Master Thesis Lab

Archive of Master Thesis Reports

This public archive of Master Thesis Reports does not contain all reports, because not every student wants the thesis to be published.

  • Model-based testing smart cable guard, G Noordbruis, 2022. (pdf, 1,1 MB)
  • On the influence of tokenizers in NLP pipelines, H Werner, 2022. (pdf, 1,8 MB)
  • Nitrogen signalling in Arabidopsis thaliana roots, L Meszaros, 2022. (pdf, 18 MB)
  • Data governance in advanced analytics: opportunities and challenges, T Kunnen, 2022. (pdf, 2,8 MB)
  • Third-party risk management in the financial services industry, G Keizer, 2022. (pdf, 948 kB)
  • The time is ticking: the effect of deceptive countdown timers on consumers' buying behavior and experience, J Tiemessen, 2022. (pdf, 1,6 MB)
  • From science to practice: a normative gap analysis on digital twins, M van Os, 2022. (pdf, 1,2 MB)
  • Detecting capabilities in malware binaries by searching for function calls, J Vrancken, 2022. (pdf, 1,2 MB)
  • Training a Dutch (+English) BERT model applicable for the legal domain, G de Kruijf, 2022. (pdf, 1,6 MB)
  • Developing guidelines to optimize the process of communicating newly found cyber threats, R van Ginkel, 2022. (pdf, 1,1 MB)
  • Evading the policy: a measurement on referrer policy circumvention in 3k e-commerce websites, T van Ouwerkerk, 2022. (pdf, 3,8 MB)
  • Proposal for a Pyramid scheme, A Zeilstra, 2022. (pdf, 1,3 MB)
  • Supporting sign language learning with a visual dictionary, M Wijkhuizen, 2021. (pdf, 3,5 MB)
  • The BERT ranking paradigm: training strategies evaluated, M Verbrugge, 2021. (pdf, 538 kB)
  • Federated regression analysis on personal data stores, C van Aarle, 2021. (pdf, 1,1 MB)
  • Automatic selection of the most characterizing features for different types of atypical speech, L van Bemmel, 2021. (pdf, 7,2 MB)
  • Calculating the vulnerability remediation order based on open source intelligence, R van Ginkel, 2021. (pdf, 2,9 MB)
  • Product price prediction, A Prasad, 2021. (pdf, 2,4 MB)
  • Machine learning with electronic patient records for diagnosis prediction in general practice, R Li, 2021. (pdf, 1,4 MB)
  • A study in meta, L Verkleij, 2021. (pdf, 770 kB)
  • Structure learning on an increasing amount of available data, M Swanenberg, 2021. (pdf, 1,2 MB)
  • Precipitation nowcasting using generative adversarial networks, K Schreurs, 2021. (pdf, 2,9 MB)
  • Asm3: modeling assembly languages efficiently in Why3, J Moerman, 2021. (pdf, 1,8 MB)
  • The consequences of artificial intelligence in human capital management in the next five to ten years, J Muris, 2021. (pdf, 1,3 MB)
  • Artificial intelligence-assisted detection of adhesions on cine-MRI, E Martynova, 2021. (pdf, 7,6 MB)
  • Runaway keystream generators and their parallelizability and G&D-resistance, M van Leuken, 2021. (pdf, 486 kB)
  • Cyberattack scenarios for remote electronic voting consultations using IRMA, M Verwoert, 2021. (pdf, 1,8 MB)
  • Multi-scale graph-based clustering of images using Markov theory, A Ernest, 2021. (pdf, 926 kB)
  • libLISA: Learning instruction set architectures from scratch, J Craaijo, 2021. (pdf, 1,1 MB)
  • Reducing the power consumption of IoT devices in task-oriented programming, S Crooijmans, 2021. (pdf, 1,4 MB)
  • Implementing asynchronous I/O in iTasks, G Alberts, 2021. (pdf, 1,7 MB)
  • Entity linking in funding domain, G Aydin, 2021. (pdf, 703 kB)
  • Conceptualisation of problem-solution patterns, J Sunnotel, 2021. (pdf, 1 MB)
  • Evaluating adversarial attack detection using formal verification methods, R Joosse, 2021. (pdf, 3,4 MB)
  • Exploring query re-optimization in a modern database system, L Kuiper, 2021. (pdf, 691 kB)
  • Battling disinformation: towards comprehensible digital signature semantics, M van Dijk, 2021. (pdf, 1,4 MB)
  • A pragmatic approach to active failure diagnosis of discrete-event systems, N Okker, 2021. (pdf, 3,7 MB)
  • Image based time synergy, M Witsenboer, 2021. (pdf, 3,6 MB)
  • User location detection - metadata based classification, B Westerweel, 2021. (pdf, 1,1 MB)
  • Algorithmic differentiation of STIC lesions from normal epithelium in the fallopian tube on H&E stained slides, N van den Hork, 2021. (pdf, 13 MB)
  • The organisational structure as a cause for HIT problems, N Roos, 2021. (pdf, 16 MB)
  • Improving space weather analysis using Spark Structured Streaming, R Bouman, 2020. (pdf, 6,1 MB)
  • BlueSpec: Development of an LMP state machine and a stateful black-box BR/EDR LMP fuzzer, T Nijholt, 2020. (pdf, 2,4 MB)
  • Unsupervised out-of-distribution detection in digital pathology, G Raya, 2020. (pdf, 20 MB)
  • Step aside! A fuzzy trip down side-channel lane, G Mulder, 2020. (pdf, 352 kB)
  • Detecting privacy sensitive information in large file systems, N Dekkers, 2020. (pdf, 308 kB)
