Bachelor's Theses
On this page we present links to the bachelor's theses that have
been produced by students of Computing Science and students of
Informational Sciences at the Radboud University.
2025
- Abdullah Mahamed: Evaluating Sparse Convolutional Neural Networks for Binary Classification in Medical Imaging
 
- Alexandru Aioanei: ARMageddon - A Microarchitectural Duel Between the Cortex-M4 and M33
 
- Alwin van den Eyssel: Detecting Thai Speech Mispronunciation with Modern Automatic Speech Recognition
 
- Anna Lorenz: A Comparative Study of the Simplex Method and Bit-blasting for Linear Integer Feasibility
 
- Arvid Bonten: Soundness for program synthesis using separation logic
 
- Beau Maas: Firmware Extraction and Analysis of the TP-Link TL-MR3020 Router
 
- Ben van Wijngaarden: Linear type inference through use of standard types
 
- Bezayite Amenu: Developing a maritime cybersecurity threat and mitigation catalog
 
- Boldizsár Dénes: An investigation into the expressive power of Persistent and Reactive Turing machines
 
- Călin Iaru: Fuzzing the data link layer of ZigBee
 
- Carina Costache: A Comparative Analysis of Traditional Time Series and Machine Learning Models for Forecasting Influenza Patterns Across European Countries
 
- Catalin Sabau: Automation of Data Flow Analysis of Cryptographic Implementations
 
- Christy Bongers: Control Improvisation for Deterministic Finite Tree Automata
 
- Daan Eijkman: An Analysis of Apple's iMessage PQ3 Algorithm Using ProVerif
 
- Daan Mooij: Greener Thinking - can a sustainability model help professionals make more technically sustainable choices
 
- Daan Weessies: Side-channel resistant implementation of ASCON for RISC-V architectures
 
- Daniel Matias Suryadi Putra: User Intent Prediction for Improved E-Shopping Product Recommendations
 
- Daniel Schenk: Experimenting with measuring energy consumption of synchronous versus asynchronous programming
 
- Daniël Schuver: The Usability Cost of Privacy - User Burden of Browser-Based PETs
 
- Dieks Scholten: Playing Quantum Tic-Tac-Toe
 
- Dinand Blom: What does not kill you makes you stronger - employing an attack on MEDS constructively to reduce its signature size
 
- Dinesh Kumar: Evaluating Falco’s ability to detect lateral movement in Kubernetes
 
- Dylan Elens: An LLM-Based End-to-End Testing Agent for Web Applications
 
- Emmy Postma: Deep Acoustic Feature Extraction Using Pre-Trained Audio Embedding Models for Parkinson’s Disease Classification
 
- Emre Akdag: DisARMing Side Channels - Register Classification from Power Traces on ARM Cortex-M4
 
- Erica Fey: Do online trackers collect user selected text on web pages
 
- Floris Reuvers: Formalising Modal Embeddings of Call-by-Name and Call-by-Value
 
- George Dan: Natural Language Processing - Migraine and Diet
 
- Gideon de Hoop: Array Transformations and the Groupoid of Generalized Shuffles
 
- Harm Corporaal: Implementing the active automata learning algorithm L# in the AALpy framework
 
- Hung Pham: Evaluating LLMs for Personalized Movie Recommendations
 
- Ioana Dunăre: Fine Grained Leakage Models in a Simulated Pipeline Component for an arbitrary RISC-V Microcontroller
 
- Ioan-Radu Bocu: Object detection classification and depth estimation approach deployed on excavators in simulated environments
 
- Jarno van Arkel: Video games and privacy - A study of data linkage opportunities
 
- Joey van den Eijnden: Localhost Port Scanning via JavaScript and Its Security Implications
 
- Jord Cluitmans: Learning Predictive Monitors for Autonomous Vehicles Using Binary Decision Trees - A Case Study
 
- Jorn van Eldik: Neural networks in anti adblocker detection
 
- Konrad Błachnio: Computing correlations over the round function of SuperSonic
 
- Lars van der A: Dynamic Travel Suggestions with LLMs
 
- Laurian Duma: Private by Design or Exposed by Default
 
- Leonne Snel: Automata learning with an Incomplete Teacher using Apartness - An extension of the L# algorithm
 
- Lisa Aalbrecht: Municipal Data Transparency - Designing a digital platform for citizens about their data at the municipality
 
- Luuk Kablan: Misleading Ad Detection - Cryptocurrency scam ad classification on Facebooks ad library
 
- Luuk van der Heijden: Personalisation of e-mail subject generation using LLMs
 
- Marcelo Ribero Cerro: PhishGPT - Automating HTML Phishing Emails Using ChatGPT
 
- Markus-Hermann Raica: MITHril - Matrix Code Equivalence in the Head Digital Signature
 
- Martan van der Straaten: Diversity Of Topics as a consequence of Cutting Out Marginalisation
 
- Matej Hora: Grafting Dynamic Editor Trees - Recycling children and modular selector adding for Dynamic Editors in iTasks
 
- Matteo Gamberoni: When Bots Meet Blocks - CAPTCHAs in the age of AI
 
- Mihai-Alin Postolache: Transforming Audio Signals into Haptic Feedback for Deaf Individuals
 
- Niek Adams: Atomic Tasks in Task-Oriented Programming
 
- Niek van den Kieboom: Trusting Eduroam - Analysing Eduroam’s security
 
- Nikita Kuprins: Toward Sustainable Software Energy Strategies for Communication
 
- Noah Romeijnders: Portia Puzzles - Formalizing and Solving Portia Puzzles Using Logic and SAT Solvers
 
- Novi Liuther: Impact Analysis of Refactoring Methods on Energy Consumption
 
- Ophir Ackerman: Sustainable Code Intelligence - Evaluating AST-Based Batching for Large Language Model Code Analysis
 
- Paweł Wolny: Design and Optimization of a Grover's Oracle for Quantum Preimage Attacks on SPONGENT Hash Function
 
- Pelle Meijer: Verifying Structural Red-Black Tree Invariants using Liquid Haskell
 
- Peter Klein Haneveld: Reducing the Energy Usage of Android Applications - An Assessment of the Available Tools
 
- Rens Weerman: Implementing a Fully Homomorphic Encryption Scheme in Rust
 
- Robert Blaauwendraad: Evaluating Large Language Models for Code Smell Detection
 
- Robert van der Maas: The Potential Of Reducing Carbon Emissions By Demand Shifting In Dutch Data Centers
 
- Roel van Maanen: Investigating Adversarial prompts in Llama 2 Using Attention Maps
 
- Ruben van de Sande: Defining Apartness for Coupled Similarity on Labelled Transition Systems
 
- Sarp Ilgaz: Investigating High Entropy Client Hint usage in HTTP-2 and HTTP-3
 
- Sem Stammen: Package hierarchy recovery using word embeddings for flattened remodularized Java systems
 
- Siebe Hooghof: Revisiting the analysis of Latin sentence structure using mathematics
 
- Sjeng Vullers: Conformance Testing and Concrete Queries for Active Learning of Mealy Machines with one Timer
 
- Sjoerd van Dis: Integrating the principles of Responsive Web Design into iTasks
 
- Slavi Ivanov: Building a Pipeline to Connect Automatic Crossword Parsing with Solving
 
- Stefan Roman: Learn, Visualize, Assess - An accessible platform for teaching Graph Algorithms and Data Structures in undergraduate education
 
- Steyn Hommes: Canceled Security Policy - Examining the applicability of the Content Security Policy for WordPress websites
 
- Teodor Andrei Macovei: Comparison of TLS energy overhead in C and Rust and Python
 
- Thijs van de Griendt: The Complexity of Two Polyomino Region Puzzles
 
- Tijs Wouters: Hardware Implementation and Evaluation of the ROCKY Countermeasure for Ascon Against Fault Injection Attacks
 
- Tim Jansen: Using reinforcement learning to help with balancing a tower defense game
 
