On usage control in relational database management systems: obligations and their enforcement in joining datasets
M.S. Bargh (Lector); M. Vink; R. Choenni (Lector)
Beware of Branding Someone a Terrorist: Local Professionals on Person-Specific Interventions to Counter Extremism
Josien Roodnat; Quirine Eijkman (Lector)
UN Peacekeeping Intelligence
S.J.H. Rietjens; E.J. de Waard
Jamming and spoofing
Barend Lubbers; Eric Theunissen; Patrick Oonincx
Military-civilian personnel
M. D. Andres; J.M.L.M. Soeters
De cybersecurity gerelateerde informatie-uitwisseling
S.L.J. van Sommeren (Student); A.A. Bakker; E.C. van den Heuvel
Counterterrorism in the European Union
Heleen van Weers (Student); Rebekah Tromble
Factoren van interesse in hosted services
Ernst ten Haaf (Begeleider); Remco van Rhijn (Student)
Detecting Deception using MCI in Twitter
Barthen, J (Jip) (Student); Mol, SA (Stefan) (Student)
Promote end-users compliance to the Information Security Policy
Bas van Gils (Begeleider); Peter Straver (Student)