Bachelor's Theses

On this page we present links to the bachelor's theses that have been produced by students of Computing Science and students of Informational Sciences at the Radboud University.

2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006


  1. Alessandra van Veen: Cookie Compliance of Dutch Hospital Websites
  2. Amber Pater: Pumping Lemma for Deterministic Weighted Automata
  3. Astrid van der Jagt: Extending context-free grammars with conjunction and negation
  4. Bart Hofman: Automated Malware Attribution - Using machine learning on binaries
  5. Bart Janssen: Incorporating Computational Thinking in Calculus lessons - a Characterisation of Algorithmic Thinking and Generalisation Skills
  6. Bram Pulles: Analysis of Akari
  7. Cas Haaijman: Axiomatising Trace Semantics for an Algebra with Parallel Composition
  8. Daan Derks: Separating the Heartbeats of Twins during Pregnancy using Random Forest
  9. Denise Verbakel: Influence of Design on Differential and Linear Propagation Properties of Block Cipher Family Skinny
  10. Evgeniya Ovchinnikova: Implementation of Integer Addition on a Spiking Neural Network
  11. Ferran van der Have: The X3DH Protocol - A Proof of Security
  12. Gerhard van der Knijff: Solving and generating puzzles with a connectivity constraint
  13. Jordy Aaldering: A new semantics for array programming languages - how to introduce some laziness without being lazy
  14. Julius Landsman: Analysis of Confined Blocks World
  15. Kirsten Hagenaars: Using Equations to Define Non-Structurally Recursive Functions in Coq
  16. Koen Verdenius: A POMDP model for safety-critical systems and its deteriorating sensors
  17. Lars Jeurissen: E-mail phishing prevention proposal - CEPP
  18. Lisa Hoek: Web classification using DMOZ
  19. Lisa Kalse: Supply of and Demand for Information Regarding Update Support when Buying Smartphones
  20. Mathieu Bangma: ECDSA Based 2FA in the Browser
  21. Maurice Dibbets: Discovery of information disclosure vulnerabilities in the software development process
  22. Maxim van Loo: Automating the Light Switch
  23. Menno Bartels: Closure Properties of Nominal Languages under Substitutions
  24. Michiel Philipse: Distributed Knowledge Proofs in the Coq Proof Assistant
  25. Michiel Verloop: A Critical Review - Exploring Optimization Strategies in Board Game Abalone for Alpha-Beta Search
  26. Mike Schopman: Validating the accuracy of the MaxMind GeoLite2 City database
  27. Mitchel Jansen: Recognising Client-side Behavioral Detection of Web Bots
  28. Niels van Harten: Generating Mutation Operators for a Search-Based Model-Driven Implementation of the Next Release Problem
  29. Onno de Gouw: Mutual privacy and good manners on the social web
  30. Paolo Scattolin: A proposal for the use of Attack Trees in a semi-formal framework for modelling attacks and tolerance solutions with Petri Nets
  31. Patrick Lodeweegs: Approaches to stateful fuzzing of the IRC protocol
  32. Reinier Sanders: To Click Or Not To Click - A User Study on Phishing Click-Through Rates in Instant Messaging Applications
  33. Roland Leferink: Search personalization on
  34. Stefan Popa: You Have Been Previewed - Information Leaks of Content Previews in Mobile Messengers
  35. Steven Bronsveld: Transducer Degrees
  36. Steven Maarse: Coupled transformation of feature models and domain models for software product lines
  37. Suzan Erven: Fusible Numbers and the Provability of Computability
  38. Tijn Berns: Exploring Unlearnable Examples
  39. Tom Aarsen: Implementation Evaluation and Comparison of Python Modules implementing Morphological Analysis and Generation
  40. Willem Lambooy: Linearly and arboreally stackable quantum-dot cellular automata and their discrete simulation
  41. Wouter Damen: Generating Kick Drum Samples with Neural Networks
  42. Wouter van Battum: Using IRMA as an authentication method for eduVPN