- Timo van der Straaten: Integrating Static Index Pruning methods into Zoekeend
 
- Todd Bellavia: Evaluating Local and Remote Storage Efficiency and Query Performance for CIFF-Based Inverted Indices
 
- Wassim Kebli: Evaluating the Susceptibility of Optical Character Recognition Systems to Homoglyph-Based Backdoor Attacks
 
- Wessel van der Lans: Extending String Diagrams of MDPs
 
- Yves van Haaren: Active Learning - A pessimistic approach to beat random sampling in expectation
 
- Zuzanna Pawlikowska: Spatial Analysis of Lymphocyte Positions in Cancer Tissue
 
2024
- Adam Farrag: Stellar Classification of Main Sequence Stars using Vision Transformers
 
- Alex Feenstra: Proving Correctness of Cryptographical Primitives through While
 
- Andrei-Radu Milicin: Investigating the impact of GitHub repository features on popularity
 
- Andrei-Sorin Ujica: Summarization for Long-Form Documents
 
- Anne den Hartog: Database energy benchmarks - an evaluation
 
- Artur Wiadrowski: Visualising divide-and-conquer algorithms with self-similar fractals
 
- Axel van Abkoude: Addressing the Addressability Problem - Dense-Padded Packed Booleans in SaC
 
- Bryan Rinders: Integrating PostGuard into Filesender
 
- Casper de With: choosing words algorithmically makes texts more beautiful
 
- Cato van Ojen: Think of your MEDS - Applying the MPC-in-the-head paradigm to MEDS for reduced signature size
 
- Chris Musteata: Detecting Brandjacking-Based Malvertising
 
- Clemens van den Braak: Predicting time intervals between epilepsy hospital checkups
 
- Daan Smeets: WhisperSage - Making Side-Channel Analysis for Post-Quantum Cryptography Accessible
 
- Eline Stehouwer: Measuring the energy overhead of computer language features
 
- Esther Kinderman: Evaluating and improving the accessibility of the NS ticket machine for illiterate users
 
- Faycel Harrathi: Fine-tune Whisper for Speaker Recognition
 
- George-Nicolas Nadejde: Improving AprèsSQI-s cost model for verification
 
- Hugo Hakkenberg: Utilizing machine learning and SHAP to uncover key variables for a healthier lifestyle in Type 2 Diabetes management
 
- Illya van Knippenberg: Implementations based on weighted Finite State Automata improve efficiency of Negative Selection Algorithms
 
- Imke Huisink: Data analysis on motivation for lifestyle changes
 
- Ivo Melse: Sufficient Conditions for k-completeness using Observation Trees and Apartness
 
- Jaap Aarts: Implementing in-Database Similarity Search
 
- Jasmijn Bookelmann: FPGA High Performance Computing
 
- Jasper Laumen: Minimising Q-Weighted Finite Automata over Z
 
- Jen Dusseljee: Optimising Lung Cancer Detection by Oversampling Malignant Nodules
 
- Jermo van Oort: Differential fuzzing of stateful systems using FlexFringe
 
- Jokubas Tumelis: Collecting and analysing signal measurements to localise cell towers
 
- Joram   Ruijtenberg: Implementation of an Optimized Version of the Post-Quantum Signature Scheme ALTEQ
 
- Joris Ballemans: Using Scraped Data from Web Pages for Improving the Efficiency of Location Disambiguation
 
- Josja Koopmans: Distributed Virtual Waiting Room
 
- Julian Put: Learning Mealy Intersections
 
- Kutay Sezer: An Algorithmic Approach to Fixing Friet
 
- Lars Esselink: The state of OSS-Fuzz
 
- Lavika Singhal: Map your Neighborhood - Assessing an algorithm for solving the Isomorphism of Polynomials problem
 
- Luc Schrauwen: A SaC plotting visualisation integration in Jupyter
 
- Madelief Slaats: Exploring the Usability of Recursive Morphism Duality in the Fast Fourier Transform - An Implementation in Haskell
 
- Mark de Jong: Exploring sustainability in the computing science bachelor at Radboud University
 
- Martijn Sanders: The Lsharp Algorithm for Deterministic Finite Automata
 
- Martijn van de Wouw: Generalisations in Equivalence Proofs Using Rewriting Induction and Logically Constrained Term Rewriting Systems
 
- Michel van Wijk: Evaluating Reinforcement Learning Strategies in the Card Game Gin Rummy
 
- Mika Sipman: Constructing Zero-Knowledge Proof Systems on Sudoku Variants
 
- Mikhail Ushakov: Compiling While++ into Logically Constrained Term Rewriting Systems
 
- Milan Pullens: Using Large Language Models as an Information Retrieval Tool on Safety Data Sheets
 
- Mitchell Boesveld: From Multi Server Authentication to Multi Server Authorisation
 
- Mohamad Naseb Aljalab: Oracle Component Analysis on Pyannote speaker-diarization-3.1 Pipeline
 
- Nathalie Saba: Enhance engagement from middle school students with music as a context
 
- Nemo Ingendaa: Analysis and exploration of polynomial activation function - softRmax
 
- Nick van Oers: Pattern as an SAT problem
 
- Niels Boegman: Determining the core of the web
 
- Nikolai Savulkin: Investigating effects of electromagnetic noise on screen gleaning side-channel attack against HDMI connections
 
- Philipp Küppers: Exploring the Chemical Universe with Spiking Neural Networks
 
- Pim Leerkes: Finding New Asymptotic Bounds on the Minimal Optimal Strategy Sets of Parametric MDPs
 
- Rijk Kregting: Designing a Visualisation Tool for Energy Consumption Models in IT
 
- Robin Put: Efficient Elastic Alignment in CUDA
 
- Rowan van Rooijen: Model Learning of Lexers
 
- Ruben te Morsche: Finding the Optimal Backdoor Data Poisoning Attack
 
- Rutger Broekhoff: Formally defining the semantics for the Nix expression language
 
- Sabin-Gabriel Iacob: Polyhedra Folding Algorithms
 
- Samuel Padron: Predicting DNA sequence pair similarity with HyenaDNA
 
- Sofie Vos: Running iTasks tasks in the browser
 
- Stijn Vandenput: Lock-based Authenticated Encryption in a Multi-user Setting
 
- Sven Meijboom: Enhancing Large Language Models for Structured Data Extraction
 
- Taha Hammouchi: Intrusion Detection System for 5G Core Systems
 
- Teun van Gisteren: Filtered Feelings - Investigating Frequency Filters in Speech Emotion Recognition Models
 
- Thijs van den Berg: Analysing the structure of Latin sentences using formal grammar
 
- Thomas Ilmer: Bot Board - Design and preliminary evaluation of a dashboard visualizing GitHub bot activity
 
- Vincent Dankbaar: The disappearance of constant-time execution
 
- Violeta Sizonenko: Measuring Evolution of Cookie Dialogues
 
- Wout van den Berg: An analysis of Javascript sendBeacon method
 
- Yiğit Batuhan Yiğin: Developer-ChatGPT Conversations - Analyzing Developer Prompts
 
- Yori Jonkman: Evaluating The Use Of Entity Triggers As Explanations In Named Entity Recognition
 
- Yousif Badawi: Can we use Large Language Models to improve Automatic Speech Recognition and if so by how much
 
2023
- Alex Bui Nhat Linh: Analysing open-source 5G core networks for TLS vulnerabilities and 3GPP compliance
 
- Alperen Özkurt: Detection of AI-Made Artworks With One-Class Classification Algorithms
 
- Barıs Cagrı Atik: NFC - Exploring the Current NFC Market - Assessing Security Vulnerabilities and Potential Attacks
 
- Bart Veldman: Multi-user security analysis of three finalists of the NIST ligthweight cryptography competition
 
- Boudewijn van Gils: 3D Fishualizer
 
- Bram Kapteijns: Evaluating as a human
 
- Bram van Veenschoten: Syntax and Type Checking of Truncated Type Theory
 
- Bryan van de Ven: Cheating and anti-cheat system action impacts on user experience
 