  • Secure computation on the SAP cloud platform, W de Boer, 2020. (pdf, 698 kB)
  • Graph representations of news articles for background linking, P Boers, 2020. (pdf, 517 kB)
  • A comprehensive taxonomy of wifi attacks, M Vink, 2020. (pdf, 5,9 MB)
  • Combining AI with radiologists, R Kluge, 2020. (pdf, 3,6 MB)
  • Pneumothorax detection on chest radiographs, R Kluge, 2020. (pdf, 30 MB)
  • Causal Shapley values for interpretable machine learning, E Sijben, 2020. (pdf, 616 kB)
  • Re-ranking BERT revisiting passage re-ranking with BERT on MS MACRO, T Janssen, 2020. (pdf, 494 kB)
  • Entropy guided decision making in multiple-environment Markov decision processes, M Suilen, 2020. (pdf, 1,4 MB)
  • Ensemble learning with small machine learning algorithms for network intrusion detection, L Floor, 2020. (pdf, 784 kB)
  • Text-independent speaker recognition, O Vishnyakova, 2020. (pdf, 2 MB)
  • Cryptographic insecurity in Android apps, M Masoodi, 2020. (pdf, 862 kB)
  • A modular approach towards the runtime verification of machine control applications, S Jansen, 2020. (pdf, 1,3 MB)
  • Satisfiability modulo theories based packing of scalable rectangles for real-time layout generation, T Nikken, 2020. (pdf, 1 MB)
  • Mutable collection types in shallow embedded DSLs, E van der Veen, 2020. (pdf, 454 kB)
  • Policy distillation from world models, M Biondina, 2020. (pdf, 2,5 MB)
  • A feasibility study for deep learning image guided guidewire tracking for image-guided interventions, T de Boer, 2020. (pdf, 8,8 MB)
  • KYBER on RISC-V, D Greconici, 2020. (pdf, 521 kB)
  • Breaking best practice protection of the TLS protocol in an Android environment, C Mandjes, 2020. (pdf, 3,4 MB)
  • Security analysis of aftermarket remote keyless entry systems for consumer vehicles, T van Capelleveen, 2020. (pdf, 3 MB)
  • Automated testing from sequence diagrams to model-based testing, B Petersen, 2020. (pdf, 3,7 MB)
  • Success factors for new technology ventures, Y van Zantvoort, 2020. (pdf, 1,2 MB)
  • Utilizing the Hadoop ecosystem to improve in-house data analysis of spacecraft housekeeping data, E Kok, 2020. (pdf, 1,1 MB)
  • Optimal demand forecasting in practice, S ter Stege, 2020. (pdf, 1,4 MB)
  • How do privacy dashboards affect customers' intention to purchase at an online retailer, O van Maaren, 2019. (pdf, 1,1 MB)
  • Analysing the Signal Protocol, D van Dam, 2019. (pdf, 1,2 MB)
  • Designing unplugged methods for computer programming, M Geluk, 2019. (pdf, 1,5 MB)
  • Post-quantum hash-based signatures for multi-chain blockchain technologies, B Blaauwendraad, 2019. (pdf, 1,2 MB)
  • On the generation and evaluation of tabular data using GANs, B Brenninkmeijer, 2019. (pdf, 4,4 MB)
  • Resynchronizability of origin transducers, J Martens, 2019. (pdf, 608 kB)
  • Analysis and comparison of identification and authentication systems under the eIDAS regulation, F Roelofs, 2019. (pdf, 478 kB)
  • A comprehensive meta model for the current data landscape, W Boumans, 2019. (pdf, 1,1 MB)
  • Keeping up with expressing the sense of structured natural language semantics, T Nobel, 2019. (pdf, 1,9 MB)
  • A comparison between blockchain-based and non-blockchain-based ABC technology in the light of EU data protection law, R Eijkelenberg, 2019. (pdf, 1,5 MB)
  • Defining who is attacking by how they are hacking, R Middelweerd, 2019. (pdf, 2,4 MB)
  • An attack simulation methodology for empirical SOC performance evaluation, M Rosso, 2019. (pdf, 1,3 MB)
  • Demystification of the blockchain phenomenon, R Hissink Muller, 2019. (pdf, 1,9 MB)
  • Modelling user context using deep neural networks, D Verheijden, 2019. (pdf, 5,6 MB)
  • Stealthy and in-depth behavioural malware analysis with Zandbak, T van Dijk, 2019. (pdf, 1,7 MB)
  • Analyzing the Tahoe-LAFS filesystem for privacy friendly replication and file sharing, L de Bruin, 2019. (pdf, 1 MB)
  • Receiver anonymity within a distributed file sharing protocol, S Schekermans, 2019. (pdf, 707 kB)
  • Online template attack on ECDSA, N Roelofs, 2019. (pdf, 4,2 MB)
  • Model-based reliability testing in image-guided therapy systems, A Andrade, 2019. (pdf, 1,1 MB)
  • Improving self-supervised single view depth estimation by masking occlusion, M Schellevis, 2019. (pdf, 5,8 MB)
  • Protecting implicit sensitive information from inference attacks, C Strucks, 2019. (pdf, 1,5 MB)
  • Matastases detection in lymph nodes using transfer learning, M Kok, 2019. (pdf, 2,3 MB)
  • Have a chat with BERT passage re-ranking using conversational context, T Crijns, 2019. (pdf, 592 kB)
  • Classifying short text for the Harmonized System with convolutional neural networks, J Luppes, 2019. (pdf, 2,1 MB)
  • Blockchain for post-trade settlement, clearing and custody of financial instruments, S Arissen, 2019. (pdf, 1,3 MB)
