SERA: A study into the different elements of data collection in cars
Ben Pyman (Onderzoeker); Rakshith Kusumakar (Onderzoeker); Moksheeth Padarthy (Onderzoeker); Wouter van Haaften (Onderzoeker)
Responding to radicalisation through education
Sieckelinck, Stijn (Lectoraat Youth Spot); Stephens, William; Busher, Joel; Malkki, Leena; Marsden, Sarah
Cyber-enabled Influence Operations
P.A.L. Ducheine; Peter Schrijver
Protecting your business against ransomware attacks?
E.R. (Rutger) Leukfeldt (Lector); Luuk Bekkers (Lid Lectoraat); Susanne van 't Hoff-de Goede (Lid Lectoraat); Ellen Misana-ter Huurne; Ynze van Houten; Remco Spithoven
Holistic Cybersecurity for Businesses: A Comprehensive Guide
Hani Al-Ers (Lid Lectoraat)
The possibility of replacing stones with mycliume composites
Sherif Ghaly (Student); Vana Tsimopoulou (Docent)
Alerting Consciences to Reduce Cybercrime
Asier Moneva (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lid Lectoraat); Wouter Klijnsoon (Onderzoeker)
Exploring Human and Environmental Factors that Make Organizations Resilient to Social Engineering Attacks
Michelle Ancher (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); Erbilcan Aslan (Student)
Exploring Human and Environmental Factors that Make Organizations Resilient to Social Engineering Attacks
Michelle Ancher (Lid Lectoraat)
The attack and defense on aircraft trajectory prediction algorithms
van Iersel, Quincy G.; Murrieta-Mendoza, Alejandro; Patrón, Roberto S.Félix; Hashemi, Seyed M.; Botez, Ruxandra Mihaela