Searched for: contributor%3A%22van+Eeten%2C+M.J.G.+%28mentor%29%22
(1 - 20 of 35)

Pages

document
van Gend, Thijmen (author)
Privacy-enhancing technologies (PETs) have historically been used for safeguarding individual privacy from both public and private interference. But lately, tech companies have started using PETs as one instrument for the expansion of their power over different actors, as appears to be unfolding in the case of Amazon’s Sidewalk service: a United...
master thesis 2024
document
Pulles, Annemijn (author)
Due to the increasing use of Internet-of-Things (IoT) devices people have created an entirely new digital world for themselves. However, the security and privacy risk in this world are emerging. People using smart devices for everything in their lives are not realising that every interaction is collected and stored in databases. This study has...
master thesis 2022
document
Veelers, Rozemarijn (author)
Mixing services try to distort cash flow tracking of cryptocurrencies and obfuscate the origin of customers’ earnings by substituting customers’ cryptocurrency funds with the funds of other customers or the mixers’ private assets. This quality makes mixing services interesting for money laundering, and they are therefore often used by criminals....
master thesis 2022
document
Fukkink, Max (author)
As the IoT is widely deployed in people’s homes, adversaries are busy exploiting the vulnerabilities of these devices. One kind of such device is the NAS device made by the company QNAP. Unfortunately, these devices are prone to the QSnatch malware. Unlike previous malware such as Mirai has this nasty habit, it settles deeper into the machine....
master thesis 2021
document
Su, Kevin (author)
To protect critical services in today's society it is necessary to mitigate and prevent risks threatening the reliability of the internet. Internet-of-Things (IoT) devices are the number one attack target on the internet. The situation will become worse as there will be an expected 40 billion IoT devices in 2025. IoT bot activity represented 78%...
master thesis 2021
document
Rutten, Marie Sam (author)
This study aims to make recommendations about how the Internet can be more thoroughly cleaned of Child Sexual Abuse Material (CSAM), focusing on the Dutch government policies. In the past years, several organizations, including the European Commission, called out the Netherlands for the role Dutch companies have in the hosting of CSAM. According...
master thesis 2021
document
van Baren, Rutger (author)
Cybersecurity is important to hospitals and patients alike and is becoming more important as healthcare is experiencing more cybercrime over time. It is the result of complex interactions between actors and their environment during procurement, but research has not yet studied the combination of cybersecurity, healthcare and procurement together...
master thesis 2021
document
Bouwmeester, Brennen (author)
The increasingly important availability of online services is constantly threatened by malicious software such as botnets. Attackers have gained power through devices that are part of the rising Internet of Things (IoT), mostly through infections caused by Mirai. The botnets created by Mirai are used for the purpose of DDoS attacks, which can...
master thesis 2020
document
Vetrivel, Swaathi (author)
master thesis 2020
document
Grapperhaus, Valentijn (author)
The thesis reconstructed and analysed transaction-level data of a particular darknet market. Moreover, the thesis reveals what kind of vendors are active on this darknet market, based on their characteristics. Finally, this research identified what the relative importance is of different vendor characteristics for vendor performance on darknet...
master thesis 2019
document
Hagenaars, Kay (author)
The information security (IS) risk assessment process is an essential part to organisation's their protection of digital assets. However, the fast changing IS environment causes for limited knowledge of eventualities, dependencies and values of systems and phenomena. Consequently, the IS risk assessment process is depending on the judgment of...
master thesis 2019
document
Bouwman, Xander (author)
Organizations benefit from improved cybersecurity threat detection capabilities if they share information in a community of their peers. However, organizations are unlikely to share the sensitive information that is most valuable as this poses individual risks. Information sharing in cybersecurity communities therefore forms a collective action...
master thesis 2018
document
Samuel Natalius, Samuel (author)
Understanding target selection is a step before making a suitable proactive measure to address the complex issue of banking malware in online banking landscape. Despite several previous studies, gaps in the research of target selection are still present like the lack of attention to the non-targeted entities, the presence of other potential...
master thesis 2018
document
Turcios Rodriguez, Elsa (author)
Tracking is a pervasive mechanism across the web which is capable to trace and collect users’ online data. One of the most widely used mechanisms for tracking are cookies, and they are used to deliver online behavioral advertisement. Since these mechanisms pose a threat to privacy, the E-Privacy Directive was created as the regional legal...
master thesis 2018
document
Rieff, Iris (author)
master thesis 2018
document
Baltoglou, M.I. (author)
master thesis 2017
document
Galeano Galván, M.L. (author)
Research Problem Energy projects are developed and executed in a complex network of interconnected actors, whom depend on each other’s resources for reaching their individual interests and goals with regard to the project. These actors have a diversity of values (convictions or beliefs of what is worth striving for society to be good),...
master thesis 2016
document
Breukers, Y.P. (author)
Software vulnerabilities are a major enabler for cyberattacks, and are therefore responsible for a sizeable portion of the risk for large organisations in cyberspace. Little research has been done on the dynamics underlying this risk. The goal of this paper is to find how organisations and software vendors can influence the overall risk level as...
master thesis 2016
document
Van Mechelen, W. (author)
master thesis 2016
document
Van Moorsel, D.P. (author)
master thesis 2016
Searched for: contributor%3A%22van+Eeten%2C+M.J.G.+%28mentor%29%22
(1 - 20 of 35)

Pages