  • Lazy interworking of compiled and interpreted code for sandboxing and distributed systems, C Staps, 2019. (pdf, 834 kB)
  • Structural and technological diagnosis of quality of services and time management problems at Sun-Power, A Bulonza, 2019. (pdf, 908 kB)
  • Optimizing NTRU using AVX2, O Danba, 2019. (pdf, 1 MB)
  • The Coderclass decoded, J van Keulen, 2019. (pdf, 5,7 MB)
  • Backup and recovery of IRMA credentials, I Derksen, 2019. (pdf, 3,5 MB)
  • Detection of cryptominers in the wild, L Deelen, 2019. (pdf, 946 kB)
  • Long- and short-term dependencies for sequential recommendation, J van Hulst, 2019. (pdf, 700 kB)
  • The potential of temporal databases for the application in data analytics, A Menne, 2019. (pdf, 1 MB)
  • Applying supervised learning on malware authorship attribution, C Boot, 2019. (pdf, 3,8 MB)
  • Efficient constrained random sampling for use in a model based testing tool, M Huijben, 2019. (pdf, 2,3 MB)
  • Phrase extraction models used for entity salience detection, K Jacobs, 2019. (pdf, 834 kB)
  • Deep learning for Legal Tech: exploring NER on Dutch court rulings, S Brugman, 2018. (pdf, 2,6 MB)
  • OPTLS Revisited, W Kuhnen, 2018. (pdf, 461 kB)
  • Network deconvolution, E Gerritse, 2018. (pdf, 715 kB)
  • Natural language generation for commercial applications, A van de Griend, 2018. (pdf, 1,1 MB)
  • Online template attack on a hardware implementation of FourQ, T Sandmann, 2018. (pdf, 6,4 MB)
  • Combining process modelling and process evaluation in a complex service delivery work process, D van Loon, 2018. (pdf, 2,4 MB)
  • Why creepy ad is the new black, B Zhang, 2018. (pdf, 4,6 MB)
  • Model based concept mining applied to information security data, C Smits, 2018. (pdf, 1,8 MB)
  • Evaluating the use of Amy Webb's methodology as technological forecasting tool for the disruptive innovation, B Ghazal, 2018. (pdf, 1,1 MB)
  • Hierarchical reinforcement learning in Space Fortress, V Cazorla, 2018. (pdf, 3,4 MB)
  • Supporting lean transformation with IT, S Kayadi, 2018. (pdf, 822 kB)
  • Developing real life, task oriented applications for the Internet of Things, M de Andrade, 2018. (pdf, 660 kB)
  • Graph augmentation, F de Ridder, 2018. (pdf, 1,5 MB)
  • Object localization and path prediction using radar and other sources towards autonomous shipping, K Vijverberg, 2018. (pdf, 4,8 MB)
  • Decentralized attribute-based encryption for DECODE, M Venema, 2018. (pdf, 1,1 MB)
  • Post-quantum blockchain using one-time signature chains, W vd Linde, 2018. (pdf, 1,1 MB)
  • A practical application of model learning and code generation, G vd Meijde, 2018. (pdf, 862 kB)
  • Analysis, reverse-engineering and implementation of HITAG2-based remote keyless entry systems, A Verstegen, 2018. (pdf, 3,2 MB)
  • Automatic segmentation of retinal layers in optical coherence tomography using deep learning techniques, C Kamphuis, 2018. (pdf, 8,2 MB)
  • Random walk with restart for automatic playlist continuation and query-specific adaptations, T van Niedek, 2018. (pdf, 535 kB)
  • Fuzzing open VPN, S van Valburg, 2018. (pdf, 1,1 MB)
  • Inferring webdocument clusters based on structural similarity, B Klaase, 2018. (pdf, 1 MB)
  • Changeability of ERP systems, A Dimas, 2018. (pdf, 1,6 MB)
  • Photo collection summarization, L Scholten, 2017. (pdf, 1,3 MB)
  • Seeing through obfuscation interactive detection and removal of opaque predicates, T Rinsma, 2017. (pdf, 823 kB)
  • Task oriented programming and the Internet of Things, M Lubbers, 2017. (pdf, 885 kB)
  • The intricate issue of technology-driven change, J Kluten, 2017. (pdf, 1,2 MB)
  • Investigating students' concurrent programming strategies, B Zondag, 2017. (pdf, 1,4 MB)
  • Distributed group model building, M Ouborg, 2017. (pdf, 2,4 MB)
  • Designing a value co-creation language, H Singh, 2017. (pdf, 1,2 MB)
  • The selection process of model based platforms, D Hendriks, 2017. (pdf, 569 kB)
  • How can Lowlands-Socio Technical systems design contribute to redesigning healthy organizations when deploying enterprise architecture, H Alhasan, 2017. (pdf, 2,1 MB)
  • Long term data storage using peer-to-peer technology, P Meessen, 2017. (pdf, 781 kB)
  • Towards a practical application of the neo-piagetian theory for novice programmers, T Kutscha, 2017. (pdf, 488 kB)
  • Triple scoring utilizing annotated web data, F Dorssers, 2017. (pdf, 519 kB)
  • Framework for executing, measuring and optimizing the sales process, M Jansen, 2017. (pdf, 1 MB)
  • A transformation from ORM conceptual models to Neo4j graph database, M Braimniotis, 2017. (pdf, 3,2 MB)
  • Improving the efficiency of SVG in iTasks using deltas, D vd Vooren, 2017. (pdf, 668 kB)
  • Digital identity management on blockchain for open model energy system, S Kikitamara, 2017. (pdf, 3,5 MB)
