Downloads


Zoeken
Sorteren op
Volgorde

Strategische Research Agenda IIP Veilig Verbonden (SRA) 2007
PRICE: Using process tracing to improve household IoT users’ privacy decisions NL
PRICE: Using process tracing to improve household IoT users’ privacy decisions
PRICE: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems NL
PRICE: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems
PRICE: Faster and Stronger Onion Routing (FASOR) NL
PRICE: Faster and Stronger Onion Routing (FASOR)
PRICE: Bridging Transparency Requirements Smartphone Ecosystem NL
PRICE: Bridging Transparency Requirements in Smartphone Ecosystems
PRICE: Bridging The Gap Between Theory and Practice in Data Privacy NL
PRICE: Bridging The Gap Between Theory and Practice in Data Privacy
NWO Summaries English.pdf
NWO Call for proposals Cyber Security 2012
Norforsk Summary NL project
NCSRA 2014 SBIR VCS ZiuZ
NCSRA 2014 SBIR Mobiele app identiteit InnoValor
NCSRA 2014 SBIR Cyberscan DIGINT
NCSRA 2014 SBIR Cybercheck Ic3dmedia
NCSRA 2014 SBIR Cybercheck Ic3dmedia
NCSRA 2014 SBIR CVI Coblue cybersecurity
NCSRA 2014 SBIR BYOS Intrinsic ID
NCSRA 2014 NWO-DHS Malware on smartphones collection analysis and defensive measures
NCSRA 2014 NWO-DHS IN-DEPTH DEFENSE OF SCADA AND INDUSTRIAL CONTROL SYSTEMS.pdf
NCSRA 2014 NWO Security Autonomous Response in programmable Networks
NCSRA 2014 NWO Secure Our Safety Building Cyber Security for Flood Management
NCSRA 2014 NWO Public-private actions against botnets establishing the legal boundaries
NCSRA 2014 NWO Patterns for Privacy.pdf
NCSRA 2014 NWO Own Your Own Identity
NCSRA 2014 NWO More secure SCADA networks through self-awarenes
NCSRA 2014 NWO Learning from Incidents
NCSRA 2014 NWO ESPRESSO
NCSRA 2014 NWO Distributed Denial of Service Defense protecting schools and other public organizations
NCSRA 2014 NWO Critical Infrastructure Protection through Cryptographic Incident Management
NCSRA 2012 SBIR Thales CyberDEW
NCSRA 2012 SBIR Sightes Threat Battle
NCSRA 2012 SBIR SIG cyber security toeval of design
NCSRA 2012 SBIR Infosecure Alert project
NCSRA 2012 SBIR Compumatica SecureBringYourOwnDevice
NCSRA 2012 SBIR Coblue Cybersecurity Secure Information Grid
NCSRA 2012 SBIR BusinessForensics Realtime monitoring
NCSRA 2012 SBIR Atos Een extra zintuig
NCSRA 2012 NWO Visualization and deep protocol analysis to detect cyber espionage and targeted malware
NCSRA 2012 NWO The personal information security assistant
NCSRA 2012 NWO Reputation Metrics Design to Improve Intermediary Incentives for Security
NCSRA 2012 NWO Re-Cover The Power of Obfuscation
NCSRA 2012 NWO Profiling for Optical Fault Induction using Location-dependent leakage
NCSRA 2012 NWO Privacy Compliance and Enforcement.pdf
NCSRA 2012 NWO OpenSesame opening backdoors on embedded devices
NCSRA 2012 NWO Learning Extended State Machines for Malware Analysis
NCSRA 2012 NWO Cyber Crime Offender Profiling The Human Factor Examined
Chist-era 2015 User-Centric Security, Privacy and Trust in the Internet of Things (SPTIoT)
Chist-era 2015 User empowerment for Security and prIvacy in Internet of Things (USEIT)
Chist-era 2015 SecUre aCCESSibility for the internet of things (SUCCESS)
Chist-era 2015 IDentification for the Internet Of Things (ID_IOT)
Chist-era 2015 Emotion psychology meets cyber security in IoT smart homes (Cocoon)

Zoeken
Sorteren op
Volgorde