- Camile Lendering: Inside the Cookie Jar - Tracking Consent in Digital Advertising
 
- Casper Fabritius: Level 1 BLAS routines in SaC
 
- Dick Blankvoort: Implementing Patch Theories in Homotopy Type Theory
 
- Dion Bremer: Visual Programming with the TopHat Builder
 
- Dirk   Doesburg: Signatures in IRMAseal
 
- Ege Sarı: Improving Entity Linking Systems With DuckDB
 
- Elianne Heuer: Predicting wine prices using weather data
 
- Els de Haan: Differential Cryptanalysis of the SIMON block cipher
 
- Esther Shi: Developing a fallback decryption method for Postguard
 
- Falko Jansen: Deep Learning for Video Game Music Generation
 
- Felix Mölder: An investigation of the nested subset differential attack on the lifted unbalanced oil and vinegar signature scheme
 
- Fouad Lamsettef: Extending ProFuzzBench - A Benchmark for Stateful Fuzzers
 
- Gabriele Serafini: Fast And Furious - Implementing Optuna and Early Stopping in CNN-based SCA
 
- Gabriël Krouwel: Investigating the behaviour of IoT devices undergoing a deauthentication attack and its countermeasures
 
- Gijs Kopmeiners: The landscape of (un)balanced choices in cookie consent dialogues in Europe
 
- Harm Jacobs: Developing a book recommendation system
 
- Harm Roukema: Fuzzing JSON API Clients
 
- Henk Berendsen: Leakage Resilience of the Suffix Keyed Sponge
 
- Jasper Hage: Comparing the performance of MLPs in side channel attacks with different dataset - architecture customizations
 
- Jelle Medendorp: Stealth Acoustic Communication Application
 
- Jonathan Jagt: Security analysis of a TETRA Base Station air interface implementation
 
- Joost Grunwald: Stronghold - Automating corporate security
 
- Jorn Heibrink: Antivirus and EDR bypasses for initial access
 
- Jorrit de Boer: Solving Robust Reachability Using Quantified Boolean Formulas
 
- Julian van der Horst: Backdoor attack on deep neural networks using inaudible triggers
 
- Kevin van de Glind: Control Improvisation for infinite regular languages and feature-based parameters
 
- Leon Zhang: The potential of user experience design in countering email-based social engineering attacks
 
- Lisanne Weidmann: Pentesting the Web Application of Open5gs and Free5gc
 
- Lucas van Kasteren: Misusing browsers login managers for data exfiltration by third parties
 
- Luuk Maas: Extending Matrix's Functionality in a Secure and Sustainable Way
 
- Maikel Jans: An Accompaniment Chatbot for People Onboarding to Open-Source Software Projects
 
- Marco Sousa-Poza: Subjective Well-Being and Temperature
 
- Marijn van Wezel: Formalizing the query language of Semantic MediaWiki
 
- Mark Fijneman: Fuzzing open source OPC UA implementations
 
- Menzo van Kessel: Achieving multiparty deadlock-free communication through linear typing
 
- Michiel Kraan: Bit-scale instead of byte-scale integer arrays in C
 
- Mick van Beijnen: Unsupervised Topic-Based Sentiment Analysis for Twitter
 
- Niels Feij: Karatsuba Algorithm for multiplication of Linearized Polynomials
 
- Norbert Boudens: Optimizing Elephant v2 for ARMv7-M
 
- Pepijn van Grunsven: Attacking the power grid by minimizing the IPv6 search space
 
- Pien van den Abeele: Designing and building a 5G security learning platform
 
- Quinn Ketelaars: A Linear Cryptanalysis of the DST40 Block Cipher
 
- Quinten Kock: Efficiently calculating reachability probabilities in Markov chains
 
- Quintine Sol: Demystifying Black-Box Survival Models
 
- Rick Litjens: Extracting firmware from flash memory chips
 
- Rico te Wechel: Bridges as an SMT problem
 
- Robin Foekens: Security of the Sponge Construction with a Random Transformation
 
- Rutger Dinnissen: Semantics of Languages with Goto
 
- Simcha van Collem: Verifying a Barrier using Iris
 
- Stefan Weijers: A feasibility study on analyzing and predicting client-side energy consumption of web browsing
 
- Stef Gijsberts: Prusti in Practice - A case study of using the Prusti auto-active program verifier for Rust
 
- Sven van der Post: Accessible Process Mining - Developing a Business User Application Utilizing the Heuristic Miner Algorithm
 
- Tea Coroş: The security risks of unverified and recycled email addresses
 
- Thijs de Jong: Mosaic as a SAT problem
 
- Thomas Broekman: Review of HLS Toolchain - Bringing Flexibility and Performance to Software Engineers
 
- Thomas Rhemrev: Creating Better Error Messages by Improving Their Presentation
 
- Tomas Woldu: Tackling the Far Output Distinction Problem
 
- Tygo Francissen: Exploring Feature Importances for Predicting Flight Delays Using Machine Learning Algorithms and Transfer Learning
 
- Walter Levens: Can a smartwatch measure sleep onset
 
- Willem Medendorp: Discovering the jump - Extending automated Kubernetes security assessment
 
- Wouter Doeland: Automated Formal Proofs Verification and Analysis of Security Protocols
 
2022
- Abdulkarim Abdulkadir: Bidirectional Context-Sensitive DGA Detection Using DistilBERT
 
- Abel Lucassen: Weighted Negative Selection
 
- Alexander Wolters: Formalizing the C preprocessor
 
- Alexandros Banos: WTFS - WebTorrent File System
 
- Alex van der Hulst: Exploring the difference between 2DFA and DFA for G-automata
 
- Anda Zāle: The Extent of Data Gathering by Third Parties on Dutch Health Websites
 
- Andrea Minichová: MM1T Learner for the 4-Way Handshake Protocol
 
- Bas van der Linden: A Component Analysis of Neural Network Architectures for Spectral based Audio Source Separation
 
- Cas Visser: Exploring Adaptive Experiments
 
- Ciske Harsema: A security analysis of the TP-Link TL-WR802N Router
 
- Daniël Vos: Data Freshness in Booking Support Systems
 
- Dante van Gemert: Task Oriented Programming in Lua
 
- Elina Antonova: mTask semantics and its comparison to TopHat
 
- Floris Valentijn: Systematic Analysis on the effect of 4G LTE Reconfiguration Settings on Measurement Report Generation
 
- Gijs Thuis: Comparing shallow autoencoders to normalization standardization and PCA as preprocessing step for outlier detection
 
- Hamzah Al Zubi: GASCAR - Genetically Automated Synthesizer Configuration for Audio Replication
 
- Hans Lous: The Influence of Graph Metrics on the Performance of Pathfinding Algorithms
 
- Iwan Litjens: An MCTS-based AI playing The Crew
 
- Jelmer Firet: Acyclic Push-Relabel
 
- Jelte Smits: Stop the infodemic - Designing and evaluating a misinformation warning mechanism based on expert voting
 
- Joshua Steinmann: Optimizing Kubernetes Cluster Down-Scaling for Resource Utilization
 
- Julius Benjamins: The covariance matrix adaptation evolution strategy - CMA-ES - as a method for fitting biological agent-based models
 
- Kimberley Frings: Formalizing and proving knights and knaves puzzles in three valued logic in Coq
 
- Koen Sauren: Improving reinforcement learning performance in 2048 using expert knowledge
 
- Laura Kolijn: Generating and Solving Skyscrapers Puzzles Using a SAT Solver
 
- Leon van den Boogaard: User understanding and user acceptance of biometric authentication on mobile phones
 
- Luke van Leijenhorst: Evaluation and analysis of a transformer model for detailed PIO element extraction on medical literature
 
- Marie-Sophie Simon: Judging a Tweets credibility - The effect of signature labels on perceived Tweet credibility
 
- Mario Tsatsev: Parameter Inference of Gravitational Waves using Inverse Autoregressive Spline Flow
 