  • Een onderzoek naar de relatie tussen de concepten van Pronto/DEMO en case management, M Dundar, 2017. (pdf, 1,7 MB)
  • Semi-supervised opinion mining, N Walasek, 2017. (pdf, 5,4 MB)
  • Software development for the public sector, P Huberts, 2017. (pdf, 1,4 MB)
  • Predicting chromatin accessibility with convolutional neural networks, C vd Bogaard, 2017. (pdf, 1,2 MB)
  • Applying model learning and domain specific languages to refactor legacy software, N Adityasatria, 2017. (pdf, 4 MB)
  • The road to the future of cars, L vd Berg, 2017. (pdf, 423 kB)
  • Entropy-based adaptation for URL classification, A Aminuddin, 2017. (pdf, 7,6 MB)
  • An offline analysis of the CLEF-NEWSREEL evaluation, M Nanne, 2017. (pdf, 1,1 MB)
  • Electronic identity management systems in the European Union, A Zwilling, 2017. (pdf, 10 MB)
  • Automatic feature generation and selection in predictive analytics solutions, S vd Bosch, 2017. (pdf, 749 kB)
  • Stakeholder involvement in de-escalations, M van Latum, 2017. (pdf, 872 kB)
  • Role discovery in industrial control networks using the semi-supervised learning approach self-training, P vd Luitgaarden, 2017. (pdf, 554 kB)
  • Improving the usefulness of alerts generated by automated static analysis tools, J Bleier, 2017. (pdf, 2,7 MB)
  • Delivering content: the right content at the right time and at the right place to the right person, R Filiano, 2017. (pdf, 1,6 MB)
  • Creating secure IoT systems, M Tijssen, 2017. (pdf, 1,4 MB)
  • Improving the model based testing process of TorXakis by developing a graphical user interface, T Schroeter, 2017. (pdf, 2,1 MB)
  • De praktische implementatie van de meldplicht datalekken in het onderwijs, C van Hemert, 2017. (pdf, 1,6 MB)
  • Unsupervised learning in human activity recognition, N Weber, 2017. (pdf, 1,4 MB)
  • Liquid requirements engineering, J Seesink, 2017. (pdf, 1,7 MB)
  • A distributed server architecture for task oriented programming, A Oortgiese, 2017. (pdf, 1 MB)
  • On the determination of the optimal methodology for ERP projects, B Goedhard, 2016. (pdf, 2,4 MB)
  • Creating adaptable and adaptive user interface implementations in model driven developed software, N Makris, 2016. (pdf, 1,6 MB)
  • Processing and analyzing functional near-infrared spectroscopy data, H Dang, 2016. (pdf, 4,6 MB)
  • Working with unreliable observers using reactive extensions, D Peelen, 2016. (pdf, 1,1 MB)
  • Side-channel analysis of Keccak and Ascon, N Samwel, 2016. (pdf, 2,4 MB)
  • Task-oriented programming for developing non-distributed interruptible embedded systems, J Piers, 2016. (pdf, 1,4 MB)
  • Attribute-based authentication and signatures for regulating home access, K van Ingen, 2016. (pdf, 5,3 MB)
  • The application of linear transformation methods in the domain of side-channel analysis, R Mahmudlu, 2016. (pdf, 5,1 MB)
  • Resilience of the Domain Name System, L Bade, 2016. (pdf, 2,2 MB)
  • Word translation with Wikipedia, B van Berkel, 2016. (pdf, 272 kB)
  • Improving semantic video segmentation by dynamic scene integration, F Zanjani, 2016. (pdf, 1 MB)
  • Efficacy of data cleaning on financial entity identifier matching, L Liu, 2016. (pdf, 1,9 MB)
  • NewHope for ARM, P Jakubeit, 2016. (pdf, 464 kB)
  • Verification of Goroutines using Why3, M Schoolderman, 2016. (pdf, 1,1 MB)
  • Matching ontologies with distributed word embeddings, H Prins, 2016. (pdf, 8,5 MB)
  • A lightweight PUF-based privacy preserving authentication protocol, G Geltink, 2016. (pdf, 5,4 MB)
  • Comprehensive security analysis of a toys-to-life game and possible countermeasures, K Valk, 2016. (pdf, 3,4 MB)
  • Retail store workforce forecasting with aggregated output regression, T Janssen, 2016. (pdf, 1,8 MB)
  • Using concept detectors to improve performance of visual question answering, S Reitsma, 2016. (pdf, 8,4 MB)
  • An abstract automata learning framework, G van Heerdt, 2016. (pdf, 972 kB)
  • Polymorphic pseudonymization in educational identity federations, H Harmannij, 2016. (pdf, 1,2 MB)
  • Event Driven Architecture in software development projects, M klusman, 2016. (pdf, 1,8 MB)
  • Good, bad and ugly design of Java card security, S Volokitin, 2016. (pdf, 1,3 MB)
  • Protocol state fuzzing of an Open VPN, T Novickis, 2016. (pdf, 1,2 MB)
  • Secure updates in automotive systems, R Spaan, 2016. (pdf, 2,3 MB)
  • Payment service directive 2, J Reijers, 2016. (pdf, 1,1 MB)
  • Parallelism by means of multithreading in Clean, J Groothuijse, 2016. (pdf, 2 MB)
  • Security analysis of the Payleven mobile point-of-sale platform, S Acifovic, 2016. (pdf, 7,3 MB)
  • Inferring SSH state machines using protocol state fuzzing, P Verleg, 2016. (pdf, 1,1 MB)
  • An agent technology based digital marketplace for education, S Rinis, 2016. (pdf, 2,1 MB)
