and LLM-based Multi-Agent System Integration
- Feature Request Handling in Software Development SMEs
- Towards Efficient Order Statistics in CKKS: A Study of Robustness and Efficiency Through Non-Continuous Function Approximation
- Code Green: Evaluating the Carbon and Energy Implications of LLM Integration in Software Development
- Weighted, Weighted and Art Found Wanting: A Complexity-minimisation Approach for Neuroevolution-based Side-channel Analysis
- Implementing and deploying a flexible MPC system
- Ontology-Driven Software Development: Generating Java code from OntoUML.
- A Methodology for Developing and Maintaining Data Products within a Data Mesh Architecture
- The effect of data imbalances on Membership Inference Attacks in Federated Learning
- Utilizing a Digital Model to Support Business Continuity Management Processes and Enhance Cyber Resilience
- Private Legacy to Cloud: A Tailored Migration Method for Private Cloud Deployment of Legacy Software Projects
- Effective Fuzzing with Constraint-Aware Oracle to Detect Logical Bugs in Database Management Systems
- Identification and Implementation of Suitable Decentralized Identifier Methods for Self-Sovereign Identity Wallets in a Data Space
- Automated Generation of Security and Privacy Labels for IoT Devices - A Framework based on NIST Guidelines
- Membership Inference Atacks on Federated Learning Protocols
- Designing a Methodology for the Development of Domain Specific Languages with both Graphical and Textual Elements
- Automated machine-readable data access agreements by applying ODRL to a FAIR Data Train
- Optimizing Data Quality with a Scoring Based Cleansing framework
- Technology-Driven Career Path Prediction: A Case of Southeast Asia’s Public Organization
- Threat Hunting and Analysis of IoT Malware
- Utilizing Generative Artificial Intelligence to enhance Cyber Resilience in Cyber Supply Chain Management
- Test Vector Leakage Assessment on Number Theoretic Transform
- Unification of the framework of cross-user leakage in SSE
- Enhancing Business Model Network with Environmental Assessment
- Introducing Automated Testing into an Existing Codebase with Limited Effort
- Interoperability in Road Transport Logistics : Facilitating the Assessment of Co-Creation Opportunities for SMEs
- Preference – based multi- objective optimalization: A comparative case study in the Dutch steel manufacturing industry
- The Complexity of an IT Landscape- A Method for Quantifying Application Landscape Complexity and Understanding the Cost of Complexity
- Fallaway: High-Throughput Fuzzing by making AFL* State-Aware
- PATAT: An Open Source Attestation Mechanism for Trusted Execution Environments on TrustZone devices
- From Cloud to Ground: Assessing Integration Platform-as-a-Service (iPaaS) Against On-Premise Integration Platforms
- Towards a Data Mesh Reference Architecture
- Towards Applications’ Fingerprinting through the usage of Netflow/IPfix Technology
- A Repository for Testing Compliance to the Internet of Things (IoT) Security Standards
- A comprehensive study on feature detection algorithms and fine tuning methods for efficient metadata extraction in construction drawing
- Vulnerability Testing for WebAuthn
- Evaluating Generalisability, Limitations, and Adaptations in Social Network Analytics-Based Insurance Fraud Detection
- Towards a method for improving the coherence between the reference architectures within the Dutch public sector.
- From Component to Product – Digital capabilities for the Digital Product Passport in the Production Sector
- Membership Inference Attacks on Federated Horizontal Gradient Boosted Dicision Trees
- Data-Driven Services For Warehouse
- Design and Implementation of an Assessment Method based on the Capability Maturity Model Integration (CMMI)
- Interoperability Simulator for Data Spaces
- Applications of Early Warning Systems for Customer Segmentation of Wholesale Baking Clients
- Monitoring Service-level Agreements for Logistics Service Providers
- The difference in the perception of the information technology and security risks of Epic between the literature and practice
- Application Portfolio Management benefit realization using maturity model
- Auditable Data Sharing in Logistic Data Space: Design and Implementation of IDS Clearing House For Logistic Data Space
- Forecasting Costumer Lifetime Value through Risk Prediction: An Explanable Machine Learning Approach for the Telecommunication Industry
- The Design of a Performance Management Framework to Assess and Monitor the Performance of External Employees: A Quantitative Approach
- The Design of a Performance Management Framework to Assess and Monitor the Performance of External Employees: A Quantative approach
- AGroundedTheoryinvestigationontheprocessesandexpected benefits
- An EA based Big Analytics Deplyment Reference Architecture to improve Business Value
- Sub-Quadratic Privacy Preserving Cohort Selection
- Differentiating user groups within an educational dashboard using log data
- Aligning Information Systems Management and Risk Management to achieve Enterprise Resilience
- Exploring and Evaluating Alternative Models for Cross- Selling Recommendations
- Protecting against internal attackers with hardware-aided proxy re-encryption
- Fuzzing Android Automotive's CAN interface
- So Long and Thanks for all the (Big) Fish: Exploring cybercrime in Dutch Telegram groups
- Haly: Automated Evaluation of Hardening Techniques in Android and IOS Apps
- Data Governance structures in Data Mesh Architectures
- Dynamic Detection and Classification of Persistence Techniques in Malware
- Migration to a data-driven organization: building a framework to assist in digital transformation
- Soil organic carbon mapping for farms in the Netherlands
- Monitoring network traffic and responding to malicious traffic for IoT devices in 5G network slices.