- Marten Straatsma: Towards Formalising the Isoperimetric Theorem
 
- Max Jongmans: Online Political Participation in the Age of Digital Surveillance
 
- Michiel van de Noort: A Study of CNAME Cloaking-based Tracking on Dutch Websites
 
- Muhammad Salibi: A Comparative Study of Group Fairness Metrics for Ranked Outputs
 
- Nadezhda Dobreva: Combining Knowledge From Pre-trained Networks And Weight Agnosticism For Evolving Transferable Models
 
- Niccolò Carrivale: QuandleRUN
 
- Niek Terol: Computing apart states in a partial Mealy machine
 
- Niels Starren: Johnny can Encrypt - A Usability Study of IRMAseal
 
- Patrick van Beurden: Blueprints for out-of-core code generation using CUDA
 
- Polina Moroza: Comparison of temporal pooling methods and fusion strategies
 
- Quoc An Ha: Investigating Usability Problems in Email Encryption Tools Based on IBE
 
- Rick ten Tije: A comparison of counterexample processing techniques in Angluin-style learning algorithms
 
- Robin Holen: On iterated transducers and closure under hypotheses - Discussing the hidden relationship
 
- Robin Immel: Using automated feedback as a base for performing self-regulated learning in programming exercises
 
- Sam Haeck: Hack my audio back
 
- Sander Suverkropp: Towards a Formalization of Lsharp in Coq
 
- Seraph Jin: Classification and Interchange of Informal and Formal English Text
 
- Stefan Boneschanscher: Feature-based Randomness Constraints in Control Improvisation
 
- Stefan Jans: How to Visualise Decision-Making using Preferential Voting
 
- Stefan van Ieperen: Sniffing communications between an Arduino and its peripheral sensor
 
- Stefan Vlastuin: Educational Escape Rooms in Secondary Computer Science Education
 
- Thomas de Haan: Dark patterns in games - how do they influence player experiences and their willingness to give up personal information
 
- Thomas Klein Breteler: Improving OpenCRE
 
- Thomas Kolb: Fine-tuning Wav2vec2.0 on caption data
 
- Thomas Luijkman: Developing ELVis - A 4G network analysis and visualisation tool
 
- Ties Speel: Cryptanalysis of SPARKLE ARX-Box Alzette
 
- Tim van Alten: Investigating the Impact of Gamification on the Quality of Digital Mindfulness Practices
 
- Tom Rust: Fuzzing Zigbee using Z-Stack
 
- Tom van der Waa: The Acceptance of Digital ID Software among Dutch Elderly Citizens
 
- Vamsi Yerramsetti: ATIA - Automated Tongue Image Analysis for autoimmune disease detection with supervised machine learning models
 
2021
- Alessandra van Veen: Cookie Compliance of Dutch Hospital Websites
 
- Amber Pater: Pumping Lemma for Deterministic Weighted Automata
 
- Astrid van der Jagt: Extending context-free grammars with conjunction and negation
 
- Bart Hofman: Automated Malware Attribution - Using machine learning on binaries
 
- Bart Janssen: Incorporating Computational Thinking in Calculus lessons - a Characterisation of Algorithmic Thinking and Generalisation Skills
 
- Bram Pulles: Analysis of Akari
 
- Cas Haaijman: Axiomatising Trace Semantics for an Algebra with Parallel Composition
 
- Daan Derks: Separating the Heartbeats of Twins during Pregnancy using Random Forest
 
- Denise Verbakel: Influence of Design on Differential and Linear Propagation Properties of Block Cipher Family Skinny
 
- Dor Mariel Alter: Optimizing the NIST Post Quantum Candidate SPHINCS+ using AVX-512
 
- Evert van 't Oor: How time affects Facebook Reactions
 
- Evgeniya Ovchinnikova: Implementation of Integer Addition on a Spiking Neural Network
 
- Ferran van der Have: The X3DH Protocol - A Proof of Security
 
- Gerhard van der Knijff: Solving and generating puzzles with a connectivity constraint
 
- Giovanni Uchoa de Assis: Differential Analysis of SATURNIN and SPONGENT
 
- Hermen van Westen: Effect of Surface Form Dictionary on Effectiveness in Entity Linking
 
- Jesse Ravensbergen: Biased Perceptions of Media Sources
 
- Jordy Aaldering: A new semantics for array programming languages - how to introduce some laziness without being lazy
 
- Julius Landsman: Analysis of Confined Blocks World
 
- Kirsten Hagenaars: Using Equations to Define Non-Structurally Recursive Functions in Coq
 
- Koen Verdenius: A POMDP model for safety-critical systems and its deteriorating sensors
 
- Lars Jeurissen: E-mail phishing prevention proposal - CEPP
 
- Lisa Hoek: Web classification using DMOZ
 
- Lisa Kalse: Supply of and Demand for Information Regarding Update Support when Buying Smartphones
 
- Mathieu Bangma: ECDSA Based 2FA in the Browser
 
- Maurice Dibbets: Discovery of information disclosure vulnerabilities in the software development process
 
- Maxim van Loo: Automating the Light Switch
 
- Menno Bartels: Closure Properties of Nominal Languages under Substitutions
 
- Michiel Philipse: Distributed Knowledge Proofs in the Coq Proof Assistant
 
- Michiel Verloop: A Critical Review - Exploring Optimization Strategies in Board Game Abalone for Alpha-Beta Search
 
- Mike Schopman: Validating the accuracy of the MaxMind GeoLite2 City database
 
- Mitchel Jansen: Recognising Client-side Behavioral Detection of Web Bots
 
- Niels van Harten: Generating Mutation Operators for a Search-Based Model-Driven Implementation of the Next Release Problem
 
- Onno de Gouw: Mutual privacy and good manners on the social web
 
- Paolo Scattolin: A proposal for the use of Attack Trees in a semi-formal framework for modelling attacks and tolerance solutions with Petri Nets
 
- Patrick Lodeweegs: Approaches to stateful fuzzing of the IRC protocol
 
- Reinier Sanders: To Click Or Not To Click - A User Study on Phishing Click-Through Rates in Instant Messaging Applications
 
- Roland Leferink: Search personalization on Google.nl
 
- Stefan Popa: You Have Been Previewed - Information Leaks of Content Previews in Mobile Messengers
 
- Steven Bronsveld: Transducer Degrees
 
- Steven Maarse: Coupled transformation of feature models and domain models for software product lines
 
- Suzan Erven: Fusible Numbers and the Provability of Computability
 
- Tijn Berns: Exploring Unlearnable Examples
 
- Tom Aarsen: Implementation Evaluation and Comparison of Python Modules implementing Morphological Analysis and Generation
 
- Willem Lambooy: Linearly and arboreally stackable quantum-dot cellular automata and their discrete simulation
 
- Wouter Damen: Generating Kick Drum Samples with Neural Networks
 
- Wouter van Battum: Using IRMA as an authentication method for eduVPN
 
2020
- Abe Heemskerk: Introducing Programming in Primary Education - A Review of Scientific Literature
 
- Arie-Jan Kruijsse: Online verificatie van leeftijd en gezag
 
- Arne Diehl: Cognitive Psychology For Black Box Models - On Holistic And Featural Face Processing in Neural Networks
 
- Auke Zeilstra: An exploration of static analysis used on C cryptography libraries
 
- Bart Pleiter: Fuzzing Wi-Fi in IoT devices
 
- Bob Ruiken: The Impact Of Sorts On Non-Termination Analysis Of Term Rewriting Systems
 
- Ceel Pierik: Infinite Omniscient Sets in Constructive Mathematics
 
- Charlotte Leuverink: An implementation of Andersen-style pointer analysis for the x86 mov instruction
 
- Daniel Goßen: Design and implementation of a stealthy OpenWPM web scraper
 
- Dave Artz: Information Technology Support for the Arterial Thoracic Outlet Syndrome
 
- Egidius Mysliwietz: Identifying rootkit stealth strategies
 
- Eline Bovy: Comparison of the second round candidates of the NIST lightweight cryptography competition
 
