Master Thesis Lab
Archive of Master Thesis Reports
This public archive of Master Thesis Reports does not contain all reports, because not every student wants the thesis to be published.
- The temporal WTA circuit: a novel neuromorphic approach for learning to distinguish time-varying stimuli, O van der Himst, 2023. (pdf, 4 MB)
- Utilizing large language models for fuzzing, E Tamminga, 2023. (pdf, 1,4 MB)
- Analysis of clustering trails in differentials over iterative permutations, C Dworzack, 2023. (pdf, 966 kB)
- Intrinsically correct sorting using bialgebraic semantics, C Alexandru, 2023. (pdf, 317 kB)
- Automatically detecting head-shakes in NGT conversations, C van Rijbroek, 2023. (pdf, 3,5 MB)
- Towards explainable sign spotting systems, N Hollain, 2023. (pdf, 1,3 MB)
- Evaluating the security maturity of DevOps Teams, O de Gouw, 2023. (pdf, 9,6 MB)
- Negotiating privacy and utility: a study on Google Analytics implementation, T Ngoc, 2023. (pdf, 2,2 MB)
- A fast and accurate intervention-aware estimator, J Kang, 2023. (pdf, 1,4 MB)
- Extracting entities from handwritten civil records using handwritten text recognition and regular expressions, L Hoek, 2023. (pdf, 13 MB)
- Wav2vec 2.0 inside out, M ten Klooster, 2023. (pdf, 2 MB)
- Backdoor attacks against transformer-based neural networks for tabular data, B Pleiter, 2023. (pdf, 2,6 MB)
- Using concept mining for business-oriented data management, J Göertz, 2023. (pdf, 1 MB)
- SpanMarker for Named Entity Recognition, T Aarsen, 2023. (pdf, 467 kB)
- Security of O-RAN, S Michaelides, 2023. (pdf, 15 MB)
- Designing q-ary transformations for symmetric cryptography, D Verbakel, 2023. (pdf, 1,6 MB)
- Information security strategies for industrial IoT environments, S van Duijnhoven, 2023. (pdf, 1,5 MB)
- The underlying belief model of uncertain partially observable Markov decision processes, E Bovy, 2023. (pdf, 3,6 MB)
- Connectivity estimation in financial time series using deep learning models, B Jerkovic, 2023. (pdf, 1 MB)
- Word sense visualization based on word embedding: A tool for linguistic analysis, R Shokrzad, 2023. (pdf, 3,7 MB)
- Mitigating supply chain attacks through detection of high-risk software dependencies, J Vojnovic, 2023. (pdf, 1,6 MB)
- Automating payload delivery and detonation testing, M Lemmen, 2023. (pdf, 341 kB)
- Leveraging radiology reports for automatic lesion detection in CT scans, M Bergau, 2023. (pdf, 3,2 MB)
- Leak-detect: automatic login form leakage detection for website administrators and researchers, S Wallis de Vries, 2023. (pdf, 545 kB)
- How to handle long counterexamples - heuristics, optimizations and asymptotic lower bounds for L#, L Kruger, 2023. (pdf, 926 kB)
- Online political advertising - a case study of the republican and democratic parties in United States, A Altawekji, 2023. (pdf, 12 MB)
- Quality of service in a cloud native environment, G Versteeg, 2022. (pdf, 851 kB)
- Using SysML for model-based testing, T Hulshof, 2022. (pdf, 7,1 MB)
- Designing the teaching pattern: a structured approach to teach design patterns, R Holubek, 2022. (pdf, 4,4 MB)
- A Lens-based formalisation of view-based editing for variant-rich software systems, B Ruiken, 2022. (pdf, 1,2 MB)
- Assisting scientist programmers in software engineering and development, E Kirmiziyüz, 2022. (pdf, 1,3 MB)
- Finite-state automata as T-cell receptor repertoires, F Slijkhuis, 2022. (pdf, 2,8 MB)
- Using fast visual inpainting transformers for anomaly detection, S Versteeg, 2022. (pdf, 5,4 MB)
- Extracting structured web content using deep neural language models, G Hendriksen, 2022. (pdf, 2,3 MB)
- Model-based testing smart cable guard, G Noordbruis, 2022. (pdf, 1,1 MB)
- On the influence of tokenizers in NLP pipelines, H Werner, 2022. (pdf, 1,8 MB)
- Nitrogen signalling in Arabidopsis thaliana roots, L Meszaros, 2022. (pdf, 18 MB)
- Data governance in advanced analytics: opportunities and challenges, T Kunnen, 2022. (pdf, 2,8 MB)
- Third-party risk management in the financial services industry, G Keizer, 2022. (pdf, 948 kB)
- The time is ticking: the effect of deceptive countdown timers on consumers' buying behavior and experience, J Tiemessen, 2022. (pdf, 1,6 MB)
- From science to practice: a normative gap analysis on digital twins, M van Os, 2022. (pdf, 1,2 MB)
- Detecting capabilities in malware binaries by searching for function calls, J Vrancken, 2022. (pdf, 1,2 MB)
- Training a Dutch (+English) BERT model applicable for the legal domain, G de Kruijf, 2022. (pdf, 1,6 MB)
- Developing guidelines to optimize the process of communicating newly found cyber threats, R van Ginkel, 2022. (pdf, 1,1 MB)
- Evading the policy: a measurement on referrer policy circumvention in 3k e-commerce websites, T van Ouwerkerk, 2022. (pdf, 3,8 MB)
- Proposal for a Pyramid scheme, A Zeilstra, 2022. (pdf, 1,3 MB)
- Towards improving the performance of model driven optimisation, L van Arragon, 2021. (pdf, 2 MB)
- Optimizing local product performance of fast-moving consumer goods, G Dekkers, 2021. (pdf, 1,1 MB)
- Supporting sign language learning with a visual dictionary, M Wijkhuizen, 2021. (pdf, 3,5 MB)
