Ontwikkelen van interactieve malware voor phishing
Job Bakker (Student)
Cybercrisis bij gemeenten
S. Ebbers (Onderzoeker); J. Koch (Lid Lectoraat); Jurjen Jansen (Onderzoeker); J. (Jelle) Groenendaal (Onderzoeker); Willem Bantema (Onderzoeker); E.R. (Rutger) Leukfeldt (Lector)
Developing decision support for cybersecurity threat and incident managers
Rick van der Kleij (Lid Lectoraat); Jan Maarten Schraagen (Onderzoeker)
How to become innovative: measuring and improving innovative development
Hani Al-Ers (Lid Lectoraat); Tim Cocx (Onderzoeker); Joost Verschuuren (Student); Jonathan Lindeborg (Student); Alarico van der Ham (Student)
Information security education based on job profiles and the e-CF
M.E.M. (Marcel) Spruit (Lector)
Flight Performance Analysis of the Samad Attack Drones Operated by Houthi Armed Forces
Mark Voskuijl; Thomas Dekkers; Ralph Savelsberg
Deterrence, Resilience, and the Shooting Down of Flight MH17
Cees van Doorn; Th.B.F.M. Brinkel
Verkenning best practices cybersecurity informatiedeling
Luuk Bekkers (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
Criminal persuasion techniques versus sharing personal information
Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat)
The factors that determine the degree of women's participation in the military
Naomi Faasse (Student)