All NCSRA projects
SBIR Cyber Security Research (2022)
Open Source Encryption Research (2021)
Cyber Security – Towards a secure and trustful digital domain (NWO NWA) (2021)
Link to project information on the NWO website
- THESEUS : Making patching happen
(Prof. M.J.G. (Michel) van Eeten – TU Delft) - CATRIN – Controllable, Accountable, Transparent: the Responsible Internet
(Dr R. (Ralph) Holz – University of Twente) - C-SIDe – Cyber Security by Integrated Design
(Dr E. (Els) de Busser – Leiden University) - HAPKIDO: Hybrid Approach for quantum-safe Public Key Infrastructure Development for Organisations
(Dr G. (Gabriele) Spini – TNO) - PROACT: Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market
(Prof. N. (Nele) Mentens – Leiden University)
Take Off special (2020)
NWO NWA ORC (2019)
Project summary
Concordia Network (2019)
CyberSec4Europe (2018)
Cyber Security Digitale Veiligheid & Privacy (NWO Topsectoren) (2018)
Links to project information on the NWO website/project summary in pdf
- Dr. L. Allodi (TU/e), SeReNity
- Dr. ing. C. Hernandez Ganan (TUD), RAPID
- Prof. dr. J.L. Hurink (UT), ISoLATE
- Prof. dr. B.P.F. Jacobs (RUN), E4A
- Dr. A. Peter (UT), SHARE
- Dr. S.P. Picek (TUD), DISTANT
- Prof. dr. P.W.H. Pinkse (UT), SMOKE
- Prof. dr. Ir. A. Pras (UT), UPIN
- Dr. B. Skoric (TU/e), FORWARDT
- Dr. A. Sperotto (UT), MASCOT
DHS-MinV&J-NWO Cyber Security Research (2018)
Project summaries in pdf
- PAADDOS: Planning Anycast for Anti-DDoS
- TROPICS: Timely and RObust Patching of Industrial Control Systems
- MADDVIPR: Mapping DNS DDoS Vulnerabilities to Improve Protection and Prevention
- MINIONS: MitigatINg IOt-based DDoS attacks via DNS
- DEPICT: DEep Packet Intelligence for industrial ConTrol systems
SBIR Cyber Security Research III (2017)
Project samenvatting in pdf
Nord Forsk (with ESRC, 2016)
Project summaries in pdf
PRICE (NWO met NSF, 2016)
Project summaries in pdf
- Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US
- Transparency Bridges: Bridging Transparency Requirements in Smartphone Ecosystems
- Bridging The Gap Between Theory and Practice in Data Privacy
- Using process tracing to improve household IoT users’ privacy decisions
- Faster and er Onion Routing (FASOR)
Chist-ERA (EU, NL bijdragen, 2015)
Project summaries in pdf
- SecUre aCCESSibility for the internet of things (SUCCESS)
- Emotion psychology meets cyber security in IoT smart homes (Cocoon)
- IDentification for the Internet Of Things (ID_IOT)
- User empowerment for Security and prIvacy in Internet of Things (USEIT)
NWO Cyber Security Research II (2014)
Project summaries in pdf
- Critical Infrastructure Protection through Cryptographic Incident Management
- Distributed Denial of Service Defense protecting schools and other public organizations
- ESPRESSO
- Learning from Incidents
- More secure SCADA networks through self-awarenes
- Own Your Own Identity
- Pattern for Privacy
- Public-private actions against botnets establishing the legal boundaries
- Secure Our Safety Building Cyber Security for Flood Management
- Security Autonomous Response in programmable Networks
- SEcurity RequIrements for seriOUS apps
SBIR Cyber Security Research II (2014)
Project summaries in pdf
- Coblue: Cryptovaluta-inlichtingen
- IC3D Media: Cybercheck
- Digital Intelligence Group: Cyberscan
- Intrinsic-ID – Bring Your Own Device
- Innovalor: een mobiele app voor identiteitsvaststelling
- Ziuz Forensics: Visuele Clearing Service
DHS-MinV&J-NWO Cyber Security Research (2013)
Project summaries in pdf
- Malware onsmartphones collection analysis and defensive measures
- Increasing the impact of voluntary action against cybercrime
- In-depth defense of SCADA and industrial control systems
NWO Cyber Security Research I (2012)
Project summaries in pdf
- Learning Extended State Machines for Malware Analysis
- OpenSesame opening backdoors on embedded devices
- Privacy Compliance and Enforcement
- Profiling for Optical Fault Induction using Location-dependent leakage
- Re-Cover The Power of Obfuscation
- Reputation Metrics Design to Improve Intermediary Incentives for Security
- The personal information security assistant
- Cyber Crime Offender Profiling The Human Factor Examined
- Visualization and deep protocol analysis to detect cyber espionage and targeted malware
SBIR Cyber Security Research I (2012)
Project summaries in pdf