  1. Abe Heemskerk: Introducing Programming in Primary Education - A Review of Scientific Literature
  2. Arie-Jan Kruijsse: Online verificatie van leeftijd en gezag
  3. Arne Diehl: Cognitive Psychology For Black Box Models - On Holistic And Featural Face Processing in Neural Networks
  4. Auke Zeilstra: An exploration of static analysis used on C cryptography libraries
  5. Bart Pleiter: Fuzzing Wi-Fi in IoT devices
  6. Bob Ruiken: The Impact Of Sorts On Non-Termination Analysis Of Term Rewriting Systems
  7. Ceel Pierik: Infinite Omniscient Sets in Constructive Mathematics
  8. Charlotte Leuverink: An implementation of Andersen-style pointer analysis for the x86 mov instruction
  9. Daniel Goßen: Design and implementation of a stealthy OpenWPM web scraper
  10. Dave Artz: Information Technology Support for the Arterial Thoracic Outlet Syndrome
  11. Egidius Mysliwietz: Identifying rootkit stealth strategies
  12. Eline Bovy: Comparison of the second round candidates of the NIST lightweight cryptography competition
  13. Ellen Gunnarsdóttir: Trezor One side-channel analysis setup
  14. Evelien van Workum: Perceptions of Dutch - Former - CS Teachers regarding the Assessment of Fundamentally New Learning Objectives
  15. Floris Hendriks: Analysis of key management in Matrix
  16. Gunnar Noordbruis: Energy efficient WLAN using WiFi standards on an Archer C7 AC1750 access point
  17. Hylke de Zee: Informatie behoeften Google Analytics gebruikers
  18. Ilse Arwert: Embryo Classification using Neural Networks
  19. Jaap Dijkstra: Gaussian Processes versus Autoregressive Wild Bootstrap - Climate Application
  20. Jan Aarts: A GWAS about the wingsize of Nasonia Vitripennis
  21. Jesse van Son: Security by design in Azure DevOps pipelines - a case study at SpendLab technology - redacted
  22. Job Doesburg: Using IRMA for small scale digital elections
  23. Johan Sijtsma: Creating a Formal Model of the Game 2048
  24. Joren Vrancken: A Methodology for Penetration Testing Docker Systems
  25. Josien Visschedijk: Text mining pathology reports
  26. Julian Besems: A Specification Language and Semantics for Architectural Design
  27. Kirsten Kingma: Parsons' puzzles as formative assessment
  28. Koen Wösten: Abstract Nonsense and Programming - Uses of Category Theory in Computer Science
  29. Lars Kuipers: Analysis of Attack Trees - fast algorithms for subclasses
  30. Lars van Rhijn: Using optimized electric vehicle charging for demand side management
  31. Laura Philipse: Routing Algorithms for Autonomous Agricultural Vehicles
  32. Luko van der Maas: Creating Canned Recursion in Functional Programming Languages from Category Theory
  33. Luna Elise Schernthaner: Mediation Analysis of Nurse Practitioner Impact on Renal Outcome in CKD Patients
  34. Marc van de Werfhorst: Security recommendations for Agile and DevOps development at Ridder Data Systems
  35. Maris Galesloot: Exploring taint analysis methods for the grey-box learning of Java systems
  36. Matti Eisenlohr: The effects of search languages on multilingual online news consumption
  37. Mauk Lemmen: Optimizing Elephant for RISC-V
  38. Michael de Jong: Java Implementation and Analysis of Multi-party Private Set Intersection Protocols
  39. Michel de Boer: Secure communication channels for the mTask system
  40. Milan van Stiphout: Flood-It as a SAT Problem
  41. Mischa van Reede: Evaluating the practicality of using blockchain technology in different use cases in the healthcare sector
  42. Pascal Bongartz: Automatic code generation for protocols via Dezyne and Nail
  43. Pascal Engelbarts: Technology usage patterns of the Dutch youth in relation to social isolation
  44. Rick Koenders: Intuitionism in Lean
  45. Rick van der Wal: The usefulness of automated style-related feedback to object-oriented programming students
  46. Romy Stähli: Access Control in a Task-Based Methodology
  47. Ruben Holubek: Designing and evaluating a learning activity about debugging for novice programmers
  48. Steven Wallis de Vries: Designing a simple and secure email delivery protocol - SMTPsec
  49. Tobias van der Werff: Detecting Fingerspelling in Sign Language Videos Using Pose Information
  50. Toine Hulshof: Cross-Platform Mobile App Development - Translating SwiftUI to Jetpack Compose and vice versa
  51. Tom Smitjes: Connecting Mixed-Integer Linear Programming and Finite-memory POMDP Strategies
  52. Tosca Klijnsma: Semantic Equivalence of Task-Oriented Programs in TopHat
  53. Yannick Hogewind: Data-Driven Estimation of Retail Building Energy Consumption