- The BERT ranking paradigm: training strategies evaluated, M Verbrugge, 2021. (pdf, 538 kB)
- Federated regression analysis on personal data stores, C van Aarle, 2021. (pdf, 1,1 MB)
- Automatic selection of the most characterizing features for different types of atypical speech, L van Bemmel, 2021. (pdf, 7,2 MB)
- Calculating the vulnerability remediation order based on open source intelligence, R van Ginkel, 2021. (pdf, 2,9 MB)
- Product price prediction, A Prasad, 2021. (pdf, 2,4 MB)
- Machine learning with electronic patient records for diagnosis prediction in general practice, R Li, 2021. (pdf, 1,4 MB)
- A study in meta, L Verkleij, 2021. (pdf, 770 kB)
- Structure learning on an increasing amount of available data, M Swanenberg, 2021. (pdf, 1,2 MB)
- Precipitation nowcasting using generative adversarial networks, K Schreurs, 2021. (pdf, 2,9 MB)
- Asm3: modeling assembly languages efficiently in Why3, J Moerman, 2021. (pdf, 1,8 MB)
- The consequences of artificial intelligence in human capital management in the next five to ten years, J Muris, 2021. (pdf, 1,3 MB)
- Artificial intelligence-assisted detection of adhesions on cine-MRI, E Martynova, 2021. (pdf, 7,6 MB)
- Runaway keystream generators and their parallelizability and G&D-resistance, M van Leuken, 2021. (pdf, 486 kB)
- Cyberattack scenarios for remote electronic voting consultations using IRMA, M Verwoert, 2021. (pdf, 1,8 MB)
- Multi-scale graph-based clustering of images using Markov theory, A Ernest, 2021. (pdf, 926 kB)
- libLISA: Learning instruction set architectures from scratch, J Craaijo, 2021. (pdf, 1,1 MB)
- Reducing the power consumption of IoT devices in task-oriented programming, S Crooijmans, 2021. (pdf, 1,4 MB)
- Implementing asynchronous I/O in iTasks, G Alberts, 2021. (pdf, 1,7 MB)
- Entity linking in funding domain, G Aydin, 2021. (pdf, 703 kB)
- Conceptualisation of problem-solution patterns, J Sunnotel, 2021. (pdf, 1 MB)
- Evaluating adversarial attack detection using formal verification methods, R Joosse, 2021. (pdf, 3,4 MB)
- Exploring query re-optimization in a modern database system, L Kuiper, 2021. (pdf, 691 kB)
- Battling disinformation: towards comprehensible digital signature semantics, M van Dijk, 2021. (pdf, 1,4 MB)
- A pragmatic approach to active failure diagnosis of discrete-event systems, N Okker, 2021. (pdf, 3,7 MB)
- Image based time synergy, M Witsenboer, 2021. (pdf, 3,6 MB)
- User location detection - metadata based classification, B Westerweel, 2021. (pdf, 1,1 MB)
- Algorithmic differentiation of STIC lesions from normal epithelium in the fallopian tube on H&E stained slides, N van den Hork, 2021. (pdf, 13 MB)
- The organisational structure as a cause for HIT problems, N Roos, 2021. (pdf, 16 MB)
- Improving space weather analysis using Spark Structured Streaming, R Bouman, 2020. (pdf, 6,1 MB)
- BlueSpec: Development of an LMP state machine and a stateful black-box BR/EDR LMP fuzzer, T Nijholt, 2020. (pdf, 2,4 MB)
- Unsupervised out-of-distribution detection in digital pathology, G Raya, 2020. (pdf, 20 MB)
- Step aside! A fuzzy trip down side-channel lane, G Mulder, 2020. (pdf, 352 kB)
- Detecting privacy sensitive information in large file systems, N Dekkers, 2020. (pdf, 308 kB)
- Secure computation on the SAP cloud platform, W de Boer, 2020. (pdf, 698 kB)
- Graph representations of news articles for background linking, P Boers, 2020. (pdf, 517 kB)
- A comprehensive taxonomy of wifi attacks, M Vink, 2020. (pdf, 5,9 MB)
- Combining AI with radiologists, R Kluge, 2020. (pdf, 3,6 MB)
- Pneumothorax detection on chest radiographs, R Kluge, 2020. (pdf, 30 MB)
- Causal Shapley values for interpretable machine learning, E Sijben, 2020. (pdf, 616 kB)
- Re-ranking BERT revisiting passage re-ranking with BERT on MS MACRO, T Janssen, 2020. (pdf, 494 kB)
- Entropy guided decision making in multiple-environment Markov decision processes, M Suilen, 2020. (pdf, 1,4 MB)
- Ensemble learning with small machine learning algorithms for network intrusion detection, L Floor, 2020. (pdf, 784 kB)
- Text-independent speaker recognition, O Vishnyakova, 2020. (pdf, 2 MB)
- Cryptographic insecurity in Android apps, M Masoodi, 2020. (pdf, 862 kB)
- A modular approach towards the runtime verification of machine control applications, S Jansen, 2020. (pdf, 1,3 MB)
- Satisfiability modulo theories based packing of scalable rectangles for real-time layout generation, T Nikken, 2020. (pdf, 1 MB)
- Mutable collection types in shallow embedded DSLs, E van der Veen, 2020. (pdf, 454 kB)
- Policy distillation from world models, M Biondina, 2020. (pdf, 2,5 MB)
- A feasibility study for deep learning image guided guidewire tracking for image-guided interventions, T de Boer, 2020. (pdf, 8,8 MB)
- KYBER on RISC-V, D Greconici, 2020. (pdf, 521 kB)
- Breaking best practice protection of the TLS protocol in an Android environment, C Mandjes, 2020. (pdf, 3,4 MB)
- Security analysis of aftermarket remote keyless entry systems for consumer vehicles, T van Capelleveen, 2020. (pdf, 3 MB)
- Automated testing from sequence diagrams to model-based testing, B Petersen, 2020. (pdf, 3,7 MB)
- Success factors for new technology ventures, Y van Zantvoort, 2020. (pdf, 1,2 MB)
