Report on requirements for the re-design of interfaces
Mischa Corsius; Jasper Jeurens; Vera Lange
Application of Yolov8 and Detectron2 for Bullet Hole Detection and Score Calculation From the Shooting Cards
Marya Butt (Onderzoeker); Ander de Keijzer (Lector); Jaimy Monsuur (Student); Ruben Stoop (Student); Nick Glas (Student)
Testen en oefenen ter verbetering van informatiebeveiliging bij provincies, gemeenten en waterschappen
M.E.M. (Marcel) Spruit (Lector); Emiel Kerpershoek (Lid Lectoraat)
Effectiviteit en ervaringen van de SMILES' Workshops
E. I. (Elke) Müller (Lid Lectoraat); Anne - Katelijne Rotteveel (Onderzoeker)
Repeat victimization by website defacement
Asier Moneva (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector); Steve van de Weijer (Onderzoeker)
The tensions of cyber-resilience: From sensemaking to practice
E.R. (Rutger) Leukfeldt (Lector); Benoît Dupont (Onderzoeker); Clifford Shearing (Onderzoeker); Marilyne Bernier (Onderzoeker)
An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention
Jim Schiks (Lid Lectoraat); Susanne van 't Hoff-de Goede (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
Cybercrime during the COVID-19 pandemic
Steve van de Weijer (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector); Asier Moneva (Lid Lectoraat)
Cybercriminal networks in the UK and Beyond
E.R. (Rutger) Leukfeldt (Lector); Jonathan Lusthaus; Edward Kleemans; Michael Levi; Thomas Holt
Protecting your business against ransomware attacks?
E.R. (Rutger) Leukfeldt (Lector); Luuk Bekkers (Lid Lectoraat); Susanne van 't Hoff-de Goede (Lid Lectoraat); Ellen Misana-ter Huurne; Ynze van Houten; Remco Spithoven