  1. Constantin Blach: Xoodoo Trail Analysis
  2. David Korsman: De oorzaken en gevolgen van het uitstellen van de IPv6-adoptie
  3. Dennis Kleverwal: Writing with Dobot Magician
  4. Gijs Hendriksen: Extending WASP providing context to a personal web archive
  5. Hendrik Werner: The State of Entropy Generation in Practice
  6. Hendrik Willing: Effectiveness of Common Defense Mechanisms Against Adversarial Inputs for DNN based Android Malware Detectors
  7. Huy Nguyen: Exploring Python as a replacement for C++ in Imperative Programming for Computing Science at Radboud University
  8. Jeroen Wijenbergh: Performance comparison of DNS over HTTPS to unencrypted DNS
  9. Justin Hende: MineChecker - A tool for detecting click-based browser cryptomining
  10. Kevin Heijligers: Algoritmen unplugged - conceptueel begrip van leerlingen in het voortgezet onderwijs
  11. Lars Jellema: Optimizing Ascon on RISC-V
  12. Lennart Jansen: Maatregelen ter bescherming van patiëntendossiers van extra beschermde personen tegen oneigenlijke inzage in ziekenhuizen
  13. Maaike van Leuken: Comparing Correlation Coefficient and Difference of Means in a Differential Power Analysis Attack
  14. Maarten Dorrestijn: Finding the guard leveraging bandwidth statistics to identify TOR guard nodes
  15. Manuela Bergau: Human-in-the-loop Strategy Synthesis PAC-MAN verified
  16. Max van Deurzen: The anatomy of the modern window manager - a case study for X in an Agile manner
  17. Nick Nibbeling: Comparing privacy plugins
  18. Nienke Wessel: The Semantics of Ownership and Borrowing in the Rust Programming Language
  19. Raka Schipperheijn: Implementing Xoodoo with protection against single fault attacks on Cortex-M4
  20. Reinier Joosse: An Extended Algorithm for Learning Serial Compositions of Mealy Machines
  21. Richard van Ginkel: Security in public Wi-Fi networks
  22. Robin Smit: A machine learning approach for recommending items in League of Legends
  23. Sam Sweere: Increasing the Perceptual Image Quality of Adversarial Queries for Content-based Image Retrieval
  24. Thomas_van_der_Burgt___Implementing_the_NIST_lightweight_cryptography_candidates_Xooday_and_Subterranean_2.0
  25. Thomas van Ouwerkerk: Investigating the minimality of the ZH-calculus
  26. Thomas Welten: Predicting Pelvic Floor Surgery Outcomes


  1. Aaron Visschedijk: Trading Bitcoin using artificial neural networks
  2. Aucke Bos: Visulizing differences between HTML documents
  3. Bart Gruppen: From mu-regular expressions to CFGs and back
  4. Bart van den Boom: State machine inference of thread networking protocol
  5. Bart van de Put: Scoring Entity-Relationship Diagrams Drawn by a Computer Algorithm
  6. Bas Hofmans: Transducers over G-sets and their properties
  7. Bram in t Zandt: Software Supply Chain Security for Banking Websites
  8. Dion Scheper: Irma over Bluetooth
  9. Evi Sijben: A deep residual network for recognizing cluster-based generic photo categories
  10. Frank Gerlings: Digital flowchart maker
  11. Giel Besouw: Simulating NXT robots
  12. Gijs Cuyck: A complete version of the ADS method for comformance testing
  13. Hoang Gia Linh: Optimization of the NTT function on ARMv8-A SVE
  14. Ischa Stork: Performing an online template attack on two different implementations of FourQ
  15. Janne van den Hout: Continuations in functional programming languages
  16. Jan Potma: An exponential construction for Sokoban
  17. Jasper Haasdijk: Searching IPFS
  18. Jelle Loman: Comparing the performance of the Laplace and Staircase mechanisms in differential privacy
  19. Jeremy Guijt: Checking model learning hypotheses with symbolic execution
  20. Jeroen van Alem: Improving Mobile Ad Hoc Networks in Realtime Situations
  21. Jeroen van Voorst: Augmented reality as a general indoor and outdoor navigation solution
  22. Joep Veldhoven: Automata extended to nominal sets
  23. Jonathan Moerman: Evaluating the performance of open source static analysis tools
  24. Joris den Elzen: Characteristic Formulas and CakeML
  25. Jos Craaijo: An efficient parsing machine for PEGs
  26. Jules van Thoor: Learning state machines of TLS 1.3 implementations
  27. Leo Cornelissen: Simulating Lego Mindstorms EV3 robits using Unity and Python
  28. Lotte Fekkes: Comparing Bitcoin and Ethereum
  29. Mark Wijkhuizen: Security analysis of the Itasks framework
  30. Marnix Suilen: Reachability properties for uncertain MDPs
  31. Max Leijtens: Solar panels and LoRaWAN
  32. Mees Neijenhuis: Improving decision tree learning by looking ahead
  33. Mick Koomen: Using power analysis to differentiate between malicious repackaged apps and clean apps
  34. Nathan van Beusekom: Properties of codings in lambda-calculus
  35. Niek Janssen: Stateful Programming in Clean
  36. Niels Drueten: Security analysis of DTLS 1 2 implementations
  37. Niels van den Hork: Data Representatie van Afbeeldingen in het VO Lesontwerp en Begripsproblemen
  38. Nikki van der Gouw: Representatie van spraak in diepe neurale netwerken
  39. Noel Bangma: Ascon An attempt in NEON on the Cortex-A8
  40. Phil Geelhoed: Investigation into voice search
  41. Randy Wanga: Analysing Spotify listening data from Armada music
  42. Rick Lukassen: Determining the Neo-Piagetian reasoning level of novice programmers
  43. Robin Elbers: On the replication of CycleGAN
  44. Sander Hendrix: Accessing PEP data
  45. Sebastiaan Versteeg: Inferring state machines of Tunneled Direct-Link Setup
  46. Serena Rietbergen: 2-Way Finite Automata
  47. Stan van Lier: Robustness of federated averaging for non-IID data
  48. Tiko Huizinga: Using NFC enabled Android devices to attack RFID systems
  49. Timo Maarse: Parsing with derivatives in Haskell
  50. Timo Schrijvers: Learning register automata using Taint analysis
  51. Tom Nijholt: Why do we need and want cryptocurrency
  52. Tom Sweers: Autoencoding credit card fraude
  53. Willem van Summeren: Tree Automata
  54. Wouter de Boer: Power Analysis of the Ledger NanoS