- Utilizing the Hadoop ecosystem to improve in-house data analysis of spacecraft housekeeping data, E Kok, 2020. (pdf, 1,1 MB)
- Optimal demand forecasting in practice, S ter Stege, 2020. (pdf, 1,4 MB)
- How do privacy dashboards affect customers' intention to purchase at an online retailer, O van Maaren, 2019. (pdf, 1,1 MB)
- Analysing the Signal Protocol, D van Dam, 2019. (pdf, 1,2 MB)
- Designing unplugged methods for computer programming, M Geluk, 2019. (pdf, 1,5 MB)
- Post-quantum hash-based signatures for multi-chain blockchain technologies, B Blaauwendraad, 2019. (pdf, 1,2 MB)
- On the generation and evaluation of tabular data using GANs, B Brenninkmeijer, 2019. (pdf, 4,4 MB)
- Resynchronizability of origin transducers, J Martens, 2019. (pdf, 608 kB)
- Analysis and comparison of identification and authentication systems under the eIDAS regulation, F Roelofs, 2019. (pdf, 478 kB)
- A comprehensive meta model for the current data landscape, W Boumans, 2019. (pdf, 1,1 MB)
- Keeping up with expressing the sense of structured natural language semantics, T Nobel, 2019. (pdf, 1,9 MB)
- A comparison between blockchain-based and non-blockchain-based ABC technology in the light of EU data protection law, R Eijkelenberg, 2019. (pdf, 1,5 MB)
- Defining who is attacking by how they are hacking, R Middelweerd, 2019. (pdf, 2,4 MB)
- An attack simulation methodology for empirical SOC performance evaluation, M Rosso, 2019. (pdf, 1,3 MB)
- Demystification of the blockchain phenomenon, R Hissink Muller, 2019. (pdf, 1,9 MB)
- Modelling user context using deep neural networks, D Verheijden, 2019. (pdf, 5,6 MB)
- Stealthy and in-depth behavioural malware analysis with Zandbak, T van Dijk, 2019. (pdf, 1,7 MB)
- Analyzing the Tahoe-LAFS filesystem for privacy friendly replication and file sharing, L de Bruin, 2019. (pdf, 1 MB)
- Receiver anonymity within a distributed file sharing protocol, S Schekermans, 2019. (pdf, 707 kB)
- Online template attack on ECDSA, N Roelofs, 2019. (pdf, 4,2 MB)
- Model-based reliability testing in image-guided therapy systems, A Andrade, 2019. (pdf, 1,1 MB)
- Improving self-supervised single view depth estimation by masking occlusion, M Schellevis, 2019. (pdf, 5,8 MB)
- Protecting implicit sensitive information from inference attacks, C Strucks, 2019. (pdf, 1,5 MB)
- Matastases detection in lymph nodes using transfer learning, M Kok, 2019. (pdf, 2,3 MB)
- Have a chat with BERT passage re-ranking using conversational context, T Crijns, 2019. (pdf, 592 kB)
- Classifying short text for the Harmonized System with convolutional neural networks, J Luppes, 2019. (pdf, 2,1 MB)
- Blockchain for post-trade settlement, clearing and custody of financial instruments, S Arissen, 2019. (pdf, 1,3 MB)
- Lazy interworking of compiled and interpreted code for sandboxing and distributed systems, C Staps, 2019. (pdf, 834 kB)
- Structural and technological diagnosis of quality of services and time management problems at Sun-Power, A Bulonza, 2019. (pdf, 908 kB)
- Optimizing NTRU using AVX2, O Danba, 2019. (pdf, 1 MB)
- The Coderclass decoded, J van Keulen, 2019. (pdf, 5,7 MB)
- Backup and recovery of IRMA credentials, I Derksen, 2019. (pdf, 3,5 MB)
- Detection of cryptominers in the wild, L Deelen, 2019. (pdf, 946 kB)
- Long- and short-term dependencies for sequential recommendation, J van Hulst, 2019. (pdf, 700 kB)
- The potential of temporal databases for the application in data analytics, A Menne, 2019. (pdf, 1 MB)
- Applying supervised learning on malware authorship attribution, C Boot, 2019. (pdf, 3,8 MB)
- Efficient constrained random sampling for use in a model based testing tool, M Huijben, 2019. (pdf, 2,3 MB)
- Phrase extraction models used for entity salience detection, K Jacobs, 2019. (pdf, 834 kB)
- Deep learning for Legal Tech: exploring NER on Dutch court rulings, S Brugman, 2018. (pdf, 2,6 MB)
- OPTLS Revisited, W Kuhnen, 2018. (pdf, 461 kB)
- Network deconvolution, E Gerritse, 2018. (pdf, 715 kB)
- Natural language generation for commercial applications, A van de Griend, 2018. (pdf, 1,1 MB)
- Online template attack on a hardware implementation of FourQ, T Sandmann, 2018. (pdf, 6,4 MB)
- Combining process modelling and process evaluation in a complex service delivery work process, D van Loon, 2018. (pdf, 2,4 MB)
- Why creepy ad is the new black, B Zhang, 2018. (pdf, 4,6 MB)
- Model based concept mining applied to information security data, C Smits, 2018. (pdf, 1,8 MB)
- Evaluating the use of Amy Webb's methodology as technological forecasting tool for the disruptive innovation, B Ghazal, 2018. (pdf, 1,1 MB)
- Hierarchical reinforcement learning in Space Fortress, V Cazorla, 2018. (pdf, 3,4 MB)
- Supporting lean transformation with IT, S Kayadi, 2018. (pdf, 822 kB)
- Developing real life, task oriented applications for the Internet of Things, M de Andrade, 2018. (pdf, 660 kB)
- Graph augmentation, F de Ridder, 2018. (pdf, 1,5 MB)
- Object localization and path prediction using radar and other sources towards autonomous shipping, K Vijverberg, 2018. (pdf, 4,8 MB)
- Decentralized attribute-based encryption for DECODE, M Venema, 2018. (pdf, 1,1 MB)
