A study of preventing email (spear) phishing by enabling human intelligence
N. Stembert (Onderzoeker); A. Padmos (Onderzoeker); M.S. Bargh (Lector); R. Choenni (Lector); F. Jansen
Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations
M.E.M. (Marcel) Spruit (Lector); Pieter Burghouwt; Henk Sips
Adding Reconfiguration to an Agile Agent Based Production Grid
Leo van Moergestel (Lid Lectoraat); Daniël Telgen (Lid Lectoraat); Laurens van den Brink (Onderzoeker); John-Jules Meyer
The enigma of context within network-centric environments
A.F. van Lier (Lector)
Bitcoin 2.0: Maatschappelijke implicaties
A.J. (Arent) Roggeveen (Docent)
Awareness of the threats of phishing amongst SMEs in The Netherlands
Nicolette E. Groenewold (Student); W.M.J. van Leeuwen (Begeleider)
Qualification for information security professionals
M.E.M. (Marcel) Spruit (Lector); Fred van Noord
Besluitvorming bij cyberoperaties
P.A.L. Ducheine; Kraesten Arnold
The notion of cyber operations
P.A.L. Ducheine
Website blocking: evolution or revolution?
E.M. (Ellen) Wesselingh (Lid Lectoraat)






