  • Correctness and termination of Tomte components for active register automata learning, J van Stegeren, 2015. (pdf, 670 kB)
  • A big data view of on-street parking, T de Ruijter, 2015. (pdf, 9,3 MB)
  • Compression for FM MPX, M Vos, 2015. (pdf, 5,3 MB)
  • Improving the adoption of dynamic web security vulnerability scanners, Y Smeets, 2015. (pdf, 1,3 MB)
  • A generic data model for strategy matching, A Taha, 2015. (pdf, 1,2 MB)
  • The role of Alipay in China, R Liu, 2015. (pdf, 4,4 MB)
  • IRMA verified assurer, G Smelt, 2015. (pdf, 877 kB)
  • ECA logic analysis, E Kelly, 2015. (pdf, 1,3 MB)
  • Learning and model checking real-world TCP implementations, R Janssen, 2015. (pdf, 1,2 MB)
  • Privacy-trust-behavior in web-based insurance services, R Putri, 2015. (pdf, 1,4 MB)
  • Additional source of entropy as a service in the Android user space, B Visser, 2015. (pdf, 727 kB)
  • Characterising fundamental ideas in international computer science curricula, T Steenvoorden, 2015. (pdf, 1,6 MB)
  • Protecting personal data in the cloud, V Slieker, 2015. (pdf, 1,7 MB)
  • Reverse engineering WirelessHart hardware, E Lorente, 2015. (pdf, 18 MB)
  • Gaming the system, M Hendriks, 2015. (pdf, 6,3 MB)
  • Secure single sign-on, N Heijmink, 2015. (pdf, 4 MB)
  • Personal data management systems, R Oostrum, 2015. (pdf, 1,7 MB)
  • Towards hybrid clustering for B2C customer segmentation, L a Campo, 2015. (pdf, 2,3 MB)
  • Exploring the design space for dynamic interfaces, J Arendsen, 2015. (pdf, 1,7 MB)
  • Intrinsic side-channel analysis resistance and efficient masking, K Stoffelen, 2015. (pdf, 673 kB)
  • Solving prime-field ECDLPs on GPUs with OpenCL, E Boss, 2015. (pdf, 453 kB)
  • Fair privacy: improving usability of the Android permission system, M Derks, 2015. (pdf, 6,2 MB)
  • Adversarial background augmentation improves object localisation using convolutional neural networks, H Berntsen, 2015. (pdf, 1,7 MB)
  • Software architectural styles in the internet of things, E Croes, 2015. (pdf, 4,4 MB)
  • Model-based robustness analysis of indoor lighting systems, D Hendrix, 2015. (pdf, 1,9 MB)
  • Performance improvement in automata learning, M Henrix, 2015. (pdf, 906 kB)
  • Information value in a decision making context, J top, 2015. (pdf, 1,6 MB)
  • Enhancing active automata learning by a user log based metric, P van den Bos, 2015. (pdf, 948 kB)
  • Technology and the right to be forgotten, M Vijfvinkel, 2015. (pdf, 753 kB)
  • Client-side performance profiling of javaScript for web applications, T Nagele, 2015. (pdf, 1,1 MB)
  • Exchanging threat information between semi-honest parties, A Jongsma, 2015. (pdf, 783 kB)
  • Model-based testing of web applications, J Monsma, 2015. (pdf, 2,8 MB)
  • Implementing SPHINCS with restricted memory, J Rijneveld, 2015. (pdf, 572 kB)
  • A research on usability problems of frequent and infrequent users, S Derckx, 2015. (pdf, 1,3 MB)
  • Combining causal models for biomedical applications, L Kluitmans, 2015. (pdf, 1,1 MB)
  • Over het NOREA privacy impact assessment, J Kockelkorn, 2015. (pdf, 1,3 MB)
  • Zeggenschap over ICT-voorzieningen, E Dongelmans, 2015. (pdf, 1,8 MB)
  • Open data: facilitator of the energy transition, M Bovy, 2015. (pdf, 1,6 MB)
  • Fysieke en digitale communicatie in de jeugdzorg, R van Os, 2014. (pdf, 814 kB)
  • Creating firewall rules with machine learning techniques, R Verbruggen, 2014. (pdf, 3,1 MB)
  • An approach to model reaction rules and transform them to procedural form, V Doppenberg, 2014. (pdf, 1,5 MB)
  • Applications of named entity recognition in customer relationship management systems, F Jadidian, 2014. (pdf, 2,5 MB)
  • Threesomes on the internet, W Burgers, 2014. (pdf, 1,1 MB)
  • Gamification in educational software development, A Buisman, 2014. (pdf, 1,8 MB)
  • Requirements specificatie in software-ontwikkelprocessen, S van Oostenbrugge, 2014. (pdf, 3 MB)
  • Experiments in unifying model checking approaches, P Maandag, 2014. (pdf, 570 kB)
  • Evaluating the testing quality of software defined infrastructures, B Siebert, 2014. (pdf, 1,4 MB)
  • Measuring architectural technical debt, M Kuznetcov, 2014. (pdf, 2,7 MB)
  • Towards a methodology for measuring plausibility, M Buuron, 2014. (pdf, 1,8 MB)
  • Agile user experience, B Verdiesen, 2014. (pdf, 1,9 MB)
  • Improving smart grid security using smart cards, M Baeten, 2014. (pdf, 869 kB)
  • Energy consumption analysis of practical programming languages, S Keijzers, 2014. (pdf, 915 kB)
  • Measuring dependency freshness in software systems, J Cox, 2014. (pdf, 1,3 MB)
  • Manifestation of real world social events on Twitter, M van de Voort, 2014. (pdf, 2,8 MB)
  • Botnet detection using passive DNS, P da Luz, 2014. (pdf, 676 kB)
  • Security evaluation of mobile device management solutions, J Kremers, 2014. (pdf, 9,8 MB)