- Post-quantum blockchain using one-time signature chains, W vd Linde, 2018. (pdf, 1,1 MB)
- A practical application of model learning and code generation, G vd Meijde, 2018. (pdf, 862 kB)
- Analysis, reverse-engineering and implementation of HITAG2-based remote keyless entry systems, A Verstegen, 2018. (pdf, 3,2 MB)
- Automatic segmentation of retinal layers in optical coherence tomography using deep learning techniques, C Kamphuis, 2018. (pdf, 8,2 MB)
- Random walk with restart for automatic playlist continuation and query-specific adaptations, T van Niedek, 2018. (pdf, 535 kB)
- Fuzzing open VPN, S van Valburg, 2018. (pdf, 1,1 MB)
- Inferring webdocument clusters based on structural similarity, B Klaase, 2018. (pdf, 1 MB)
- Changeability of ERP systems, A Dimas, 2018. (pdf, 1,6 MB)
- Photo collection summarization, L Scholten, 2017. (pdf, 1,3 MB)
- Seeing through obfuscation interactive detection and removal of opaque predicates, T Rinsma, 2017. (pdf, 823 kB)
- Task oriented programming and the Internet of Things, M Lubbers, 2017. (pdf, 885 kB)
- The intricate issue of technology-driven change, J Kluten, 2017. (pdf, 1,2 MB)
- Investigating students' concurrent programming strategies, B Zondag, 2017. (pdf, 1,4 MB)
- Distributed group model building, M Ouborg, 2017. (pdf, 2,4 MB)
- Designing a value co-creation language, H Singh, 2017. (pdf, 1,2 MB)
- The selection process of model based platforms, D Hendriks, 2017. (pdf, 569 kB)
- How can Lowlands-Socio Technical systems design contribute to redesigning healthy organizations when deploying enterprise architecture, H Alhasan, 2017. (pdf, 2,1 MB)
- Long term data storage using peer-to-peer technology, P Meessen, 2017. (pdf, 781 kB)
- Towards a practical application of the neo-piagetian theory for novice programmers, T Kutscha, 2017. (pdf, 488 kB)
- Triple scoring utilizing annotated web data, F Dorssers, 2017. (pdf, 519 kB)
- Framework for executing, measuring and optimizing the sales process, M Jansen, 2017. (pdf, 1 MB)
- A transformation from ORM conceptual models to Neo4j graph database, M Braimniotis, 2017. (pdf, 3,2 MB)
- Improving the efficiency of SVG in iTasks using deltas, D vd Vooren, 2017. (pdf, 668 kB)
- Digital identity management on blockchain for open model energy system, S Kikitamara, 2017. (pdf, 3,5 MB)
- Een onderzoek naar de relatie tussen de concepten van Pronto/DEMO en case management, M Dundar, 2017. (pdf, 1,7 MB)
- Semi-supervised opinion mining, N Walasek, 2017. (pdf, 5,4 MB)
- Software development for the public sector, P Huberts, 2017. (pdf, 1,4 MB)
- Predicting chromatin accessibility with convolutional neural networks, C vd Bogaard, 2017. (pdf, 1,2 MB)
- Applying model learning and domain specific languages to refactor legacy software, N Adityasatria, 2017. (pdf, 4 MB)
- The road to the future of cars, L vd Berg, 2017. (pdf, 423 kB)
- Entropy-based adaptation for URL classification, A Aminuddin, 2017. (pdf, 7,6 MB)
- An offline analysis of the CLEF-NEWSREEL evaluation, M Nanne, 2017. (pdf, 1,1 MB)
- Electronic identity management systems in the European Union, A Zwilling, 2017. (pdf, 10 MB)
- Automatic feature generation and selection in predictive analytics solutions, S vd Bosch, 2017. (pdf, 749 kB)
- Stakeholder involvement in de-escalations, M van Latum, 2017. (pdf, 872 kB)
- Role discovery in industrial control networks using the semi-supervised learning approach self-training, P vd Luitgaarden, 2017. (pdf, 554 kB)
- Improving the usefulness of alerts generated by automated static analysis tools, J Bleier, 2017. (pdf, 2,7 MB)
- Delivering content: the right content at the right time and at the right place to the right person, R Filiano, 2017. (pdf, 1,6 MB)
- Creating secure IoT systems, M Tijssen, 2017. (pdf, 1,4 MB)
- Improving the model based testing process of TorXakis by developing a graphical user interface, T Schroeter, 2017. (pdf, 2,1 MB)
- De praktische implementatie van de meldplicht datalekken in het onderwijs, C van Hemert, 2017. (pdf, 1,6 MB)
- Unsupervised learning in human activity recognition, N Weber, 2017. (pdf, 1,4 MB)
- Liquid requirements engineering, J Seesink, 2017. (pdf, 1,7 MB)
- A distributed server architecture for task oriented programming, A Oortgiese, 2017. (pdf, 1 MB)
- On the determination of the optimal methodology for ERP projects, B Goedhard, 2016. (pdf, 2,4 MB)
- Creating adaptable and adaptive user interface implementations in model driven developed software, N Makris, 2016. (pdf, 1,6 MB)
- Processing and analyzing functional near-infrared spectroscopy data, H Dang, 2016. (pdf, 4,6 MB)
- Working with unreliable observers using reactive extensions, D Peelen, 2016. (pdf, 1,1 MB)
- Side-channel analysis of Keccak and Ascon, N Samwel, 2016. (pdf, 2,4 MB)
- Task-oriented programming for developing non-distributed interruptible embedded systems, J Piers, 2016. (pdf, 1,4 MB)
- Attribute-based authentication and signatures for regulating home access, K van Ingen, 2016. (pdf, 5,3 MB)
- The application of linear transformation methods in the domain of side-channel analysis, R Mahmudlu, 2016. (pdf, 5,1 MB)
- Resilience of the Domain Name System, L Bade, 2016. (pdf, 2,2 MB)
- Word translation with Wikipedia, B van Berkel, 2016. (pdf, 272 kB)