  1. Bart Veldhuizen: Automated state machine learning of IPsec implementations
  2. Camil Staps: Code-generation-for-the-Thumb-2-instruction-set
  3. Erin van der Veen: The Practical Performance of Automata Minimization Algorithms
  4. Flip van Spaendonck: Comparing Web Page Layouts using Tree Edit Distance
  5. Jan Martens: Parsing-expression-grammars-constructing-a-linear-time-parser
  6. Jordy Gennissen: Gamut Sifting through Images to Detect Android Malware
  7. Laurens Kuiper: Axis-Parallel Five-in-a-Row is PSPACE-Complete
  8. Luuk Arts: Comparing Discretization Methods for Applying Q-learning in Continuous State-Action Space
  9. Martin Meyers: Side channel protected Keyak on ARM Cortex-M4
  10. Marvin van Bekkum: Een technische en juridische analyse van het protocol van de Veilige E-mail Coalitie
  11. Mathis Sackers: A Comparison of String Distance Metrics on Usernames for Cross Platform Identification
  12. Matthias Vogelaar: Defining the Undefined in C
  13. Michel Botros: Supervised Learning in Human Activity Recognition based on Multimodal Body Sensing
  14. Michel Kok: A Context-based Introduction to Finite State Automata in Secondary Education
  15. Oussama Danba: Implementing the authenticated cipher MORUS using NEON
  16. Robin Tonen: Exploring Variable Ranges in Machine Learned Models
  17. Sietse Mooren: Link prediction op het RU domein
  18. Stan Derksen: Creating-a-secure-virtual-private-network-using-minimal-code
  19. Tessa Schlief: Leren-Programmeren-in-Python
  20. Thijs Voncken: Procedural-maze-generation-an-L-System-based-approach
  21. Thijs Werrij: Het-uitbreiden-en-evalueren-van-scatterplots
  22. Tim van Dijk: A high-performance threshold implementation of a BaseKing variant on an ARM architecture
  23. Toon Lenaerts: Improving-protocol-state-fuzzing-of-SSH
  24. Twan Cuijpers: Recognizing text in the wild
  25. Ward Theunisse: Breaking the chain Security analysis of a pilot system for detainee monitoring in the Dutch Custodial Institutions Agency
  26. Willem Boumans: Web tracking and current countermeasures


  1. Abdullah Rasool: AAWSOME
  2. Bauke Brenninkmeijer: Catching IMSI-catcher-catchers
  3. Gerben van der Lubbe: A New Hope for Nussbaumer
  4. Ivar Derksen: HTML5 Tracking Techniques in Practice
  5. Jan Schmidt: Towards More Flexible Automatic Decision Making
  6. Jeftha Spunda: Approximate Nearest Neighbor Field Computation via k-d Trees
  7. Justin Mol: The Evolvability of iTasks using Normalized Systems
  8. Koen Basten: Classifying Landsat Terrain Images via Random Forests
  9. Lars Kuijpers: Invloed van MetaCost op imbalanced classificatie problemen
  10. Laurens Brinker: Security analysis of the IRMA app using SPARTA and fuzzing
  11. Maarten Schellevis: Getting access to your own Fitbit data
  12. Matjah Sonneveld: Protecting app secrets in Android
  13. Matthias Ghering: Evil Twin Vulnerabilities in Wi-Fi Networks
  14. Nick Tönissen: Een tool voor acceptatieonderzoek naar IT
  15. Patrick Tan: How to Evaluate Network Models Used in Clinical Decision Making
  16. Paul Huberts: Het gebruik van architectuurconcepten bij de ontwikkeling van web-mobiele applicaties
  17. Sander van Dam: Sufficient conditions for sound hashing using a truncated permutation
  18. Stijn Meijer: Secure Location Verification for ADS-B
  19. Ties Robroek: Accelerating BCCD using parallel computing
  20. Timo van Niedek: Phonetic Classification in TensorFlow
  21. Tom Nies: Privacy Protection Against Cross-Device Tracking Methods
  22. Tom Nikken: Een Deductieve Semantiek voor iTasks
  23. Tom Sandmann: Relevant biomarkers in the prediction of good and bad days for multiple sclerosis patients
  24. Wietse Kuipers: Improving matchmaking with game data
  25. Wouter van der Linde: Parallel SHA 256 in NEON for use in hash based signatures