  • Secure key storage and secure computation in Android, T Cooijmans, 2014. (pdf, 1,1 MB)
  • A lightweight, flexible evaluation framework to measure the ISO 27002 information security controls, K Huijben, 2014. (pdf, 1,2 MB)
  • Efficient delegation of Idemix credentials, M Drijvers, 2014. (pdf, 1 MB)
  • Realtime optimalisatie van VRI's in een verkeersnetwerk, H de Jong, 2014. (pdf, 2,3 MB)
  • How to improve requirements engineering, J v Duijnhoven, 2014. (pdf, 793 kB)
  • Executive functions as a predictor of a person's performance in information modelling, D Romme, 2014. (pdf, 303 kB)
  • Side-channel attacks on the IRMA card, C Thijssen, 2014. (pdf, 5,1 MB)
  • Personalized life reasoning, B Boshoven, 2014. (pdf, 732 kB)
  • A benchmark approach to analyse the security of web frameworks, K Reintjes, 2014. (pdf, 1,4 MB)
  • Differentiating Shigella from E.coli using hierarchical feature selection on MALDI-ToF MS data, L vd Wiel, 2014. (pdf, 762 kB)
  • Enabling compile time variability modelling and implementation in business processes for Eclipse developers, R Sizonenko, 2014. (pdf, 1,5 MB)
  • Improvements in structural contact prediction, M Liebrand, 2014. (pdf, 1,5 MB)
  • High-throughput implementations of lightweight ciphers in the AVR ATtiny architecture, K Papagiannopoulos, 2013. (pdf, 4 MB)
  • Linking business-IT alignment interventions to organizational culture, structure, strategy and change readiness, E Cassidy, 2013. (pdf, 14 MB)
  • Predicting TV ratings using Twitter, H vd Brink, 2013. (pdf, 899 kB)
  • Model checking of symbolic transition systems with SMT solvers, C Rutz, 2013. (pdf, 783 kB)
  • Braille in mathematics education, M Bitter, 2013. (pdf, 1 MB)
  • Neural network based model for productivity in software development, S Janssen, 2013. (pdf, 787 kB)
  • The cost of comparing secrets without leaking information, P vd Hurk, 2013. (pdf, 555 kB)
  • Bayesian inference of structural brain networks with region-specific Dirichlet parameterisation, L Onrust, 2013. (pdf, 381 kB)
  • Wat is de impact van de sociale media op de koersbewegingen van de aandelenmarkt, A Rampersad, 2013. (pdf, 2,3 MB)
  • Agent-based simulation with iTasks for navy patrol vessels, W v Staal, 2013. (pdf, 864 kB)
  • Dynamic QA systems using knowledge bases, S Hu, 2013. (pdf, 1,5 MB)
  • Software development in healthcare innovation, B Vossen, 2013. (pdf, 1,6 MB)
  • Beyond smart meters, C Hillen, 2013. (pdf, 1,8 MB)
  • TCP idle scans in IPv6, M Morbitzer, 2013. (pdf, 2,5 MB)
  • Software quality assessment in an agile environment, F Oberscheven, 2013. (pdf, 1,2 MB)
  • An argument based approach for easier process modeling using dialog games, R Thijssen, 2013. (pdf, 1,7 MB)
  • Uncovering group differences in progressive profiling, R Rutten, 2013. (pdf, 1,8 MB)
  • Agile requirements engineering en Scrum, C Kleine Staarman, 2013. (pdf, 4,1 MB)
  • Gecontroleerde natuurlijke taal voor requirements, M Speksnijder, 2013. (pdf, 1,1 MB)
  • A new approach to structured document building, R Janssen, 2013. (pdf, 2,4 MB)
  • Information security in practice, P Sewuster, 2013. (pdf, 764 kB)
  • A serious gaming approach to content elicitation for FCO-IM, J Vogels, 2013. (pdf, 730 kB)
  • Profiler: deriving a digital profile from open source information, J Hendricksen, 2013. (pdf, 1,8 MB)
  • Onderhoud van logica door business stakeholders, P Verhoeven, 2012. (pdf, 1,4 MB)
  • Impact telecommunicatiewet op online interactie, N Wolfkamp, 2012. (pdf, 1,7 MB)
  • Het ontwikkelen van gebruiksvriendelijke Apps voor smartphones, F de Bruin, 2012. (pdf, 2,5 MB)
  • Using the grounded theory method in the information science context, N Braakensiek, 2012. (pdf, 1,9 MB)
  • Cooperation in the clouds, M v Wieringen, 2012. (pdf, 1,1 MB)
  • Reacting to concurrent changes in shared data sources, B vd Linden, 2012. (pdf, 616 kB)
  • Agile software development process improvement in large organizations, B Leusink, 2012. (pdf, 443 kB)
  • A feasibility study of loop bound analysis for loops with disjunctive guards, N Gubbels, 2012. (pdf, 1,9 MB)
  • Wat docenten denken en studenten doen, S vd Velde, 2012. (pdf, 705 kB)
  • Control selection based on effectiveness and cost within a fixed budget, J Altena, 2012. (pdf, 1,3 MB)
  • Covert channel data leakage protection, A Cornelissen, 2012. (pdf, 2 MB)
  • Using fomal methods within the belastingdienst, X Damen, 2012. (pdf, 7,9 MB)
  • Omgevingsbewuste systemen en risico's, F v Workum, 2012. (pdf, 1,7 MB)
  • An iterative specification game, J Kwee, 2012. (pdf, 1,5 MB)
  • Sociale aspecten van software engineering, W Moerkerken, 2012. (pdf, 1,8 MB)
  • Recognising botnets in organisations, B Weymes, 2012. (pdf, 4,1 MB)
  • Applying automata learning to complex industrial software, W Smeenk, 2012. (pdf, 2,7 MB)
  • OLAP cubes, V Kool, 2012. (pdf, 4,1 MB)
