Finished Master Assignments
- Finished Master Assignments
- PATAT: An Open Source Attestation Mechanism for Trusted Execution Environments on TrustZone devices
- From Cloud to Ground: Assessing Integration Platform-as-a-Service (iPaaS) Against On-Premise Integration Platforms
- Towards a Data Mesh Reference Architecture
- Towards Applications’ Fingerprinting through the usage of Netflow/IPfix Technology
- A Repository for Testing Compliance to the Internet of Things (IoT) Security Standards
- A comprehensive study on feature detection algorithms and fine tuning methods for efficient metadata extraction in construction drawing
- Evaluating Generalisability, Limitations, and Adaptations in Social Network Analytics-Based Insurance Fraud Detection
- Towards a method for improving the coherence between the reference architectures within the Dutch public sector.
- Data-Driven Services For Warehouse
- Design and Implementation of an Assessment Method based on the Capability Maturity Model Integration (CMMI)
- Interoperability Simulator for Data Spaces
- Applications of Early Warning Systems for Customer Segmentation of Wholesale Baking Clients
- Monitoring Service-level Agreements for Logistics Service Providers
- The difference in the perception of the information technology and security risks of Epic between the literature and practice
- Forecasting Costumer Lifetime Value through Risk Prediction: An Explanable Machine Learning Approach for the Telecommunication Industry
- The Design of a Performance Management Framework to Assess and Monitor the Performance of External Employees: A Quantative approach
- AGroundedTheoryinvestigationontheprocessesandexpected benefits
- An EA based Big Analytics Deplyment Reference Architecture to improve Business Value
- Differentiating user groups within an educational dashboard using log data
- Aligning Information Systems Management and Risk Management to achieve Enterprise Resilience
- Exploring and Evaluating Alternative Models for Cross- Selling Recommendations
- Protecting against internal attackers with hardware-aided proxy re-encryption
- Fuzzing Android Automotive's CAN interface
- So Long and Thanks for all the (Big) Fish: Exploring cybercrime in Dutch Telegram groups
- Haly: Automated Evaluation of Hardening Techniques in Android and IOS Apps
- Data Governance structures in Data Mesh Architectures
- Dynamic Detection and Classification of Persistence Techniques in Malware
- Migration to a data-driven organization: building a framework to assist in digital transformation
- Soil organic carbon mapping for farms in the Netherlands
- Monitoring network traffic and responding to malicious traffic for IoT devices in 5G network slices.
- Digital Strategy in E Sports – How can E Sports teams build digital strategies to create value for sponsors
- Authentication Method for Windows OS based on Location Classification using WiFi Signals
- SecBERT: Analyzing reports using BERT-like models
- Secure Blocking for Record Linkage
- Benchmarking Car Dealership Efficiency using DEA NSBM
- Modern customer expectations and their effects on Digital Transformation in SMEs
- About the effect of white-box membership inference attacks on federated learning in large
- Ransomware as a tool for diversion and coverup. A possible modus operandi for advanced persistent threats?