  1. Aaron van Geffen: Digitizing an interactive collaborative teaching methodology using web technologies
  2. Bas Elbers: De menselijke maat in een zich ontwikkelende techniek
  3. Berry Lyklema: Social Media & Werkafspraken
  4. Charlie Gerhardus: Een ownership based garbage collector voor de taal cgt
  5. Daniel Roeven: Snap-to-Style
  6. Daniel van Loon: Het overzichtelijk houden van kennis bij het gebruik van Scrum
  7. Demian Janssen: On-parsing-expression-grammars
  8. Dion van de Vooren: Hoe accuraat kun je de populariteit van muziek voorspellen met behulp van social media
  9. Emma Gerritse: Herbrands theorem
  10. Jolein Kluten: Inzet-van-speelelementen-bij-organisatie-veranderingen
  11. Jonathan Seesink: The applicability of Grinbath EyeGuide Tracker to mobile devices for usability testing
  12. Julian Neeleman: Optimisations and Generalisations of Retrograde Analysis
  13. Koen Vijverberg: Finding hyperintensities in the brain using unsupervised feature learning
  14. Leon Botros: Optimizing NORX for Atmel 8bit AVR microcontrollers
  15. Luuk Scholten: Transforming ORM into O-RM
  16. Martin Huyben: Toepassingen in COcaml
  17. Mats Ouborg: Formalizing Group Model Building
  18. Maurice Knoop: Introduction to YARMIS a dynamic alternative to RMI
  19. Michael Jansen: Smartphone privacy demo
  20. Rick Erkens: The Turing machine model extended with interaction
  21. Rob ten Berge: Statistical Model Checking of a Digital Hydraulic Power Management System
  22. Ronnie Swanink: Persistent-effects-of-man-in-the-middle-attacks
  23. Sanne Boumans: Lost in Translation Automatic Learning of Statistical Models for Language Translation
  24. Simon Brugman: Computationally Feasible Logo Recognition using Deep Learning
  25. Stan Philipsen: Usability van Wikipedia editors
  26. Stijn Voss: Training the CIA model using back propagation
  27. Sven Arissen: 414 bit multiplication on the ARM Cortex M0
  28. Thomas de Bel: K Means clustering of a database with PTSD and other psychiatric patients
  29. Thom Wiggers: Implementing CAESAR candidate Prost on ARM11
  30. Tobias Schroeter: Het gebruik van Automated Assessment Tools in programmeercursussen
  31. Tom Evers: Twee-manieren-voor-het-leren-van-een-DTD-bij-voorbeelden-van-XML-documenten
  32. Tom van Bussel: Inferring gene regulatory data


  1. Ben Brucker: Government intervention on consumer crypto hardware
  2. Gerco van Heerdt: Efficient Inference of Mealy Machines
  3. Gerdriaan Mulder: LTE WiFi Handover Strangelove
  4. Jip Dekker: Generating Google Go framework from Uppaal models
  5. Joep Top: Een BASS-FinLog achitectuuranalyse
  6. Jory van Keulen: Smart Charging A privacy and security analysis
  7. Lars Bade: Vertrouwelijkheid in het iRN
  8. Laurens van Dijk: Finding musical genre similarity using machine learning techniques
  9. Marvin Barron: Shortest Path Estimation for small world networks
  10. Max Tijssen: Automatic modeling of SSH implementations with state machine learning algorithms
  11. Mirjam van Nahmen: Automatically Learning a Model of the SSH2 Transport Layer
  12. Moritz Neikes: Efficiency of large scale DC networks
  13. Patrick Verleg: Cache Cookies searching for hidden browser storage
  14. Pien Walraven: Communicatie binnen software development teams Scrum versus waterval
  15. Rafael Alejandro Imamgiller: Formal Characterisation of the Functional Strategy
  16. Ramon van Sparrentak: A concrete deskolemization algorithm
  17. Rodin Aarssen: Proving a folk theorem using Kleene Algebra with Tests
  18. Tim Janssen: A Linear Quantile Mixed Regression Model for Prediction of Airline Ticket Prices
  19. Wesley Janssen: Curve25519 in 18 tweets