- Improving semantic video segmentation by dynamic scene integration, F Zanjani, 2016. (pdf, 1 MB)
- Efficacy of data cleaning on financial entity identifier matching, L Liu, 2016. (pdf, 1,9 MB)
- NewHope for ARM, P Jakubeit, 2016. (pdf, 464 kB)
- Verification of Goroutines using Why3, M Schoolderman, 2016. (pdf, 1,1 MB)
- Matching ontologies with distributed word embeddings, H Prins, 2016. (pdf, 8,5 MB)
- A lightweight PUF-based privacy preserving authentication protocol, G Geltink, 2016. (pdf, 5,4 MB)
- Comprehensive security analysis of a toys-to-life game and possible countermeasures, K Valk, 2016. (pdf, 3,4 MB)
- Retail store workforce forecasting with aggregated output regression, T Janssen, 2016. (pdf, 1,8 MB)
- Using concept detectors to improve performance of visual question answering, S Reitsma, 2016. (pdf, 8,4 MB)
- An abstract automata learning framework, G van Heerdt, 2016. (pdf, 972 kB)
- Polymorphic pseudonymization in educational identity federations, H Harmannij, 2016. (pdf, 1,2 MB)
- Event Driven Architecture in software development projects, M klusman, 2016. (pdf, 1,8 MB)
- Good, bad and ugly design of Java card security, S Volokitin, 2016. (pdf, 1,3 MB)
- Protocol state fuzzing of an Open VPN, T Novickis, 2016. (pdf, 1,2 MB)
- Secure updates in automotive systems, R Spaan, 2016. (pdf, 2,3 MB)
- Payment service directive 2, J Reijers, 2016. (pdf, 1,1 MB)
- Parallelism by means of multithreading in Clean, J Groothuijse, 2016. (pdf, 2 MB)
- Security analysis of the Payleven mobile point-of-sale platform, S Acifovic, 2016. (pdf, 7,3 MB)
- Inferring SSH state machines using protocol state fuzzing, P Verleg, 2016. (pdf, 1,1 MB)
- An agent technology based digital marketplace for education, S Rinis, 2016. (pdf, 2,1 MB)
- Correctness and termination of Tomte components for active register automata learning, J van Stegeren, 2015. (pdf, 670 kB)
- A big data view of on-street parking, T de Ruijter, 2015. (pdf, 9,3 MB)
- Compression for FM MPX, M Vos, 2015. (pdf, 5,3 MB)
- Improving the adoption of dynamic web security vulnerability scanners, Y Smeets, 2015. (pdf, 1,3 MB)
- A generic data model for strategy matching, A Taha, 2015. (pdf, 1,2 MB)
- The role of Alipay in China, R Liu, 2015. (pdf, 4,4 MB)
- IRMA verified assurer, G Smelt, 2015. (pdf, 877 kB)
- ECA logic analysis, E Kelly, 2015. (pdf, 1,3 MB)
- Learning and model checking real-world TCP implementations, R Janssen, 2015. (pdf, 1,2 MB)
- Privacy-trust-behavior in web-based insurance services, R Putri, 2015. (pdf, 1,4 MB)
- Additional source of entropy as a service in the Android user space, B Visser, 2015. (pdf, 727 kB)
- Characterising fundamental ideas in international computer science curricula, T Steenvoorden, 2015. (pdf, 1,6 MB)
- Protecting personal data in the cloud, V Slieker, 2015. (pdf, 1,7 MB)
- Reverse engineering WirelessHart hardware, E Lorente, 2015. (pdf, 18 MB)
- Gaming the system, M Hendriks, 2015. (pdf, 6,3 MB)
- Secure single sign-on, N Heijmink, 2015. (pdf, 4 MB)
- Personal data management systems, R Oostrum, 2015. (pdf, 1,7 MB)
- Towards hybrid clustering for B2C customer segmentation, L a Campo, 2015. (pdf, 2,3 MB)
- Exploring the design space for dynamic interfaces, J Arendsen, 2015. (pdf, 1,7 MB)
- Intrinsic side-channel analysis resistance and efficient masking, K Stoffelen, 2015. (pdf, 673 kB)
- Solving prime-field ECDLPs on GPUs with OpenCL, E Boss, 2015. (pdf, 453 kB)
- Fair privacy: improving usability of the Android permission system, M Derks, 2015. (pdf, 6,2 MB)
- Adversarial background augmentation improves object localisation using convolutional neural networks, H Berntsen, 2015. (pdf, 1,7 MB)
- Software architectural styles in the internet of things, E Croes, 2015. (pdf, 4,4 MB)
- Model-based robustness analysis of indoor lighting systems, D Hendrix, 2015. (pdf, 1,9 MB)
- Performance improvement in automata learning, M Henrix, 2015. (pdf, 906 kB)
- Information value in a decision making context, J top, 2015. (pdf, 1,6 MB)
- Enhancing active automata learning by a user log based metric, P van den Bos, 2015. (pdf, 948 kB)
- Technology and the right to be forgotten, M Vijfvinkel, 2015. (pdf, 753 kB)
- Client-side performance profiling of javaScript for web applications, T Nagele, 2015. (pdf, 1,1 MB)
- Exchanging threat information between semi-honest parties, A Jongsma, 2015. (pdf, 783 kB)
- Model-based testing of web applications, J Monsma, 2015. (pdf, 2,8 MB)
- Implementing SPHINCS with restricted memory, J Rijneveld, 2015. (pdf, 572 kB)
- A research on usability problems of frequent and infrequent users, S Derckx, 2015. (pdf, 1,3 MB)
- Combining causal models for biomedical applications, L Kluitmans, 2015. (pdf, 1,1 MB)
- Over het NOREA privacy impact assessment, J Kockelkorn, 2015. (pdf, 1,3 MB)
- Zeggenschap over ICT-voorzieningen, E Dongelmans, 2015. (pdf, 1,8 MB)
- Open data: facilitator of the energy transition, M Bovy, 2015. (pdf, 1,6 MB)
- Fysieke en digitale communicatie in de jeugdzorg, R van Os, 2014. (pdf, 814 kB)
- Creating firewall rules with machine learning techniques, R Verbruggen, 2014. (pdf, 3,1 MB)