- Implementation of ICT infrastructure in High Schools of Rural and Remote regions
- zk-SCHNAPS: Enforcing Arbitrary Password Policies in a Zero- Knowledge Password Protocol
- Design of a quantitative cost performance analysis method for IT consumption in business ecosystems
- An approach to an end-to-end Reinforcement Learning design and evaluation in the transport logistics
- Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption
- LOLBin detection through unsupervised learning
- Security Aspects of Digital Twins in IoT platform
- A software development project ontology
- Gain insights in the logistic processes at Amsterdam Schiphol Airport and determine solutions to limit capacity bottlenecks
- Develop and adopt the organizational cybersecurity culture in the Covid-19 teleworking scenario
- Effectiveness of Oblivious RAM in cloud storage services
- Active Reconstruction Attacks on 2D Range Databases
- Assesing Organizatins readiness for Agil at Scale adoption
- Improving the creation process of digital platforms: A design pattern reference model
- Modelling Security Architectures of Collaborative Networks
- Private Information Retrieval applied to Biometric Verification
- A Practical approach to assessing critical continuity properties of assets in Business & IT Continuity Management
- Autonomous Emulation of Adversary Procedures in the (Pre-)Compromise Domain
- Knowledge Graph Driven Conversational Virtual Museum Guide
- Digital Identity: A cyber resilience evaluation of the European digital identity ecommerce requirements
- End-to-end Encrypted Data in Web Applications
- Libertas: A Backward Private Dynamic Searchable Symmetric Encryption Scheme Supporting Wildcard Search
- DIGITAL TWINS IN RAIL FREIGHT - The foundations of a future innovation
- Aligning Data Architecture and Data Governance
- Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems
- Passive query-recovery attack against secure cojunctive keyword search schemes
- Developing an Agile Digital Transformation maturity model and assessment instrument
- Detecting Anomalies in Programmable Logic Controller through Parameter Modeling
- A Requirements Based Selection Model for Future Proof Non-Intrusive Authentication Technologies in the Office
- Health Information Exchange in the Netherlands
- Anlysis and Automated Detection of Code Injection Techniques in Malware
- Reversing and Fuzzing the Google Titan M chip
- How can (Large Scale) Agile be Effectively Adopted and Scaled up in (Dutch) Public Sector Organizations
- In pursuit of effective digital marketing actions in the agri-food sector: case FarmX
- HoneyKube: Designing a Honeypot Using Microservices-Based Architecture
- Automatic Detection of Zero-Day Attacks in High-Interaction IoT Honeypots using Static Analysis Techniques
- Cross-applicability of ML classification methods intended for (non-)functional requirements
- I still know what you watched last Sunday - A study on the security and privacy of the HbbTV protocol with a focus on the Italian landscape
- Agile Development of Applications as a Medical Device in a small Enterprise
- A Sustainability Assessment for Transport Routes in Container Transport
- Developing a Multi-Party MPC Compiler with Covert Security and Public Verifiability
- Information security certification in context : A strategy selection maturity model
- Business process optimization: an approach for improving organizations using external data
- Design a framework to develop capabilities for adopting AI/ML technologies in the supply chain
- Balanced as all things should be: PSD2 and cybersecurity risks
- Semantic Description of Explainable Machine Learning Workflows
- Spatial determinants of real estate appraisals in the Netherlands: a machine learning approach
- Automatic Detection of Misconfigurations of AWS Identity and Access Management Policies
- Developing a maturity model based approach supporting the decision to adopt International Data Spaces
- Analyzing Fileless Malware for the .NET Framework through CLR Profiling
- Digital Transformation in conditions of pandemic
- A Service-Oriented Business Collaboration Reference Architecture for Rural Business Ecosystem
- Automatic Generic Web Information Extraction at Scale
- Measuring Architectual Complexity
- Privacy Preserving Rental Checking
- Network Research: Exploration of Centrality Measures and Network Flows Using Simulation Studies
- Towards a reference architecture for BIM integration
- Analysis of Automatically Extracted Malware Features
- Improving Visual Role Mining using Metadata
- The design and implementation of situation aware smart logistics in perishable food transportation
- Data-driven retail food waste reduction: a comparison of demand forecasting techniques and dynamic pricing strategies
- CRM Success through Enhancing the Project Management Approach: a factor-base Approach
- Towards Updatable Smart Contracts
- Risk Management in Cloud Environments: Improving Risk Management by the Adoption of a Continuous Auditing and Monitoring Framework
- Leveraging behavioural domain models in Model-Driven User Interface development with GLUI
- Detecting deviant behaviour in system logs using artificial intelligence
- A visual DSL for automating business processes
- Optimizing the results of Online Advertising using Dynamic Pricing
- Social Cohesian and Sport in Overijssel; A Social network analysis
- Evaluating Quality of Open Source Components
- Combining usage and profile data for retrospectively analyzing usability of application with funnels
- Supporting the Innovation Process of Industrial SMEs using Mobina
- Predicting loan default in retail credits: the case of indonesian market
- Blockchain Opportunities in the Energy Transition
- How Social are Dutch Social Intranets Nowadays?
- Development of a Platform Strategy Framework