Versnellingsagenda voor onderwijsinnovatie, VSNU Januari 2018
VenJ SKIA Brochure
TNO report: Innovating in cyber security 2017
Rapport Nederland digitaal droge voeten (Herna Verhagen)
Rapport Dutch Investments in ICT & Cybersecurity (HCSS)
Rapport Digitale Hygiëne Nederland
Organised Cybercrime in the Netherlands 2017
Opwaarderen. Borgen van publieke waarden in de digitale samenleving Rathenau Instituut, februari 2017
Opwaarderen Borgen van publieke waarden in de digitale samenleving Rathenau Instituut
NSCS One 2016 Cyber Security in Data Science
Netherlands Cyber Readiness at a Glance
NCSC One 2016 Dutch Science Agenda
Naar een veilig verbonden digitale samenleving, CSR Januari 2018
Knelpunten op de markt voor cyberveiligheid, CPB Januari 2018
KIA ICT
Interview Wilma van Dijk in IO Magazine september 2014
Initial position on the EU cybersecurity package ECSO Oktober 2017
Ieder bedrijf heeft digitale zorgplichten (CSR)
Handreiking cyber security voor smart energy, TKI Urban Energy Juli 2017
Ethische en juridische aspecten van informaticaonderzoek, KNAW 2017
ENISA: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU
Een nooit gelopen race-Rathenau Instituut
Een nooit gelopen race Rathenau Instituut, maart 2017
Dutch Investments in ICT & Cybersecurity HCSS 2017
Digital Society Research Agenda, VSNU November 2017
Cybersecurity monitor CBS 2017
Cybersecurity in the European Digital Single Market (EU SAM)
Cyber-OC – Scope and manifestations in EU member states
Agenda ‘The Human Factor in Cybercrime and Cybersecurity’
Advies Ethische en Juridische Aspecten van Informaticaonderzoek (KNAW)
Interim UK Cyber Security Science & Technology Strategy: Future-Proofing Cyber Security December 2017

Zoeken
Sorteren op
Volgorde

Versnellingsagenda voor onderwijsinnovatie, VSNU Januari 2018
VenJ SKIA Brochure
TRUe Cyber Security VT MSc Nijmegen Eindhoven
TNO report: Innovating in cyber security 2017
Summaries winners call for proposals Cyber Security Research 2014
Summaries winners call for proposals Cyber Security Research 2012
Summaries granted cyber security projects 2012
Strategische Research Agenda IIP Veilig Verbonden (SRA) 2007
SENTINELS PROJECT VRIEND
SENTINELS PROJECT VISPER
SENTINELS PROJECT SMobile
SENTINELS PROJECT SEDAN
SENTINELS PROJECT Secure metering
SENTINELS PROJECT Revocable privacy
SENTINELS PROJECT Probite
SENTINELS PROJECT PINPAS JC
SENTINELS PROJECT PEARL
SENTINELS PROJECT PASC
SENTINELS PROJECT MobileIDM
SENTINELS PROJECT Kindred Spirits
SENTINELS PROJECT JASON
SENTINELS PROJECT IPID
SENTINELS PROJECT DeWorm
SENTINELS PROJECT CREST
Security and Network Engineering SNE VTDT MSc Amsterdam
Rapport Nederland digitaal droge voeten (Herna Verhagen)
Rapport Dutch Investments in ICT & Cybersecurity (HCSS)
Rapport Digitale Hygiëne Nederland
Radboud VT MSc Security & Privacy Nijmegen
PRICE: Using process tracing to improve household IoT users’ privacy decisions NL
PRICE: Using process tracing to improve household IoT users’ privacy decisions
PRICE: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems NL
PRICE: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems
PRICE: Faster and Stronger Onion Routing (FASOR) NL
PRICE: Faster and Stronger Onion Routing (FASOR)
PRICE: Bridging Transparency Requirements Smartphone Ecosystem NL
PRICE: Bridging Transparency Requirements in Smartphone Ecosystems
PRICE: Bridging The Gap Between Theory and Practice in Data Privacy NL