- An approach to model reaction rules and transform them to procedural form, V Doppenberg, 2014. (pdf, 1,5 MB)
- Applications of named entity recognition in customer relationship management systems, F Jadidian, 2014. (pdf, 2,5 MB)
- Threesomes on the internet, W Burgers, 2014. (pdf, 1,1 MB)
- Gamification in educational software development, A Buisman, 2014. (pdf, 1,8 MB)
- Requirements specificatie in software-ontwikkelprocessen, S van Oostenbrugge, 2014. (pdf, 3 MB)
- Experiments in unifying model checking approaches, P Maandag, 2014. (pdf, 570 kB)
- Evaluating the testing quality of software defined infrastructures, B Siebert, 2014. (pdf, 1,4 MB)
- Measuring architectural technical debt, M Kuznetcov, 2014. (pdf, 2,7 MB)
- Towards a methodology for measuring plausibility, M Buuron, 2014. (pdf, 1,8 MB)
- Agile user experience, B Verdiesen, 2014. (pdf, 1,9 MB)
- Improving smart grid security using smart cards, M Baeten, 2014. (pdf, 869 kB)
- Energy consumption analysis of practical programming languages, S Keijzers, 2014. (pdf, 915 kB)
- Measuring dependency freshness in software systems, J Cox, 2014. (pdf, 1,3 MB)
- Manifestation of real world social events on Twitter, M van de Voort, 2014. (pdf, 2,8 MB)
- Botnet detection using passive DNS, P da Luz, 2014. (pdf, 676 kB)
- Security evaluation of mobile device management solutions, J Kremers, 2014. (pdf, 9,8 MB)
- Secure key storage and secure computation in Android, T Cooijmans, 2014. (pdf, 1,1 MB)
- A lightweight, flexible evaluation framework to measure the ISO 27002 information security controls, K Huijben, 2014. (pdf, 1,2 MB)
- Efficient delegation of Idemix credentials, M Drijvers, 2014. (pdf, 1 MB)
- Realtime optimalisatie van VRI's in een verkeersnetwerk, H de Jong, 2014. (pdf, 2,3 MB)
- How to improve requirements engineering, J v Duijnhoven, 2014. (pdf, 793 kB)
- Executive functions as a predictor of a person's performance in information modelling, D Romme, 2014. (pdf, 303 kB)
- Side-channel attacks on the IRMA card, C Thijssen, 2014. (pdf, 5,1 MB)
- Personalized life reasoning, B Boshoven, 2014. (pdf, 732 kB)
- A benchmark approach to analyse the security of web frameworks, K Reintjes, 2014. (pdf, 1,4 MB)
- Differentiating Shigella from E.coli using hierarchical feature selection on MALDI-ToF MS data, L vd Wiel, 2014. (pdf, 762 kB)
- Enabling compile time variability modelling and implementation in business processes for Eclipse developers, R Sizonenko, 2014. (pdf, 1,5 MB)
- Improvements in structural contact prediction, M Liebrand, 2014. (pdf, 1,5 MB)
- High-throughput implementations of lightweight ciphers in the AVR ATtiny architecture, K Papagiannopoulos, 2013. (pdf, 4 MB)
- Linking business-IT alignment interventions to organizational culture, structure, strategy and change readiness, E Cassidy, 2013. (pdf, 14 MB)
- Predicting TV ratings using Twitter, H vd Brink, 2013. (pdf, 899 kB)
- Model checking of symbolic transition systems with SMT solvers, C Rutz, 2013. (pdf, 783 kB)
- Braille in mathematics education, M Bitter, 2013. (pdf, 1 MB)
- Neural network based model for productivity in software development, S Janssen, 2013. (pdf, 787 kB)
- The cost of comparing secrets without leaking information, P vd Hurk, 2013. (pdf, 555 kB)
- Bayesian inference of structural brain networks with region-specific Dirichlet parameterisation, L Onrust, 2013. (pdf, 381 kB)
- Wat is de impact van de sociale media op de koersbewegingen van de aandelenmarkt, A Rampersad, 2013. (pdf, 2,3 MB)
- Agent-based simulation with iTasks for navy patrol vessels, W v Staal, 2013. (pdf, 864 kB)
- Dynamic QA systems using knowledge bases, S Hu, 2013. (pdf, 1,5 MB)
- Software development in healthcare innovation, B Vossen, 2013. (pdf, 1,6 MB)
- Beyond smart meters, C Hillen, 2013. (pdf, 1,8 MB)
- TCP idle scans in IPv6, M Morbitzer, 2013. (pdf, 2,5 MB)
- Software quality assessment in an agile environment, F Oberscheven, 2013. (pdf, 1,2 MB)
- An argument based approach for easier process modeling using dialog games, R Thijssen, 2013. (pdf, 1,7 MB)
- Uncovering group differences in progressive profiling, R Rutten, 2013. (pdf, 1,8 MB)
- Agile requirements engineering en Scrum, C Kleine Staarman, 2013. (pdf, 4,1 MB)
- Gecontroleerde natuurlijke taal voor requirements, M Speksnijder, 2013. (pdf, 1,1 MB)
- A new approach to structured document building, R Janssen, 2013. (pdf, 2,4 MB)
- Information security in practice, P Sewuster, 2013. (pdf, 764 kB)
- A serious gaming approach to content elicitation for FCO-IM, J Vogels, 2013. (pdf, 730 kB)
- Profiler: deriving a digital profile from open source information, J Hendricksen, 2013. (pdf, 1,8 MB)
- Onderhoud van logica door business stakeholders, P Verhoeven, 2012. (pdf, 1,4 MB)
- Impact telecommunicatiewet op online interactie, N Wolfkamp, 2012. (pdf, 1,7 MB)
- Het ontwikkelen van gebruiksvriendelijke Apps voor smartphones, F de Bruin, 2012. (pdf, 2,5 MB)
- Using the grounded theory method in the information science context, N Braakensiek, 2012. (pdf, 1,9 MB)
- Cooperation in the clouds, M v Wieringen, 2012. (pdf, 1,1 MB)
- Reacting to concurrent changes in shared data sources, B vd Linden, 2012. (pdf, 616 kB)
