Alle NCSRA projecten
SBIR Cyber Security Research (2022)
Open Source Encryptie Onderzoek (2021)
Cyber Security – Towards a secure and trustful digital domain (NWO NWA) (2021)
Link naar projectinformatie op NWO website
- THESEUS : Making patching happen
(Prof. M.J.G. (Michel) van Eeten – TU Delft) - CATRIN – Controllable, Accountable, Transparent: the Responsible Internet
(Dr R. (Ralph) Holz – University of Twente) - C-SIDe – Cyber Security by Integrated Design
(Dr E. (Els) de Busser – Leiden University) - HAPKIDO: Hybrid Approach for quantum-safe Public Key Infrastructure Development for Organisations
(Dr G. (Gabriele) Spini – TNO) - PROACT: Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market
(Prof. N. (Nele) Mentens – Leiden University)
Take Off speciaal (2020)
NWO NWA ORC (2019)
Project samenvatting
Concordia Network (2019)
CyberSec4Europe (2018)
Cyber Security Digitale Veiligheid & Privacy (NWO Topsectoren) (2018)
Links naar projectinformatie op NWO website/ project samenvatting in pdf
- Dr. L. Allodi (TU/e), SeReNity
- Dr. ing. C. Hernandez Ganan (TUD), RAPID
- Prof. dr. J.L. Hurink (UT), ISoLATE
- Prof. dr. B.P.F. Jacobs (RUN), E4A
- Dr. A. Peter (UT), SHARE
- Dr. S.P. Picek (TUD), DISTANT
- Prof. dr. P.W.H. Pinkse (UT), SMOKE
- Prof. dr. Ir. A. Pras (UT), UPIN
- Dr. B. Skoric (TU/e), FORWARDT
- Dr. A. Sperotto (UT), MASCOT
DHS-MinV&J-NWO Cyber Security Research (2018)
Project samenvattingen in pdf
- PAADDOS: Planning Anycast for Anti-DDoS
- TROPICS: Timely and RObust Patching of Industrial Control Systems
- MADDVIPR: Mapping DNS DDoS Vulnerabilities to Improve Protection and Prevention
- MINIONS: MitigatINg IOt-based DDoS attacks via DNS
- DEPICT: DEep Packet Intelligence for industrial ConTrol systems
SBIR Cyber Security Research III (2017)
Project samenvatting in pdf
Nord Forsk (with ESRC, 2016)
Project samenvatting in pdf (Engels)
PRICE (NWO met NSF, 2016)
Project samenvattingen in pdf (Engels)
- Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US
- Transparency Bridges: Bridging Transparency Requirements in Smartphone Ecosystems
- Bridging The Gap Between Theory and Practice in Data Privacy
- Using process tracing to improve household IoT users’ privacy decisions
- Faster and er Onion Routing (FASOR)
Chist-ERA (EU, NL bijdragen, 2015)
Project samenvattingen in pdf (Engels)
- SecUre aCCESSibility for the internet of things (SUCCESS)
- Emotion psychology meets cyber security in IoT smart homes (Cocoon)
- IDentification for the Internet Of Things (ID_IOT)
- User empowerment for Security and prIvacy in Internet of Things (USEIT)
NWO Cyber Security Research II (2014)
Project samenvattingen in pdf (Engels)
- Critical Infrastructure Protection through Cryptographic Incident Management
- Distributed Denial of Service Defense protecting schools and other public organizations
- ESPRESSO
- Learning from Incidents
- More secure SCADA networks through self-awarenes
- Own Your Own Identity
- Pattern for Privacy
- Public-private actions against botnets establishing the legal boundaries
- Secure Our Safety Building Cyber Security for Flood Management
- Security Autonomous Response in programmable Networks
- SEcurity RequIrements for seriOUS apps
SBIR Cyber Security Research II (2014)
Project samenvattingen in pdf
- Coblue: Cryptovaluta-inlichtingen
- IC3D Media: Cybercheck
- Digital Intelligence Group: Cyberscan
- Intrinsic-ID – Bring Your Own Device
- Innovalor: een mobiele app voor identiteitsvaststelling
- Ziuz Forensics: Visuele Clearing Service
DHS-MinV&J-NWO Cyber Security Research (2013)
Project samenvattingen in pdf (Engels)
- Malware onsmartphones collection analysis and defensive measures
- Increasing the impact of voluntary action against cybercrime
- In-depth defense of SCADA and industrial control systems
NWO Cyber Security Research I (2012)
Project samenvattingen in pdf (Engels)
- Learning Extended State Machines for Malware Analysis
- OpenSesame opening backdoors on embedded devices
- Privacy Compliance and Enforcement
- Profiling for Optical Fault Induction using Location-dependent leakage
- Re-Cover The Power of Obfuscation
- Reputation Metrics Design to Improve Intermediary Incentives for Security
- The personal information security assistant
- Cyber Crime Offender Profiling The Human Factor Examined
- Visualization and deep protocol analysis to detect cyber espionage and targeted malware
SBIR Cyber Security Research I (2012)
Project samenvattingen in pdf