PRICE: Bridging The Gap Between Theory and Practice in Data Privacy
Organised Cybercrime in the Netherlands 2017
Opwaarderen. Borgen van publieke waarden in de digitale samenleving Rathenau Instituut, februari 2017
Opwaarderen Borgen van publieke waarden in de digitale samenleving Rathenau Instituut
NWO Summaries English.pdf
NWO Call for proposals Cyber Security 2012
NSCS One 2016 Cyber Security in Data Science
Norforsk Summary NL project
Noodplan Versterking Capaciteit bijlage 2 overzicht
Noodplan Versterking Capaciteit bijlage 1 steunbetuigingen
Noodplan Versterking Capaciteit (brief)
Netherlands Cyber Readiness at a Glance
NCSRA 2014 SBIR VCS ZiuZ
NCSRA 2014 SBIR Mobiele app identiteit InnoValor
NCSRA 2014 SBIR Cyberscan DIGINT
NCSRA 2014 SBIR Cybercheck Ic3dmedia
NCSRA 2014 SBIR Cybercheck Ic3dmedia
NCSRA 2014 SBIR CVI Coblue cybersecurity
NCSRA 2014 SBIR BYOS Intrinsic ID
NCSRA 2014 NWO-DHS Malware on smartphones collection analysis and defensive measures
NCSRA 2014 NWO-DHS IN-DEPTH DEFENSE OF SCADA AND INDUSTRIAL CONTROL SYSTEMS.pdf
NCSRA 2014 NWO Security Autonomous Response in programmable Networks
NCSRA 2014 NWO Secure Our Safety Building Cyber Security for Flood Management
NCSRA 2014 NWO Public-private actions against botnets establishing the legal boundaries
NCSRA 2014 NWO Patterns for Privacy.pdf
NCSRA 2014 NWO Own Your Own Identity
NCSRA 2014 NWO More secure SCADA networks through self-awarenes
NCSRA 2014 NWO Learning from Incidents
NCSRA 2014 NWO ESPRESSO
NCSRA 2014 NWO Distributed Denial of Service Defense protecting schools and other public organizations
NCSRA 2014 NWO Critical Infrastructure Protection through Cryptographic Incident Management
NCSRA 2012 SBIR Thales CyberDEW
NCSRA 2012 SBIR Sightes Threat Battle
NCSRA 2012 SBIR SIG cyber security toeval of design
NCSRA 2012 SBIR Infosecure Alert project
NCSRA 2012 SBIR Compumatica SecureBringYourOwnDevice
NCSRA 2012 SBIR Coblue Cybersecurity Secure Information Grid
NCSRA 2012 SBIR BusinessForensics Realtime monitoring
NCSRA 2012 SBIR Atos Een extra zintuig
NCSRA 2012 NWO Visualization and deep protocol analysis to detect cyber espionage and targeted malware
NCSRA 2012 NWO The personal information security assistant
NCSRA 2012 NWO Reputation Metrics Design to Improve Intermediary Incentives for Security
NCSRA 2012 NWO Re-Cover The Power of Obfuscation
NCSRA 2012 NWO Profiling for Optical Fault Induction using Location-dependent leakage
NCSRA 2012 NWO Privacy Compliance and Enforcement.pdf
NCSRA 2012 NWO OpenSesame opening backdoors on embedded devices
NCSRA 2012 NWO Learning Extended State Machines for Malware Analysis
NCSRA 2012 NWO Cyber Crime Offender Profiling The Human Factor Examined
NCSC One 2016 Dutch Science Agenda
Nationale Cyber Security Strategie 2 (NCSS2, 2013)
National Cyber Security Research Agenda III (NCSRA III) 2018
National Cyber Security Research Agenda II (NCSRA II) 2013
National Cyber Security Research Agenda (NCSRA) 2010
Naar een veilig verbonden digitale samenleving, CSR Januari 2018
Knelpunten op de markt voor cyberveiligheid, CPB Januari 2018
KIA ICT
Juryreport DCSRP Award 2018
Juryreport DCSRP Award 2017
Juryreport DCSR Award 2015
IO Magazine interview Bibi van den Berg Oktober 2018
Interview Wilma van Dijk in IO Magazine september 2014
Interview Willem Jonker Voorzitter Sentinels Augustus 2012