- Ellen Gunnarsdóttir: Trezor One side-channel analysis setup
 
- Evelien van Workum: Perceptions of Dutch - Former - CS Teachers regarding the Assessment of Fundamentally New Learning Objectives
 
- Floris Hendriks: Analysis of key management in Matrix
 
- Gunnar Noordbruis: Energy efficient WLAN using WiFi standards on an Archer C7 AC1750 access point
 
- Hylke de Zee: Informatie behoeften Google Analytics gebruikers
 
- Ilse Arwert: Embryo Classification using Neural Networks
 
- Jaap Dijkstra: Gaussian Processes versus Autoregressive Wild Bootstrap - Climate Application
 
- Jan Aarts: A GWAS about the wingsize of Nasonia Vitripennis
 
- Jesse van Son: Security by design in Azure DevOps pipelines - a case study at SpendLab technology - redacted
 
- Job Doesburg: Using IRMA for small scale digital elections
 
- Johan Sijtsma: Creating a Formal Model of the Game 2048
 
- Joren Vrancken: A Methodology for Penetration Testing Docker Systems
 
- Josien Visschedijk: Text mining pathology reports
 
- Julian Besems: A Specification Language and Semantics for Architectural Design
 
- Kirsten Kingma: Parsons' puzzles as formative assessment
 
- Koen Wösten: Abstract Nonsense and Programming - Uses of Category Theory in Computer Science
 
- Lars Kuipers: Analysis of Attack Trees - fast algorithms for subclasses
 
- Lars van Rhijn: Using optimized electric vehicle charging for demand side management
 
- Laura Philipse: Routing Algorithms for Autonomous Agricultural Vehicles
 
- Luko van der Maas: Creating Canned Recursion in Functional Programming Languages from Category Theory
 
- Luna Elise Schernthaner: Mediation Analysis of Nurse Practitioner Impact on Renal Outcome in CKD Patients
 
- Marc van de Werfhorst: Security recommendations for Agile and DevOps development at Ridder Data Systems
 
- Maris Galesloot: Exploring taint analysis methods for the grey-box learning of Java systems
 
- Matti Eisenlohr: The effects of search languages on multilingual online news consumption
 
- Mauk Lemmen: Optimizing Elephant for RISC-V
 
- Michael de Jong: Java Implementation and Analysis of Multi-party Private Set Intersection Protocols
 
- Michel de Boer: Secure communication channels for the mTask system
 
- Milan van Stiphout: Flood-It as a SAT Problem
 
- Mischa van Reede: Evaluating the practicality of using blockchain technology in different use cases in the healthcare sector
 
- Pascal Bongartz: Automatic code generation for protocols via Dezyne and Nail
 
- Pascal Engelbarts: Technology usage patterns of the Dutch youth in relation to social isolation
 
- Rick Koenders: Intuitionism in Lean
 
- Rick van der Wal: The usefulness of automated style-related feedback to object-oriented programming students
 
- Romy Stähli: Access Control in a Task-Based Methodology
 
- Ruben Holubek: Designing and evaluating a learning activity about debugging for novice programmers
 
- Steven Wallis de Vries: Designing a simple and secure email delivery protocol - SMTPsec
 
- Tobias van der Werff: Detecting Fingerspelling in Sign Language Videos Using Pose Information
 
- Toine Hulshof: Cross-Platform Mobile App Development - Translating SwiftUI to Jetpack Compose and vice versa
 
- Tom Smitjes: Connecting Mixed-Integer Linear Programming and Finite-memory POMDP Strategies
 
- Tosca Klijnsma: Semantic Equivalence of Task-Oriented Programs in TopHat
 
- Yannick Hogewind: Data-Driven Estimation of Retail Building Energy Consumption
 
2019
- Constantin Blach: Xoodoo Trail Analysis
 
- David Korsman: De oorzaken en gevolgen van het uitstellen van de IPv6-adoptie
 
- Dennis Kleverwal: Writing with Dobot Magician
 
- Gijs Hendriksen: Extending WASP providing context to a personal web archive
 
- Hendrik Werner: The State of Entropy Generation in Practice
 
- Hendrik Willing: Effectiveness of Common Defense Mechanisms Against Adversarial Inputs for DNN based Android Malware Detectors
 
- Huy Nguyen: Exploring Python as a replacement for C++ in Imperative Programming for Computing Science at Radboud University
 
- Jeroen Wijenbergh: Performance comparison of DNS over HTTPS to unencrypted DNS
 
- Justin Hende: MineChecker - A tool for detecting click-based browser cryptomining
 
- Kevin Heijligers: Algoritmen unplugged - conceptueel begrip van leerlingen in het voortgezet onderwijs
 
- Lars Jellema: Optimizing Ascon on RISC-V
 
- Lennart Jansen: Maatregelen ter bescherming van patiëntendossiers van extra beschermde personen tegen oneigenlijke inzage in ziekenhuizen
 
- Maaike van Leuken: Comparing Correlation Coefficient and Difference of Means in a Differential Power Analysis Attack
 
- Maarten Dorrestijn: Finding the guard leveraging bandwidth statistics to identify TOR guard nodes
 
- Manuela Bergau: Human-in-the-loop Strategy Synthesis PAC-MAN verified
 
- Max van Deurzen: The anatomy of the modern window manager - a case study for X in an Agile manner
 
- Nick Nibbeling: Comparing privacy plugins
 
- Nienke Wessel: The Semantics of Ownership and Borrowing in the Rust Programming Language
 
- Raka Schipperheijn: Implementing Xoodoo with protection against single fault attacks on Cortex-M4
 
- Reinier Joosse: An Extended Algorithm for Learning Serial Compositions of Mealy Machines
 
- Richard van Ginkel: Security in public Wi-Fi networks
 
- Robin Smit: A machine learning approach for recommending items in League of Legends
 
- Sam Sweere: Increasing the Perceptual Image Quality of Adversarial Queries for Content-based Image Retrieval
 
- Thomas_van_der_Burgt___Implementing_the_NIST_lightweight_cryptography_candidates_Xooday_and_Subterranean_2.0
 
- Thomas van Ouwerkerk: Investigating the minimality of the ZH-calculus
 
- Thomas Welten: Predicting Pelvic Floor Surgery Outcomes
 
2018
- Aaron Visschedijk: Trading Bitcoin using artificial neural networks
 
- Aucke Bos: Visulizing differences between HTML documents
 
- Bart Gruppen: From mu-regular expressions to CFGs and back
 
- Bart van den Boom: State machine inference of thread networking protocol
 
- Bart van de Put: Scoring Entity-Relationship Diagrams Drawn by a Computer Algorithm
 
- Bas Hofmans: Transducers over G-sets and their properties
 
- Bram in t Zandt: Software Supply Chain Security for Banking Websites
 
- Dion Scheper: Irma over Bluetooth
 
- Evi Sijben: A deep residual network for recognizing cluster-based generic photo categories
 
- Frank Gerlings: Digital flowchart maker
 
- Giel Besouw: Simulating NXT robots
 
- Gijs Cuyck: A complete version of the ADS method for comformance testing
 
- Hoang Gia Linh: Optimization of the NTT function on ARMv8-A SVE
 
- Ischa Stork: Performing an online template attack on two different implementations of FourQ
 
- Janne van den Hout: Continuations in functional programming languages
 
- Jan Potma: An exponential construction for Sokoban
 
- Jasper Haasdijk: Searching IPFS
 
- Jelle Loman: Comparing the performance of the Laplace and Staircase mechanisms in differential privacy
 
- Jeremy Guijt: Checking model learning hypotheses with symbolic execution
 
- Jeroen van Alem: Improving Mobile Ad Hoc Networks in Realtime Situations
 
- Jeroen van Voorst: Augmented reality as a general indoor and outdoor navigation solution
 
- Joep Veldhoven: Automata extended to nominal sets
 
- Jonathan Moerman: Evaluating the performance of open source static analysis tools
 