  1. Bas van Zadelhoff: Towards Large Diagnostic Bayesian Network Models
  2. Ben Siebert: Smartphone-privacy
  3. Bram Arends: Quaternionen voor proper rigid body transformations in computer graphics
  4. Eduardo Pablo Novella Lorente: Reverse engineering Internet Banking
  5. Elmar Dongelmans: Leerstijlen en e-learning
  6. Idzard Stoker: Computational thinking in lesmateriaal voor informatica
  7. Joel Cox: Profiling knowledge workers using open online profiles
  8. Joeri Arendsen: Advance Organizers
  9. Joost Janssen: The ACCQ Methodology Assuring Consumer Satisfaction of Cloud Service Quality
  10. Joost Rijneveld: How the Dutch broke the Japanese Blue Code in the late 1930s
  11. Judith van Stegeren: Exploring the inference problem for D0L-Systems
  12. Kelley Philip van Evert: Graph models for the untyped lambda-calculus
  13. Kevin Valk: AndroidCard A framework for writing NFC applets on Android
  14. Koen Buitenhuis: DigiD vs. JavaScript the risk of using third party JavaScript on government websites
  15. Koen van Ingen: Cookiewalls Een probleem met een technische oplossing
  16. Linus van Elswijk: Hierarchical Path-Finding Theta star Combining HPA star and Theta star
  17. Maarten Bovy: Digitale medische verslaglegging Een koppeling tussen patient conditie en dossier
  18. Martijn Terpstra: WhatsApp and privacy
  19. Mathijs Vos: Voor de draad ermee Een vakdidactische verkenning van programmeren met threads
  20. Matthijs Hendriks: Analysing Multicriteria Route Planning
  21. Nicky van Rijsbergen: Responsible Disclosure een kritische beschouwing
  22. Niels van der Weide: Computing Exact Solutions of Initial Value Problems
  23. Petra van den Bos: Vakdidactische aspecten van security
  24. Ramon Janssen: Learning a State Diagram of TCP Using Abstraction
  25. Raoul Estourgie: Analysis of Android Authenticators
  26. Robin Munsterman: Equality of infinite objects
  27. Sanne Derckx: Is de smartphone smart genoeg voor ouderen
  28. Sven van Valburg: Security of Browser Add-ons A Firefox 21 Case Study
  29. Thomas Naegele: MapReduce Framework Performance Comparison
  30. Wouter Geraedts: Time-Based Modeling and Verification of Flow Systems in UPPAAL


  1. Bas Visser: Facebook Privacy
  2. Bas Vossen: Problem Solving Perspectives
  3. Beau Verdiesen: The webmail experience
  4. Christiaan Hillen: The IT Anamnesis
  5. Danny Romme: Hoe denken middelbare scholieren over de Informatiewetenschappen
  6. Dennis Brentjes: Concurrency issues in the iTasks3 framework
  7. Eamonn Cassidy: Hoe draagt draadloze communicatie bij aan de procescommunicatie binnen de Nederlandse Spoorwegen
  8. Erik Boss: Evaluating implementations of SSH by means of model-based testing
  9. Feike Geerts: Usability Microsoft Word
  10. Ferdi van der Werf: Op zoek naar mogelijkheden en randvoorwaarden voor robotica onderwijs in het VWO
  11. Hans Harmannij: Logging NFC data on a Google Nexus S
  12. Ivan Koster: Reinforcement Learning and the Parallel Actions Common Goal problem
  13. Jan Vogels: Regels voor Serious Gaming in Requirements Engineering
  14. Jasper van Duijnhoven: How can game genres contribute to the learning process
  15. Joost Kraaijeveld: Probabilistic causal logic in discrete event training simulations
  16. Koray Yanik: Designing a functional and minimalistic Operating System
  17. Ko Stoffelen: Comparison of chain merge behaviour of TMTO methods
  18. Manu Drijvers: Model Checking Tamper-Evident Pairing
  19. Marcel van der Made: Een case-study naar het leren van real-time automaten
  20. Marc Schoolderman: Fuzzy lexical matching
  21. Marijn van der Zaag: Digitalisering van contant geld
  22. Mark Zandstra: Genereren van operationele specificaties aan de hand van UML diagrammen
  23. Mehdi Aqadjani Memar: Hardware Onafhankelijk Besturingssysteem
  24. Michiel van Lierop: Crossing Borders an Analysis of the Experiences of Dutch Bachelor Students Working on the Community Outreach Project in India and Zambia
  25. Niklas Weber: Typed Skipgrams Investigated
  26. Patrick Schileffski: Do not track
  27. Peter Maandag: Solving 3-Sat
  28. Philipp Jakubeit: Implementation and Analysis of OpenPGP Functionality via NFC
  29. Robert Kleinpenning: Is Javacardsign correct and secure
  30. Roberto Alves de Almeida Junior: Model-based Testing with a B Model of the EMV Standard
  31. Sjors Gielen: SIM Toolkit In Practice
  32. Stein Keijzers: Voxel Pad Reductie
  33. Tim Cooijmans: Internetverkeer als bewijsmateriaal
  34. Tom de Ruijter: Online and co-regularized algorithms for large scale learning
  35. Willem Burgers: Session Proxy A prevention method for session hijacking in Blackboard
  36. Xander Damen: Een keuze voor webserver architecturen afhankelijk van het dynamisch karakter van een website