Interview Sandro Etalle MobileIDM + PEARL, Sentinels Augustus 2012
Interview Sandro Etalle met 2011 I/O Magazine
Interview Patricia Zorko in IO magazine juli 2016
Interview Michel van Eeten & Tyler Moore I/O Magazine juni 2014
Interview Mathieu Goudsmits Piratenjacht Sentinels Augustus 2012
Interview Marleen Weulen Kranenbarg | Jaap-Henk Hoepman | Samaneh Tajalizadehkhoob Hypothese december 2015
Interview Jaya Baloo in IO Magazine september 2014
Interview Inald Lagendijk Kindred Spirits, Sentinels Augustus 2012
Interview Herbert Bos en Wim Hafkamp I/O Magazine december 2013
Interview Herbert Bos en Bart Jacobs IO Magazine Maart 2012
Interview Herbert Bos DeWorm in Sentinels September 2012
Interview Frank van Viegen Paiq in Sentinels September 2012
Interview Erik Poll JASON + PINPASJC, Sentinels Augustus 2012
Interview Douglas Maughan IO Magazine Juni 2013
Interview Cees de Laat Leon Gommans IO Magazine juni 2015
Interview Anuradha Annaswamy | Terry Benzel | Benessa Defend IO Magazine december 2015 (EN)
Initial position on the EU cybersecurity package ECSO Oktober 2017
Infrastructuur en Security Management VT BSc Arnhem
IIPVV Cyber hoogtepunten 2015 (beeldverslag)
IIPVV Cyber hoogtepunten 2014 (beeldverslag)
Ieder bedrijf heeft digitale zorgplichten (CSR)
ICT & Management and Security BSc VTDT Eindhoven
ICT & Cyber Security VTDT BSc Fontys ICS
HR Technische Informatica VT BSc Rotterdam
HHS Information Security Management ISM VT BSc Den Haag
Handreiking cyber security voor smart energy, TKI Urban Energy Juli 2017
Forensische ICT VT BSc Leiden
Executive master’s programme Cyber Security DT MSc Den Haag
Ethische en juridische aspecten van informaticaonderzoek, KNAW 2017
ENISA: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU
Een nooit gelopen race-Rathenau Instituut
Een nooit gelopen race Rathenau Instituut, maart 2017
Dutch Investments in ICT & Cybersecurity HCSS 2017
Digital Society Research Agenda, VSNU November 2017
dcypher Magazine 2018 nr 2 (in English)
dcypher Magazine 2018 nr 2 (in dutch)
dcypher Magazine 2017 nr 1 (in dutch)
dcypher Highlights 2017
dcypher Highlights 2016
DCSRA 2016 winner 'Protocol state fuzzing of TLS implementations'
Cybersecurity monitor CBS 2017
Cybersecurity in the European Digital Single Market (EU SAM)
Cyber-OC – Scope and manifestations in EU member states
Cyber Security VT 4TU
Cyber Security Technology VT BSc Den Haag
Cyber Security specialisatie VT BSc Nijmegen Eindhoven
Cyber security leerroute VT BSc Amsterdam
Cyber Security DT BSc Utrecht Maastricht
Computer Systems Security VT MSc VU + UVA Amsterdam
Computer Systems Security VT MSc Amsterdam
Chist-era 2015 User-Centric Security, Privacy and Trust in the Internet of Things (SPTIoT)
Chist-era 2015 User empowerment for Security and prIvacy in Internet of Things (USEIT)
Chist-era 2015 SecUre aCCESSibility for the internet of things (SUCCESS)
Chist-era 2015 IDentification for the Internet Of Things (ID_IOT)
Chist-era 2015 Emotion psychology meets cyber security in IoT smart homes (Cocoon)
Artikel Seaside Matchmaking Cybersecurity 2016
Agenda ‘The Human Factor in Cybercrime and Cybersecurity’
Advies Ethische en Juridische Aspecten van Informaticaonderzoek (KNAW)
Abstracts projects cooperation NWO-DHS 2014
Juryreport DCSR Award 2016
Interim UK Cyber Security Science & Technology Strategy: Future-Proofing Cyber Security December 2017