- Joris den Elzen: Characteristic Formulas and CakeML
 
- Jos Craaijo: An efficient parsing machine for PEGs
 
- Jules van Thoor: Learning state machines of TLS 1.3 implementations
 
- Leo Cornelissen: Simulating Lego Mindstorms EV3 robits using Unity and Python
 
- Lotte Fekkes: Comparing Bitcoin and Ethereum
 
- Mark Wijkhuizen: Security analysis of the Itasks framework
 
- Marnix Suilen: Reachability properties for uncertain MDPs
 
- Max Leijtens: Solar panels and LoRaWAN
 
- Mees Neijenhuis: Improving decision tree learning by looking ahead
 
- Mick Koomen: Using power analysis to differentiate between malicious repackaged apps and clean apps
 
- Nathan van Beusekom: Properties of codings in lambda-calculus
 
- Niek Janssen: Stateful Programming in Clean
 
- Niels Drueten: Security analysis of DTLS 1 2 implementations
 
- Niels van den Hork: Data Representatie van Afbeeldingen in het VO Lesontwerp en Begripsproblemen
 
- Nikki van der Gouw: Representatie van spraak in diepe neurale netwerken
 
- Noel Bangma: Ascon An attempt in NEON on the Cortex-A8
 
- Phil Geelhoed: Investigation into voice search
 
- Randy Wanga: Analysing Spotify listening data from Armada music
 
- Rick Lukassen: Determining the Neo-Piagetian reasoning level of novice programmers
 
- Robin Elbers: On the replication of CycleGAN
 
- Sander Hendrix: Accessing PEP data
 
- Sebastiaan Versteeg: Inferring state machines of Tunneled Direct-Link Setup
 
- Serena Rietbergen: 2-Way Finite Automata
 
- Stan van Lier: Robustness of federated averaging for non-IID data
 
- Tiko Huizinga: Using NFC enabled Android devices to attack RFID systems
 
- Timo Maarse: Parsing with derivatives in Haskell
 
- Timo Schrijvers: Learning register automata using Taint analysis
 
- Tom Nijholt: Why do we need and want cryptocurrency
 
- Tom Sweers: Autoencoding credit card fraude
 
- Willem van Summeren: Tree Automata
 
- Wouter de Boer: Power Analysis of the Ledger NanoS
 
2017
- Bart Veldhuizen: Automated state machine learning of IPsec implementations
 
- Camil Staps: Code-generation-for-the-Thumb-2-instruction-set
 
- Erin van der Veen: The Practical Performance of Automata Minimization Algorithms
 
- Flip van Spaendonck: Comparing Web Page Layouts using Tree Edit Distance
 
- Jan Martens: Parsing-expression-grammars-constructing-a-linear-time-parser
 
- Jordy Gennissen: Gamut Sifting through Images to Detect Android Malware
 
- Laurens Kuiper: Axis-Parallel Five-in-a-Row is PSPACE-Complete
 
- Luuk Arts: Comparing Discretization Methods for Applying Q-learning in Continuous State-Action Space
 
- Martin Meyers: Side channel protected Keyak on ARM Cortex-M4
 
- Marvin van Bekkum: Een technische en juridische analyse van het protocol van de Veilige E-mail Coalitie
 
- Mathis Sackers: A Comparison of String Distance Metrics on Usernames for Cross Platform Identification
 
- Matthias Vogelaar: Defining the Undefined in C
 
- Michel Botros: Supervised Learning in Human Activity Recognition based on Multimodal Body Sensing
 
- Michel Kok: A Context-based Introduction to Finite State Automata in Secondary Education
 
- Oussama Danba: Implementing the authenticated cipher MORUS using NEON
 
- Robin Tonen: Exploring Variable Ranges in Machine Learned Models
 
- Sietse Mooren: Link prediction op het RU domein
 
- Stan Derksen: Creating-a-secure-virtual-private-network-using-minimal-code
 
- Tessa Schlief: Leren-Programmeren-in-Python
 
- Thijs Voncken: Procedural-maze-generation-an-L-System-based-approach
 
- Thijs Werrij: Het-uitbreiden-en-evalueren-van-scatterplots
 
- Tim van Dijk: A high-performance threshold implementation of a BaseKing variant on an ARM architecture
 
- Toon Lenaerts: Improving-protocol-state-fuzzing-of-SSH
 
- Twan Cuijpers: Recognizing text in the wild
 
- Ward Theunisse: Breaking the chain Security analysis of a pilot system for detainee monitoring in the Dutch Custodial Institutions Agency
 
- Willem Boumans: Web tracking and current countermeasures
 
2016
- Abdullah Rasool: AAWSOME
 
- Bauke Brenninkmeijer: Catching IMSI-catcher-catchers
 
- Gerben van der Lubbe: A New Hope for Nussbaumer
 
- Ivar Derksen: HTML5 Tracking Techniques in Practice
 
- Jan Schmidt: Towards More Flexible Automatic Decision Making
 
- Jeftha Spunda: Approximate Nearest Neighbor Field Computation via k-d Trees
 
- Justin Mol: The Evolvability of iTasks using Normalized Systems
 
- Koen Basten: Classifying Landsat Terrain Images via Random Forests
 
- Lars Kuijpers: Invloed van MetaCost op imbalanced classificatie problemen
 
- Laurens Brinker: Security analysis of the IRMA app using SPARTA and fuzzing
 
- Maarten Schellevis: Getting access to your own Fitbit data
 
- Matjah Sonneveld: Protecting app secrets in Android
 
- Matthias Ghering: Evil Twin Vulnerabilities in Wi-Fi Networks
 
- Nick Tönissen: Een tool voor acceptatieonderzoek naar IT
 
- Patrick Tan: How to Evaluate Network Models Used in Clinical Decision Making
 
- Paul Huberts: Het gebruik van architectuurconcepten bij de ontwikkeling van web-mobiele applicaties
 
- Sander van Dam: Sufficient conditions for sound hashing using a truncated permutation
 
- Stijn Meijer: Secure Location Verification for ADS-B
 
- Ties Robroek: Accelerating BCCD using parallel computing
 
- Timo van Niedek: Phonetic Classification in TensorFlow
 
- Tom Nies: Privacy Protection Against Cross-Device Tracking Methods
 
- Tom Nikken: Een Deductieve Semantiek voor iTasks
 
- Tom Sandmann: Relevant biomarkers in the prediction of good and bad days for multiple sclerosis patients
 
- Wietse Kuipers: Improving matchmaking with game data
 
- Wouter van der Linde: Parallel SHA 256 in NEON for use in hash based signatures
 
2015
- Aaron van Geffen: Digitizing an interactive collaborative teaching methodology using web technologies
 
- Bas Elbers: De menselijke maat in een zich ontwikkelende techniek
 
- Berry Lyklema: Social Media & Werkafspraken
 
- Charlie Gerhardus: Een ownership based garbage collector voor de taal cgt
 
- Daniel Roeven: Snap-to-Style
 
- Daniel van Loon: Het overzichtelijk houden van kennis bij het gebruik van Scrum
 
- Demian Janssen: On-parsing-expression-grammars
 
- Dion van de Vooren: Hoe accuraat kun je de populariteit van muziek voorspellen met behulp van social media
 
- Emma Gerritse: Herbrands theorem
 
- Jolein Kluten: Inzet-van-speelelementen-bij-organisatie-veranderingen
 
- Jonathan Seesink: The applicability of Grinbath EyeGuide Tracker to mobile devices for usability testing
 
- Julian Neeleman: Optimisations and Generalisations of Retrograde Analysis
 
- Koen Vijverberg: Finding hyperintensities in the brain using unsupervised feature learning
 
- Leon Botros: Optimizing NORX for Atmel 8bit AVR microcontrollers
 
- Luuk Scholten: Transforming ORM into O-RM
 
- Martin Huyben: Toepassingen in COcaml
 
- Mats Ouborg: Formalizing Group Model Building
 
- Maurice Knoop: Introduction to YARMIS a dynamic alternative to RMI
 
- Michael Jansen: Smartphone privacy demo
 
- Rick Erkens: The Turing machine model extended with interaction
 
- Rob ten Berge: Statistical Model Checking of a Digital Hydraulic Power Management System
 