  • Cloud computing, M Spreeuwenberg, 2012. (pdf, 5,8 MB)
  • Security information and event management, S Dorigo, 2012. (pdf, 900 kB)
  • Guiding the business rules specification process, J Deunk, 2012. (pdf, 1 MB)
  • SBVR en de deskundigen uit de bedrijfspraktijk, T Gok, 2012. (pdf, 1,4 MB)
  • How does a map-reduce algorithm behave in an information-retrieval environment, V Gijsen, 2012. (pdf, 1,5 MB)
  • Bridging the digital divide in Zambia, I Trepels, 2012. (pdf, 2,2 MB)
  • Conceptual modeling for business process semantics, R Usmany, 2012. (pdf, 5,5 MB)
  • The attractiveness of an outsourcing provider, D Schraven, 2012. (pdf, 1 MB)
  • De waarde van Rich Internet Applicaties voor commerciele organisaties, M Sen, 2012. (pdf, 2,2 MB)
  • Call-by-name, call-by-value and abstract machines, R Viehoff, 2012. (pdf, 497 kB)
  • Measuring the correspondence between business-IT alignment and employee alignment of a company, T Stamper, 2012. (pdf, 4,1 MB)
  • Security of mobile TAN on smartphones, L Koot, 2012. (pdf, 1,4 MB)
  • ABN-AMRO E-dentifier2 reverse engineering, A Blom, 2011. (pdf, 2,3 MB)
  • Methode voor formalisatie van wet- en regelgeving, T Lurvink, 2011. (pdf, 4,4 MB)
  • Let's game together, A Evangelia, 2011. (pdf, 2,4 MB)
  • An online game authoring community for children, O Efthalia, 2011. (pdf, 2,5 MB)
  • Creating a business rules authoring tool, K Derks, 2011. (pdf, 2 MB)
  • A specification of a dialogue game for group model building, E Steinmann, 2011. (pdf, 835 kB)
  • E-mail as a human-computer dialog endpoint for workflow management systems, J Berndsen, 2011. (pdf, 1,5 MB)
  • RAM: rapid alignment method, R Muijrers, 2011. (pdf, 2,1 MB)
  • Van stembus naar uitslag: gegevensintegriteit verkiezingsproces, M Engberts, 2011. (pdf, 1,9 MB)
  • Abstraction, objects and information flow analysis, B v Delft, 2011. (pdf, 881 kB)
  • Method management system: rule-based method enactment using MediaWiki and semantic MediaWiki, D Taufan, 2011. (pdf, 5 MB)
  • Interactieve elementen in beeldschermexamens, R v Summeren, 2011. (pdf, 2,4 MB)
  • IOM2: innovation within an outsourcing relationship, B vd Linden, 2011. (pdf, 1,9 MB)
  • Informed consent in behavioral advertising, P v Bebber, 2011. (pdf, 1,1 MB)
  • Fuzzing the GSM protocol, B Hond, 2011. (pdf, 5,5 MB)
  • Functional debugging: rapid prototyping and debugging for DSLs using functional programming, A Gerritsen, 2011. (pdf, 869 kB)
  • Adaptive case management, K Strijbosch, 2011. (pdf, 4,8 MB)
  • Comparison of penetration testing tools for web applications, F vd Loo, 2011. (pdf, 885 kB)
  • Een business rules methode voor FCO-IM, M Alabbasy, 2011. (pdf, 5 MB)
  • Combining probabilistic relational models with object-role models, K Hulsman, 2011. (pdf, 2 MB)
  • Local approximation of centrality measures, M Hinne, 2011. (pdf, 305 kB)
  • Classifier-based search in large document collections, J Schuhmacher, 2011. (pdf, 480 kB)
  • Business process modeling as a means to bridge the business-IT divide, M Devillers, 2011. (pdf, 1,1 MB)
  • Audience segregation a solution to protect online privacy, T Holweg, 2011. (pdf, 1,4 MB)
  • GPU-based password cracking, M Sprengers, 2011. (pdf, 1,1 MB)
  • Towards an ICT framework for sustainable tourism, S v Hooft, 2011. (pdf, 1,4 MB)
  • Localization and mapping with autonomous robots, B Mader, 2011. (pdf, 3,3 MB)
  • Improving Wizard of Oz creation by applying game concepts, D Nabuurs, 2011. (pdf, 5,7 MB)
  • Strategy for the use of cloud computing, S de Bruijn, 2011. (pdf, 480 kB)
  • Data protection in the cloud, J de Muijnck-Hughes, 2011. (pdf, 850 kB)
  • Cross-site scripting voorkomen, R Ben Moussa, 2011. (pdf, 700 kB)
  • How to use the CAcert infrastructure within an OpenID context, B Derlagen, 2010. (pdf, 2,2 MB)
  • Credit cards versus iDeal, P v Leeuwen, 2010. (pdf, 933 kB)
  • Strongly typed BPMN, F vd Berg, 2010. (pdf, 4,5 MB)
  • Architectuur van digitale werkplaatsen, B Geijtenbeek, 2010. (pdf, 378 kB)
  • Protecting shared state in a multi-core world: a comparison between traditional locking and transactional memory, S Castelein, 2010. (pdf, 1,6 MB)
  • A method for durability analysis of development systems in computing, D vd Linden, 2010. (pdf, 410 kB)
  • Classical logic, control calculi and data types, R Krebbers, 2010. (pdf, 823 kB)
  • How action understanding can be rational, Bayesian and tractable, M Blokpoel, 2010. (pdf, 649 kB)
  • Verifying properties of RefactorErl-transformations using QuickCheck, E Deckers, 2010. (pdf, 936 kB)
  • Generating a rule-based modelling agenda, J Mutter, 2010. (pdf, 1,9 MB)
  • A tool for click data preprocessing, M Pieterse, 2010. (pdf, 843 kB)
  • The digital workshop in collaborative learning, D Pijper, 2010. (pdf, 2,3 MB)
  • Improving software development, M Schuts, 2010. (pdf, 3,1 MB)