- Agile software development process improvement in large organizations, B Leusink, 2012. (pdf, 443 kB)
- A feasibility study of loop bound analysis for loops with disjunctive guards, N Gubbels, 2012. (pdf, 1,9 MB)
- Wat docenten denken en studenten doen, S vd Velde, 2012. (pdf, 705 kB)
- Control selection based on effectiveness and cost within a fixed budget, J Altena, 2012. (pdf, 1,3 MB)
- Covert channel data leakage protection, A Cornelissen, 2012. (pdf, 2 MB)
- Using fomal methods within the belastingdienst, X Damen, 2012. (pdf, 7,9 MB)
- Omgevingsbewuste systemen en risico's, F v Workum, 2012. (pdf, 1,7 MB)
- An iterative specification game, J Kwee, 2012. (pdf, 1,5 MB)
- Sociale aspecten van software engineering, W Moerkerken, 2012. (pdf, 1,8 MB)
- Recognising botnets in organisations, B Weymes, 2012. (pdf, 4,1 MB)
- Applying automata learning to complex industrial software, W Smeenk, 2012. (pdf, 2,7 MB)
- OLAP cubes, V Kool, 2012. (pdf, 4,1 MB)
- Cloud computing, M Spreeuwenberg, 2012. (pdf, 5,8 MB)
- Security information and event management, S Dorigo, 2012. (pdf, 900 kB)
- Guiding the business rules specification process, J Deunk, 2012. (pdf, 1 MB)
- SBVR en de deskundigen uit de bedrijfspraktijk, T Gok, 2012. (pdf, 1,4 MB)
- How does a map-reduce algorithm behave in an information-retrieval environment, V Gijsen, 2012. (pdf, 1,5 MB)
- Bridging the digital divide in Zambia, I Trepels, 2012. (pdf, 2,2 MB)
- Conceptual modeling for business process semantics, R Usmany, 2012. (pdf, 5,5 MB)
- The attractiveness of an outsourcing provider, D Schraven, 2012. (pdf, 1 MB)
- De waarde van Rich Internet Applicaties voor commerciele organisaties, M Sen, 2012. (pdf, 2,2 MB)
- Call-by-name, call-by-value and abstract machines, R Viehoff, 2012. (pdf, 497 kB)
- Measuring the correspondence between business-IT alignment and employee alignment of a company, T Stamper, 2012. (pdf, 4,1 MB)
- Security of mobile TAN on smartphones, L Koot, 2012. (pdf, 1,4 MB)
- ABN-AMRO E-dentifier2 reverse engineering, A Blom, 2011. (pdf, 2,3 MB)
- Methode voor formalisatie van wet- en regelgeving, T Lurvink, 2011. (pdf, 4,4 MB)
- Let's game together, A Evangelia, 2011. (pdf, 2,4 MB)
- An online game authoring community for children, O Efthalia, 2011. (pdf, 2,5 MB)
- Creating a business rules authoring tool, K Derks, 2011. (pdf, 2 MB)
- A specification of a dialogue game for group model building, E Steinmann, 2011. (pdf, 835 kB)
- E-mail as a human-computer dialog endpoint for workflow management systems, J Berndsen, 2011. (pdf, 1,5 MB)
- RAM: rapid alignment method, R Muijrers, 2011. (pdf, 2,1 MB)
- Van stembus naar uitslag: gegevensintegriteit verkiezingsproces, M Engberts, 2011. (pdf, 1,9 MB)
- Abstraction, objects and information flow analysis, B v Delft, 2011. (pdf, 881 kB)
- Method management system: rule-based method enactment using MediaWiki and semantic MediaWiki, D Taufan, 2011. (pdf, 5 MB)
- Interactieve elementen in beeldschermexamens, R v Summeren, 2011. (pdf, 2,4 MB)
- IOM2: innovation within an outsourcing relationship, B vd Linden, 2011. (pdf, 1,9 MB)
- Informed consent in behavioral advertising, P v Bebber, 2011. (pdf, 1,1 MB)
- Fuzzing the GSM protocol, B Hond, 2011. (pdf, 5,5 MB)
- Functional debugging: rapid prototyping and debugging for DSLs using functional programming, A Gerritsen, 2011. (pdf, 869 kB)
- Adaptive case management, K Strijbosch, 2011. (pdf, 4,8 MB)
- Comparison of penetration testing tools for web applications, F vd Loo, 2011. (pdf, 885 kB)
- Een business rules methode voor FCO-IM, M Alabbasy, 2011. (pdf, 5 MB)
- Combining probabilistic relational models with object-role models, K Hulsman, 2011. (pdf, 2 MB)
- Local approximation of centrality measures, M Hinne, 2011. (pdf, 305 kB)
- Classifier-based search in large document collections, J Schuhmacher, 2011. (pdf, 480 kB)
- Business process modeling as a means to bridge the business-IT divide, M Devillers, 2011. (pdf, 1,1 MB)
- Audience segregation a solution to protect online privacy, T Holweg, 2011. (pdf, 1,4 MB)
- GPU-based password cracking, M Sprengers, 2011. (pdf, 1,1 MB)
- Towards an ICT framework for sustainable tourism, S v Hooft, 2011. (pdf, 1,4 MB)
- Localization and mapping with autonomous robots, B Mader, 2011. (pdf, 3,3 MB)
- Improving Wizard of Oz creation by applying game concepts, D Nabuurs, 2011. (pdf, 5,7 MB)
- Strategy for the use of cloud computing, S de Bruijn, 2011. (pdf, 480 kB)
- Data protection in the cloud, J de Muijnck-Hughes, 2011. (pdf, 850 kB)
- Cross-site scripting voorkomen, R Ben Moussa, 2011. (pdf, 700 kB)
- How to use the CAcert infrastructure within an OpenID context, B Derlagen, 2010. (pdf, 2,2 MB)
- Credit cards versus iDeal, P v Leeuwen, 2010. (pdf, 933 kB)
- Strongly typed BPMN, F vd Berg, 2010. (pdf, 4,5 MB)
- Architectuur van digitale werkplaatsen, B Geijtenbeek, 2010. (pdf, 378 kB)
- Protecting shared state in a multi-core world: a comparison between traditional locking and transactional memory, S Castelein, 2010. (pdf, 1,6 MB)
- A method for durability analysis of development systems in computing, D vd Linden, 2010. (pdf, 410 kB)
- Classical logic, control calculi and data types, R Krebbers, 2010. (pdf, 823 kB)