- Ronnie Swanink: Persistent-effects-of-man-in-the-middle-attacks
 
- Sanne Boumans: Lost in Translation Automatic Learning of Statistical Models for Language Translation
 
- Simon Brugman: Computationally Feasible Logo Recognition using Deep Learning
 
- Stan Philipsen: Usability van Wikipedia editors
 
- Stijn Voss: Training the CIA model using back propagation
 
- Sven Arissen: 414 bit multiplication on the ARM Cortex M0
 
- Thomas de Bel: K Means clustering of a database with PTSD and other psychiatric patients
 
- Thom Wiggers: Implementing CAESAR candidate Prost on ARM11
 
- Tobias Schroeter: Het gebruik van Automated Assessment Tools in programmeercursussen
 
- Tom Evers: Twee-manieren-voor-het-leren-van-een-DTD-bij-voorbeelden-van-XML-documenten
 
- Tom van Bussel: Inferring gene regulatory data
 
2014
- Ben Brucker: Government intervention on consumer crypto hardware
 
- Gerco van Heerdt: Efficient Inference of Mealy Machines
 
- Gerdriaan Mulder: LTE WiFi Handover Strangelove
 
- Jip Dekker: Generating Google Go framework from Uppaal models
 
- Joep Top: Een BASS-FinLog achitectuuranalyse
 
- Jory van Keulen: Smart Charging A privacy and security analysis
 
- Lars Bade: Vertrouwelijkheid in het iRN
 
- Laurens van Dijk: Finding musical genre similarity using machine learning techniques
 
- Marvin Barron: Shortest Path Estimation for small world networks
 
- Max Tijssen: Automatic modeling of SSH implementations with state machine learning algorithms
 
- Mirjam van Nahmen: Automatically Learning a Model of the SSH2 Transport Layer
 
- Moritz Neikes: Efficiency of large scale DC networks
 
- Patrick Verleg: Cache Cookies searching for hidden browser storage
 
- Pien Walraven: Communicatie binnen software development teams Scrum versus waterval
 
- Rafael Alejandro Imamgiller: Formal Characterisation of the Functional Strategy
 
- Ramon van Sparrentak: A concrete deskolemization algorithm
 
- Rodin Aarssen: Proving a folk theorem using Kleene Algebra with Tests
 
- Tim Janssen: A Linear Quantile Mixed Regression Model for Prediction of Airline Ticket Prices
 
- Wesley Janssen: Curve25519 in 18 tweets
 
2013
- Bas van Zadelhoff: Towards Large Diagnostic Bayesian Network Models
 
- Ben Siebert: Smartphone-privacy
 
- Bram Arends: Quaternionen voor proper rigid body transformations in computer graphics
 
- Eduardo Pablo Novella Lorente: Reverse engineering Internet Banking
 
- Elmar Dongelmans: Leerstijlen en e-learning
 
- Idzard Stoker: Computational thinking in lesmateriaal voor informatica
 
- Joel Cox: Profiling knowledge workers using open online profiles
 
- Joeri Arendsen: Advance Organizers
 
- Joost Janssen: The ACCQ Methodology Assuring Consumer Satisfaction of Cloud Service Quality
 
- Joost Rijneveld: How the Dutch broke the Japanese Blue Code in the late 1930s
 
- Judith van Stegeren: Exploring the inference problem for D0L-Systems
 
- Kelley Philip van Evert: Graph models for the untyped lambda-calculus
 
- Kevin Valk: AndroidCard A framework for writing NFC applets on Android
 
- Koen Buitenhuis: DigiD vs. JavaScript the risk of using third party JavaScript on government websites
 
- Koen van Ingen: Cookiewalls Een probleem met een technische oplossing
 
- Linus van Elswijk: Hierarchical Path-Finding Theta star Combining HPA star and Theta star
 
- Maarten Bovy: Digitale medische verslaglegging Een koppeling tussen patient conditie en dossier
 
- Martijn Terpstra: WhatsApp and privacy
 
- Mathijs Vos: Voor de draad ermee Een vakdidactische verkenning van programmeren met threads
 
- Matthijs Hendriks: Analysing Multicriteria Route Planning
 
- Nicky van Rijsbergen: Responsible Disclosure een kritische beschouwing
 
- Niels van der Weide: Computing Exact Solutions of Initial Value Problems
 
- Petra van den Bos: Vakdidactische aspecten van security
 
- Ramon Janssen: Learning a State Diagram of TCP Using Abstraction
 
- Raoul Estourgie: Analysis of Android Authenticators
 
- Robin Munsterman: Equality of infinite objects
 
- Sanne Derckx: Is de smartphone smart genoeg voor ouderen
 
- Sven van Valburg: Security of Browser Add-ons A Firefox 21 Case Study
 
- Thomas Naegele: MapReduce Framework Performance Comparison
 
- Wouter Geraedts: Time-Based Modeling and Verification of Flow Systems in UPPAAL
 
2012
- Bas Visser: Facebook Privacy
 
- Bas Vossen: Problem Solving Perspectives
 
- Beau Verdiesen: The webmail experience
 
- Christiaan Hillen: The IT Anamnesis
 
- Danny Romme: Hoe denken middelbare scholieren over de Informatiewetenschappen
 
- Dennis Brentjes: Concurrency issues in the iTasks3 framework
 
- Eamonn Cassidy: Hoe draagt draadloze communicatie bij aan de procescommunicatie binnen de Nederlandse Spoorwegen
 
- Erik Boss: Evaluating implementations of SSH by means of model-based testing
 
- Feike Geerts: Usability Microsoft Word
 
- Ferdi van der Werf: Op zoek naar mogelijkheden en randvoorwaarden voor robotica onderwijs in het VWO
 
- Hans Harmannij: Logging NFC data on a Google Nexus S
 
- Ivan Koster: Reinforcement Learning and the Parallel Actions Common Goal problem
 
- Jan Vogels: Regels voor Serious Gaming in Requirements Engineering
 
- Jasper van Duijnhoven: How can game genres contribute to the learning process
 
- Joost Kraaijeveld: Probabilistic causal logic in discrete event training simulations
 
- Koray Yanik: Designing a functional and minimalistic Operating System
 
- Ko Stoffelen: Comparison of chain merge behaviour of TMTO methods
 
- Manu Drijvers: Model Checking Tamper-Evident Pairing
 
- Marcel van der Made: Een case-study naar het leren van real-time automaten
 
- Marc Schoolderman: Fuzzy lexical matching
 
- Marijn van der Zaag: Digitalisering van contant geld
 
- Mark Zandstra: Genereren van operationele specificaties aan de hand van UML diagrammen
 
- Mehdi Aqadjani Memar: Hardware Onafhankelijk Besturingssysteem
 
- Michiel van Lierop: Crossing Borders an Analysis of the Experiences of Dutch Bachelor Students Working on the Community Outreach Project in India and Zambia
 
- Niklas Weber: Typed Skipgrams Investigated
 
- Patrick Schileffski: Do not track
 
- Peter Maandag: Solving 3-Sat
 
- Philipp Jakubeit: Implementation and Analysis of OpenPGP Functionality via NFC
 
- Robert Kleinpenning: Is Javacardsign correct and secure
 
- Roberto Alves de Almeida Junior: Model-based Testing with a B Model of the EMV Standard
 
- Sjors Gielen: SIM Toolkit In Practice
 
- Stein Keijzers: Voxel Pad Reductie
 
- Tim Cooijmans: Internetverkeer als bewijsmateriaal
 
- Tom de Ruijter: Online and co-regularized algorithms for large scale learning
 
- Willem Burgers: Session Proxy A prevention method for session hijacking in Blackboard
 
- Xander Damen: Een keuze voor webserver architecturen afhankelijk van het dynamisch karakter van een website
 
2011
- Anne Westerhof: Antivirus software versus Malware
 
- Bart Leusink: Serious Gaming in Software Engineering
 
- Bart Lutgens: Stealth SMS Description of how it works
 
- Bram Vonk: Autoriteiten vinden op Twitter
 
- Christiaan Thijssen: Leefpatronen in Twitterberichten van actieve gebruikers
 
- Dennis Aarts: Modeling concepts taught by a board game
 
- Erik Maessen: FNWISurvey Nieuw enquete systeem voor de FNWI
 
- Geert Smelt: Programming Web Applications Securely
 
- Ilian van der Velden: Leren programmeren Programmeeronderwijs op de middelbare school
 
- Iris Trepels: The Open Source Community and Piracy
 
- Joost Kremers: Practical hacking AES using the S-box weakness
 
- Joost Timmerman: Where am I? Where should I go?
 