  1. Anne Westerhof: Antivirus software versus Malware
  2. Bart Leusink: Serious Gaming in Software Engineering
  3. Bart Lutgens: Stealth SMS Description of how it works
  4. Bram Vonk: Autoriteiten vinden op Twitter
  5. Christiaan Thijssen: Leefpatronen in Twitterberichten van actieve gebruikers
  6. Dennis Aarts: Modeling concepts taught by a board game
  7. Erik Maessen: FNWISurvey Nieuw enquete systeem voor de FNWI
  8. Geert Smelt: Programming Web Applications Securely
  9. Ilian van der Velden: Leren programmeren Programmeeronderwijs op de middelbare school
  10. Iris Trepels: The Open Source Community and Piracy
  11. Joost Kremers: Practical hacking AES using the S-box weakness
  12. Joost Timmerman: Where am I? Where should I go?
  13. Kevin Reintjes: Veiliger authenticeren met de Yubikey
  14. Nick Gubbels: Extending F-lite with generic: G-lite
  15. Niek Wolfkamp: Online and offline privacy
  16. Niels Braakensiek: Organisational Communication uitdrukbaar in Demo?
  17. Rens van Summeren: Security in Online Gaming
  18. Robin Oostrum: De kwaliteit van fonetische transcripties
  19. Rob Thijssen: Argument based modeling analyses on business process models
  20. Roel van Rijswijck: Negotiations as Conceptualizations
  21. Steffen Janssen: Decoding directed covert attention in BCIs using HMMs
  22. Tim van Lokven: Review and Comparison of Instant Messaging Protocols
  23. Wouter Lockefeer: CleanDoc


  1. Albert Gerritsen: Expressieherkenning
  2. Antolin Janssen: Kernel Machines for Multi-Class Classification: A Joint Kernel Approach
  3. Bram Bruines: Plankalkul
  4. Carsten Ruetz: Timed Model-Based Conformance testing
  5. Jeffrey Kwee: Serious Gaming in Requirements Engineering
  6. Jeffrey Lemein: fMRI-Based Image Reconstruction Using the Elastic Net
  7. Lars Lockefeer: Encrypted SMS an analysis of the theoretical necessities and implementation possibilities
  8. Louis Onrust: Paraphrasing factoid dependency trees into fluent sentences in a natural language
  9. Marco Henrix: Aan de hand van hersenactiviteit reconstrueren wat iemand ziet
  10. Mark Spreeuwenberg: Het testen van smart meters
  11. Marlon Baeten: Rahisi simple web development
  12. Martin Devillers: Analyzing password strength
  13. Rik Janssen: Hoe ziet een systeem eruit dat klassiek slagwerkles computationeel kan ondersteunen?
  14. Robin Rutten: XMPP en het real-time web
  15. Royce Benda: Informatiekunde Inleven en laten Beleven