- How action understanding can be rational, Bayesian and tractable, M Blokpoel, 2010. (pdf, 649 kB)
- Verifying properties of RefactorErl-transformations using QuickCheck, E Deckers, 2010. (pdf, 936 kB)
- Generating a rule-based modelling agenda, J Mutter, 2010. (pdf, 1,9 MB)
- A tool for click data preprocessing, M Pieterse, 2010. (pdf, 843 kB)
- The digital workshop in collaborative learning, D Pijper, 2010. (pdf, 2,3 MB)
- Improving software development, M Schuts, 2010. (pdf, 3,1 MB)
- Using QuickCheck and semantic analysis to verify correctness of Erlang refactoring transformations, E Jumpertz, 2010. (pdf, 507 kB)
- Broader perception for local community identification, F Koopmans, 2010. (pdf, 342 kB)
- Solving priority inversion in assembly machines for discrete semiconductors, L Nij Bijvank, 2010. (pdf, 1,1 MB)
- Associatie analyse op profielen van sociale netwerksites, K Rosken, 2010. (pdf, 1 MB)
- A graphical workflow editor for iTask, J Henrix, 2010. (pdf, 2,1 MB)
- De rol van een editor, J Schoemaker, 2010. (pdf, 913 kB)
- A flexible method for requirements engineering, P Arts, 2010. (pdf, 1,1 MB)
- Catching and understanding GSM signals, F vd Broek, 2010. (pdf, 1,3 MB)
- Architectuur analyse van de slimme meter, H v Bijnen, 2010. (pdf, 1,3 MB)
- Design space exploration with generated timed automata, F Houben, 2010. (pdf, 922 kB)
- Relief-based feature selection in bioinformatics, W Megchelenbrink, 2010. (pdf, 2,2 MB)
- Verifying reentrant readers-writers, B v Gastel, 2010. (pdf, 1,6 MB)
- Towards a modeling tool evaluation method, R Willems, 2010. (pdf, 581 kB)
- Het toepassen van requirements management op enterprise-architectuur, C Schutter, 2010. (pdf, 3,7 MB)
- Building iTask applications, S Michels, 2010. (pdf, 1,6 MB)
- Communicatie van IT governance, M Tissink, 2010. (pdf, 2,6 MB)
- Dutch EMV-cards and internet banking, M Schouwenaar, 2010. (pdf, 803 kB)
- Principal component analysis and side-channel attacks, J Hogenboom, 2010. (pdf, 3 MB)
- Formalism for a standard case management and its application on Scrum, D Oldenhave, 2010. (pdf, 2,6 MB)
- Investigating domain model integration processes, A Vermeij, 2010. (doc, 1,3 MB)
- Learning Bayesian models using mammographic features, N Radstake, 2010. (pdf, 2,7 MB)
- Informatiebeveiliging in ziekenhuizen, D Hamelink, 2010. (pdf, 1,5 MB)
- The value of enterprise architecture, B Kasteel, 2009. (pdf, 5,4 MB)
- Tracking local community evolution, F Koopmans, 2009. (pdf, 278 kB)
- Inference and abstraction of communication protocols, F Aarts, 2009. (pdf, 380 kB)
- Massively parallel computing as a service, F Kusters, 2009. (pdf, 727 kB)
- Learning models of communication protocols using abstraction techniques, J Uijen, 2009. (pdf, 432 kB)
- Mobiele telefoon als betaalmiddel, M v Ede, 2009. (pdf, 1,5 MB)
- Optimal deployment of distributed systems, M Moraal, 2009. (pdf, 1,6 MB)
- Designing a game for basic process model elicitation, B Schotten, 2009. (pdf, 627 kB)
- Propositions into a framework, M vd Tillaart, 2009. (pdf, 760 kB)
- Playing archimate models, J Groenewegen, 2009. (pdf, 1,2 MB)
- Een functionele aanpak voor taalcreatie en transformatie, B Lamers, 2009. (pdf, 450 kB)
- Location based services, J Koppers, 2009. (pdf, 5,3 MB)
- Using mobile phones for public transport payment, F Kooman, 2009. (pdf, 846 kB)
- Wat valt er onder de EU richtlijn omtrent de bewaarplicht van verkeersgegevens, J Herregodts, 2009. (pdf, 1,2 MB)
- Deploying the semantic web in the welfare environment, J Claessens, 2009. (pdf, 1,4 MB)
- Applicatie classificatie bij fusies en overnames, E de Ruiter, 2009. (pdf, 1,4 MB)
- Quality of information system negotiation processes, M Smith, 2009. (pdf, 813 kB)
- Software metrics: het verband tussen de onderhoudbaarheid en het aantal bugs van software, P v Rens, 2009. (pdf, 1,2 MB)
- Beveiliging van draadloze thuisnetwerken, Z Bajic, 2009. (pdf)
- Risicomodellering in het medische domein, W Klomp, 2009. (pdf)
- Operationeel risico modelleren, R Swinkels, 2009. (pdf)
- Optimizing web interest, W Elbers, 2009. (pdf)
- Rule-based BPM using the AREF modeling language, J Voesten, 2009. (pdf)
- Monitoring the elderly using real time location sensing, E Crombag, 2009. (pdf)
- Bewust zijn van het belang van informatiebeveiliging, A Suhonic, 2009. (pdf, 352 kB)
- A strict-size logic for featherweight Java extended with update, R Kersten, 2009. (pdf, 1,9 MB)
- Lean principles in case management, B Visser, 2009. (pdf, 5,2 MB)
- Compliance towards the belastingdienst, J Akkermans, 2009. (pdf)
- Uw dossiers, het ziekenhuis en het EPD, K Kluijtmans, 2009. (pdf, 1,2 MB)
- Indoor localization in wireless sensor networks, M vd Goor, 2009. (pdf)
- Een snel identificatie algoritme voor XML berichten, W Hoolwerf, 2009. (pdf)
- Architectuurprincipes: functie en formulering, K v Boekel, 2009. (pdf)
- Solving NP complete problems with memetic algorithms, M Ermers, 2009. (pdf)
- A gaming approach to collaborative modelling, I Wilmont, 2009. (pdf)
- The human firewall of behavioral information security, M Dam, K Wessels, 2009. (pdf)
- Analysis of the MIFARE classic used in the OV-chipkaart project, G de Koning, 2009. (pdf, 1,1 MB)