- An Implementation Methodology for Augmented Reality Applications
- Digital Strategy in E Sports – How can E Sports teams build digital strategies to create value for sponsors
- Authentication Method for Windows OS based on Location Classification using WiFi Signals
- SecBERT: Analyzing reports using BERT-like models
- Secure Blocking for Record Linkage
- Benchmarking Car Dealership Efficiency using DEA NSBM
- Modern customer expectations and their effects on Digital Transformation in SMEs
- The Design of a Data Governance Approach for Quality, Security and Sustainability: A Qualitative Approach
- About the effect of white-box membership inference attacks on federated learning in large
- Ransomware as a tool for diversion and coverup. A possible modus operandi for advanced persistent threats?
- Implementation of ICT infrastructure in High Schools of Rural and Remote regions
- zk-SCHNAPS: Enforcing Arbitrary Password Policies in a Zero- Knowledge Password Protocol
- Design of a quantitative cost performance analysis method for IT consumption in business ecosystems
- An approach to an end-to-end Reinforcement Learning design and evaluation in the transport logistics
- Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption
- LOLBin detection through unsupervised learning
- Security Aspects of Digital Twins in IoT platform
- A software development project ontology
- Gain insights in the logistic processes at Amsterdam Schiphol Airport and determine solutions to limit capacity bottlenecks
- Develop and adopt the organizational cybersecurity culture in the Covid-19 teleworking scenario
- Effectiveness of Oblivious RAM in cloud storage services
- Active Reconstruction Attacks on 2D Range Databases
- Assesing Organizatins readiness for Agil at Scale adoption
- Improving the creation process of digital platforms: A design pattern reference model
- Modelling Security Architectures of Collaborative Networks
- Private Information Retrieval applied to Biometric Verification
- A Practical approach to assessing critical continuity properties of assets in Business & IT Continuity Management
- Autonomous Emulation of Adversary Procedures in the (Pre-)Compromise Domain
- Knowledge Graph Driven Conversational Virtual Museum Guide
- Digital Identity: A cyber resilience evaluation of the European digital identity ecommerce requirements
- End-to-end Encrypted Data in Web Applications
- Libertas: A Backward Private Dynamic Searchable Symmetric Encryption Scheme Supporting Wildcard Search
- DIGITAL TWINS IN RAIL FREIGHT - The foundations of a future innovation
- Aligning Data Architecture and Data Governance
- Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems
- Passive query-recovery attack against secure cojunctive keyword search schemes
- Developing an Agile Digital Transformation maturity model and assessment instrument
- Detecting Anomalies in Programmable Logic Controller through Parameter Modeling
- A Requirements Based Selection Model for Future Proof Non-Intrusive Authentication Technologies in the Office
- Health Information Exchange in the Netherlands
- Anlysis and Automated Detection of Code Injection Techniques in Malware
- Reversing and Fuzzing the Google Titan M chip
- How can (Large Scale) Agile be Effectively Adopted and Scaled up in (Dutch) Public Sector Organizations
- In pursuit of effective digital marketing actions in the agri-food sector: case FarmX
- HoneyKube: Designing a Honeypot Using Microservices-Based Architecture
- Automatic Detection of Zero-Day Attacks in High-Interaction IoT Honeypots using Static Analysis Techniques
- Cross-applicability of ML classification methods intended for (non-)functional requirements
- I still know what you watched last Sunday - A study on the security and privacy of the HbbTV protocol with a focus on the Italian landscape
- Agile Development of Applications as a Medical Device in a small Enterprise
- A Sustainability Assessment for Transport Routes in Container Transport
- Developing a Multi-Party MPC Compiler with Covert Security and Public Verifiability
- Information security certification in context : A strategy selection maturity model
- Business process optimization: an approach for improving organizations using external data
- Design a framework to develop capabilities for adopting AI/ML technologies in the supply chain
- Balanced as all things should be: PSD2 and cybersecurity risks
- Semantic Description of Explainable Machine Learning Workflows
- Spatial determinants of real estate appraisals in the Netherlands: a machine learning approach
- Automatic Detection of Misconfigurations of AWS Identity and Access Management Policies
- Developing a maturity model based approach supporting the decision to adopt International Data Spaces
- Analyzing Fileless Malware for the .NET Framework through CLR Profiling
- Digital Transformation in conditions of pandemic
- A Service-Oriented Business Collaboration Reference Architecture for Rural Business Ecosystem
- Automatic Generic Web Information Extraction at Scale
- Measuring Architectual Complexity
- Privacy Preserving Rental Checking
- Network Research: Exploration of Centrality Measures and Network Flows Using Simulation Studies
- Towards a reference architecture for BIM integration
- Analysis of Automatically Extracted Malware Features
- Improving Visual Role Mining using Metadata
- The design and implementation of situation aware smart logistics in perishable food transportation
- Data-driven retail food waste reduction: a comparison of demand forecasting techniques and dynamic pricing strategies
- CRM Success through Enhancing the Project Management Approach: a factor-base Approach
- Towards Updatable Smart Contracts
- Risk Management in Cloud Environments: Improving Risk Management by the Adoption of a Continuous Auditing and Monitoring Framework
- Leveraging behavioural domain models in Model-Driven User Interface development with GLUI
- Detecting deviant behaviour in system logs using artificial intelligence
- A visual DSL for automating business processes
- Optimizing the results of Online Advertising using Dynamic Pricing
- Social Cohesian and Sport in Overijssel; A Social network analysis
- Evaluating Quality of Open Source Components
- Combining usage and profile data for retrospectively analyzing usability of application with funnels
- Supporting the Innovation Process of Industrial SMEs using Mobina
- Predicting loan default in retail credits: the case of indonesian market
- Blockchain Opportunities in the Energy Transition
- How Social are Dutch Social Intranets Nowadays?
- Development of a Platform Strategy Framework