  1. Daan Pijper: Requirements, informatica versus architectuur
  2. Feng Zhu: Smart Card Based Solutions for Secure Internet Banking with a primitive reader or mobile phone
  3. Freek van den Berg: Creating a meta model describing a production system's concepts and their relations
  4. Jelle Schuhmacher: Intrusion Detection met Core Vector Machines
  5. Jeroen Claassens: Hamminggetallen Een complexiteitsvergelijking tussen verschillende algoritmen
  6. Joost Koppers: Database encryptie schema's Omgaan met privacygevoelige informatie
  7. Jos Groenewegen: Supporting sign language in Human Computer Interaction Understanding the challenge
  8. Kevin Vriens: Automatisch parkeren: Hoe werkt het?
  9. Koen Hulsman: Persoonlijk nieuws: een kijkje in de keuken van de personalisatie van online nieuwswebsites
  10. Martijn Sprengers: The Effects of Different Bayesian Poison Methods on the Quality of the Bayesian Spam Filter SpamBayes
  11. Matthijs Smith: Implicit Information Retrieval
  12. Mirko van Ede: Testondersteuning in frameworks voor webapplicaties
  13. Pepijn Arts: Semantische Web Services
  14. Philipp van Bebber: Internet Banking Shopping: De gevaren achter het hangslot
  15. Richard Willems: Knowledge sharing and retention through the use of collaboration software
  16. Ruben Muijrers: Expressieherkenning met PCA en SVM
  17. Sander van Hooft: ICT for Ethiopia's land administration
  18. Steffen Michels: Analysing Onion Routing
  19. Thierry Stamper: Mislukte IT projecten: een kwestie van beter plannen?
  20. Walter Moerkerken: Conceptualiseringstechnieken uit de ICT toegepast op Enterprise Architecturing


  1. Adam Cornelissen: A Modern Turing Test
  2. Bernard van Gastel: Reliability of a read-write lock implementation
  3. Erik Crombag: DigiCoach
  4. Erik Steinmann: De acceptatie van internetcensuur door bezoekers van Nederlandse online nieuwsgemeenschappen
  5. Fabian van den Broek: Static Code Analysis In Java
  6. Julian Verdurmen: Firefox extension security
  7. Julius Muecke: Database Schema Integratie
  8. Juul Coolen: Temporele doorloop in systeemontwikkeling recht-toe-recht-aan versus herhaling
  9. Laura Nij Bijvank: Automatische code generatie met de TimesTool
  10. Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
  11. Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
  12. Martijn Ermers: Datatranslatie met MT
  13. Robbert Krebbers: Uitdrukkingskracht van XML schema's
  14. Rolf Markwat: SOA: Bijdrage of hype voor portal Radboud Universiteit?


  1. Allan van Hulst: From Java to mCRL2
  2. Bart Schotten: Een Vergelijking van Elektronische Betaalmethoden voor E-commerce
  3. Eddy Klomp: Quality Aspects and Decision Points
  4. Frank van der Loo: Error correctie in VOiP
  5. Freek Verbeek: Getallen En Functies In De Pi-Calculus
  6. Ilona Wilmont: Enhancing usability for elderly people
  7. Jean-Pierre de Rooij: Is an electronic passport usable as an authentication token?
  8. Johan Janssen: Using JML to protect Java code against SQL injection
  9. Jordy Voesten: Business Rules and iData: A Powerful Combination?
  10. Nina Hoedt: Internetverslaving onder Informatica en Informatiekunde studenten
  11. Sven Haster: Een technische analyse van RIESKOA
  12. Wouter Roelofs: The AOL Scandal


  1. Alex Hamakers: Nieuwe werelden, oude gevaren: cheating in MMORPGs
  2. Daan Laros: Integriteit van mens en systeem
  3. Danny Sarbo: Bachelorscriptie Informatiekunde
  4. Dennis Janse: Het Semantische Web
  5. Dirk Tonnaer: Diagnostic decision support in de huisartsgeneeskunde
  6. Eelis van der Weegen: Formalizing the Hamming Stream in Coq
  7. Francois Kooman: Websurfen met onbetrouwbare computers
  8. Hensley Hanse: Formele talen voor een formele RE
  9. Johan Stortelder: Spraaksynthese
  10. John Akkermans: Online privacy in ruil voor terrorismebestrijding
  11. Mark Jenniskens: De toepasbaarheid van ISO 9126 voor kwaliteitsbeoordeling van m-services
  12. Mark van Liefland: Requirements Engineering bij marktgedreven IT-bedrijven
  13. Martijn Moraal: Massive Multiplayer Online Game Architectures
  14. Martin van de Goor: Genetische algoritmes en parallellisme
  15. Matthijs Mekking: Capability of Kerberos
  16. Matthijs van Roosmalen: Requirements & Verandering
  17. Paul Dekkers: Publieke Software
  18. Rene Joosten: Requirements Engineering voor informatiesystemen
  19. Rody Kersten: The composition Agreement in Ambient Networks
  20. Rogier Lommers: Profiling onder studenten Informatica en Informatiekunde
  21. Roy Bos: Informatiearchitectuur
  22. Thomas Dobbe: Requirements Traceability
  23. Thomas Janssen: Recommender Systems voor het realtime aanbieden van nieuwssecties
  24. Tom van den Broek: Object Relational Mappings
  25. Vincent Driessen: The Power of Wobbly Types

This page was generated on Tue 21 Sep 03:33:26 CEST 2021