  • Using QuickCheck and semantic analysis to verify correctness of Erlang refactoring transformations, E Jumpertz, 2010. (pdf, 507 kB)
  • Broader perception for local community identification, F Koopmans, 2010. (pdf, 342 kB)
  • Solving priority inversion in assembly machines for discrete semiconductors, L Nij Bijvank, 2010. (pdf, 1,1 MB)
  • Associatie analyse op profielen van sociale netwerksites, K Rosken, 2010. (pdf, 1 MB)
  • A graphical workflow editor for iTask, J Henrix, 2010. (pdf, 2,1 MB)
  • De rol van een editor, J Schoemaker, 2010. (pdf, 913 kB)
  • A flexible method for requirements engineering, P Arts, 2010. (pdf, 1,1 MB)
  • Catching and understanding GSM signals, F vd Broek, 2010. (pdf, 1,3 MB)
  • Architectuur analyse van de slimme meter, H v Bijnen, 2010. (pdf, 1,3 MB)
  • Design space exploration with generated timed automata, F Houben, 2010. (pdf, 922 kB)
  • Relief-based feature selection in bioinformatics, W Megchelenbrink, 2010. (pdf, 2,2 MB)
  • Verifying reentrant readers-writers, B v Gastel, 2010. (pdf, 1,6 MB)
  • Towards a modeling tool evaluation method, R Willems, 2010. (pdf, 581 kB)
  • Het toepassen van requirements management op enterprise-architectuur, C Schutter, 2010. (pdf, 3,7 MB)
  • Building iTask applications, S Michels, 2010. (pdf, 1,6 MB)
  • Communicatie van IT governance, M Tissink, 2010. (pdf, 2,6 MB)
  • Dutch EMV-cards and internet banking, M Schouwenaar, 2010. (pdf, 803 kB)
  • Principal component analysis and side-channel attacks, J Hogenboom, 2010. (pdf, 3 MB)
  • Formalism for a standard case management and its application on Scrum, D Oldenhave, 2010. (pdf, 2,6 MB)
  • Investigating domain model integration processes, A Vermeij, 2010. (doc, 1,3 MB)
  • Learning Bayesian models using mammographic features, N Radstake, 2010. (pdf, 2,7 MB)
  • Informatiebeveiliging in ziekenhuizen, D Hamelink, 2010. (pdf, 1,5 MB)
  • The value of enterprise architecture, B Kasteel, 2009. (pdf, 5,4 MB)
  • Tracking local community evolution, F Koopmans, 2009. (pdf, 278 kB)
  • Inference and abstraction of communication protocols, F Aarts, 2009. (pdf, 380 kB)
  • Massively parallel computing as a service, F Kusters, 2009. (pdf, 727 kB)
  • Learning models of communication protocols using abstraction techniques, J Uijen, 2009. (pdf, 432 kB)
  • Mobiele telefoon als betaalmiddel, M v Ede, 2009. (pdf, 1,5 MB)
  • Optimal deployment of distributed systems, M Moraal, 2009. (pdf, 1,6 MB)
  • Designing a game for basic process model elicitation, B Schotten, 2009. (pdf, 627 kB)
  • Propositions into a framework, M vd Tillaart, 2009. (pdf, 760 kB)
  • Playing archimate models, J Groenewegen, 2009. (pdf, 1,2 MB)
  • Een functionele aanpak voor taalcreatie en transformatie, B Lamers, 2009. (pdf, 450 kB)
  • Location based services, J Koppers, 2009. (pdf, 5,3 MB)
  • Using mobile phones for public transport payment, F Kooman, 2009. (pdf, 846 kB)
  • Wat valt er onder de EU richtlijn omtrent de bewaarplicht van verkeersgegevens, J Herregodts, 2009. (pdf, 1,2 MB)
  • Deploying the semantic web in the welfare environment, J Claessens, 2009. (pdf, 1,4 MB)
  • Applicatie classificatie bij fusies en overnames, E de Ruiter, 2009. (pdf, 1,4 MB)
  • Quality of information system negotiation processes, M Smith, 2009. (pdf, 813 kB)
  • Software metrics: het verband tussen de onderhoudbaarheid en het aantal bugs van software, P v Rens, 2009. (pdf, 1,2 MB)
  • Beveiliging van draadloze thuisnetwerken, Z Bajic, 2009. (pdf)
  • Risicomodellering in het medische domein, W Klomp, 2009. (pdf)
  • Operationeel risico modelleren, R Swinkels, 2009. (pdf)
  • Optimizing web interest, W Elbers, 2009. (pdf)
  • Rule-based BPM using the AREF modeling language, J Voesten, 2009. (pdf)
  • Monitoring the elderly using real time location sensing, E Crombag, 2009. (pdf)
  • Bewust zijn van het belang van informatiebeveiliging, A Suhonic, 2009. (pdf, 352 kB)
  • A strict-size logic for featherweight Java extended with update, R Kersten, 2009. (pdf, 1,9 MB)
  • Lean principles in case management, B Visser, 2009. (pdf, 5,2 MB)
  • Compliance towards the belastingdienst, J Akkermans, 2009. (pdf)
  • Uw dossiers, het ziekenhuis en het EPD, K Kluijtmans, 2009. (pdf, 1,2 MB)
  • Indoor localization in wireless sensor networks, M vd Goor, 2009. (pdf)
  • Een snel identificatie algoritme voor XML berichten, W Hoolwerf, 2009. (pdf)
  • Architectuurprincipes: functie en formulering, K v Boekel, 2009. (pdf)
  • Solving NP complete problems with memetic algorithms, M Ermers, 2009. (pdf)
  • A gaming approach to collaborative modelling, I Wilmont, 2009. (pdf)
  • The human firewall of behavioral information security, M Dam, K Wessels, 2009. (pdf)
  • Analysis of the MIFARE classic used in the OV-chipkaart project, G de Koning, 2009. (pdf, 1,1 MB)