- Kevin Reintjes: Veiliger authenticeren met de Yubikey
 
- Nick Gubbels: Extending F-lite with generic: G-lite
 
- Niek Wolfkamp: Online and offline privacy
 
- Niels Braakensiek: Organisational Communication uitdrukbaar in Demo?
 
- Rens van Summeren: Security in Online Gaming
 
- Robin Oostrum: De kwaliteit van fonetische transcripties
 
- Rob Thijssen: Argument based modeling analyses on business process models
 
- Roel van Rijswijck: Negotiations as Conceptualizations
 
- Steffen Janssen: Decoding directed covert attention in BCIs using HMMs
 
- Tim van Lokven: Review and Comparison of Instant Messaging Protocols
 
- Wouter Lockefeer: CleanDoc
 
2010
- Albert Gerritsen: Expressieherkenning
 
- Antolin Janssen: Kernel Machines for Multi-Class Classification: A Joint Kernel Approach
 
- Bram Bruines: Plankalkul
 
- Carsten Ruetz: Timed Model-Based Conformance testing
 
- Jeffrey Kwee: Serious Gaming in Requirements Engineering
 
- Jeffrey Lemein: fMRI-Based Image Reconstruction Using the Elastic Net
 
- Lars Lockefeer: Encrypted SMS an analysis of the theoretical necessities and implementation possibilities
 
- Louis Onrust: Paraphrasing factoid dependency trees into fluent sentences in a natural language
 
- Marco Henrix: Aan de hand van hersenactiviteit reconstrueren wat iemand ziet
 
- Mark Spreeuwenberg: Het testen van smart meters
 
- Marlon Baeten: Rahisi simple web development
 
- Martin Devillers: Analyzing password strength
 
- Rik Janssen: Hoe ziet een systeem eruit dat klassiek slagwerkles computationeel kan ondersteunen?
 
- Robin Rutten: XMPP en het real-time web
 
- Royce Benda: Informatiekunde Inleven en laten Beleven
 
2009
- Daan Pijper: Requirements, informatica versus architectuur
 
- Feng Zhu: Smart Card Based Solutions for Secure Internet Banking with a primitive reader or mobile phone
 
- Freek van den Berg: Creating a meta model describing a production system's concepts and their relations
 
- Jelle Schuhmacher: Intrusion Detection met Core Vector Machines
 
- Jeroen Claassens: Hamminggetallen Een complexiteitsvergelijking tussen verschillende algoritmen
 
- Joost Koppers: Database encryptie schema's Omgaan met privacygevoelige informatie
 
- Jos Groenewegen: Supporting sign language in Human Computer Interaction Understanding the challenge
 
- Kevin Vriens: Automatisch parkeren: Hoe werkt het?
 
- Koen Hulsman: Persoonlijk nieuws: een kijkje in de keuken van de personalisatie van online nieuwswebsites
 
- Martijn Sprengers: The Effects of Different Bayesian Poison Methods on the Quality of the Bayesian Spam Filter SpamBayes
 
- Matthijs Smith: Implicit Information Retrieval
 
- Mirko van Ede: Testondersteuning in frameworks voor webapplicaties
 
- Pepijn Arts: Semantische Web Services
 
- Philipp van Bebber: Internet Banking Shopping: De gevaren achter het hangslot
 
- Richard Willems: Knowledge sharing and retention through the use of collaboration software
 
- Ruben Muijrers: Expressieherkenning met PCA en SVM
 
- Sander van Hooft: ICT for Ethiopia's land administration
 
- Steffen Michels: Analysing Onion Routing
 
- Thierry Stamper: Mislukte IT projecten: een kwestie van beter plannen?
 
- Walter Moerkerken: Conceptualiseringstechnieken uit de ICT toegepast op Enterprise Architecturing
 
2008
- Adam Cornelissen: A Modern Turing Test
 
- Bernard van Gastel: Reliability of a read-write lock implementation
 
- Erik Crombag: DigiCoach
 
- Erik Steinmann: De acceptatie van internetcensuur door bezoekers van Nederlandse online nieuwsgemeenschappen
 
- Fabian van den Broek: Static Code Analysis In Java
 
- Julian Verdurmen: Firefox extension security
 
- Julius Muecke: Database Schema Integratie
 
- Juul Coolen: Temporele doorloop in systeemontwikkeling recht-toe-recht-aan versus herhaling
 
- Laura Nij Bijvank: Automatische code generatie met de TimesTool
 
- Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
 
- Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
 
- Martijn Ermers: Datatranslatie met MT
 
- Robbert Krebbers: Uitdrukkingskracht van XML schema's
 
- Rolf Markwat: SOA: Bijdrage of hype voor portal Radboud Universiteit?
 
2007
- Allan van Hulst: From Java to mCRL2
 
- Bart Schotten: Een Vergelijking van Elektronische Betaalmethoden voor E-commerce
 
- Eddy Klomp: Quality Aspects and Decision Points
 
- Frank van der Loo: Error correctie in VOiP
 
- Freek Verbeek: Getallen En Functies In De Pi-Calculus
 
- Ilona Wilmont: Enhancing usability for elderly people
 
- Jean-Pierre de Rooij: Is an electronic passport usable as an authentication token?
 
- Johan Janssen: Using JML to protect Java code against SQL injection
 
- Jordy Voesten: Business Rules and iData: A Powerful Combination?
 
- Nina Hoedt: Internetverslaving onder Informatica en Informatiekunde studenten
 
- Sven Haster: Een technische analyse van RIESKOA
 
- Wouter Roelofs: The AOL Scandal
 
2006
- Alex Hamakers: Nieuwe werelden, oude gevaren: cheating in MMORPGs
 
- Daan Laros: Integriteit van mens en systeem
 
- Danny Sarbo: Bachelorscriptie Informatiekunde
 
- Dennis Janse: Het Semantische Web
 
- Dirk Tonnaer: Diagnostic decision support in de huisartsgeneeskunde
 
- Eelis van der Weegen: Formalizing the Hamming Stream in Coq
 
- Francois Kooman: Websurfen met onbetrouwbare computers
 
- Hensley Hanse: Formele talen voor een formele RE
 
- Johan Stortelder: Spraaksynthese
 
- John Akkermans: Online privacy in ruil voor terrorismebestrijding
 
- Mark Jenniskens: De toepasbaarheid van ISO 9126 voor kwaliteitsbeoordeling van m-services
 
- Mark van Liefland: Requirements Engineering bij marktgedreven IT-bedrijven
 
- Martijn Moraal: Massive Multiplayer Online Game Architectures
 
- Martin van de Goor: Genetische algoritmes en parallellisme
 
- Matthijs Mekking: Capability of Kerberos
 
- Matthijs van Roosmalen: Requirements & Verandering
 
- Paul Dekkers: Publieke Software
 
- Rene Joosten: Requirements Engineering voor informatiesystemen
 
- Rody Kersten: The composition Agreement in Ambient Networks
 
- Rogier Lommers: Profiling onder studenten Informatica en Informatiekunde
 
- Roy Bos: Informatiearchitectuur
 
- Thomas Dobbe: Requirements Traceability
 
- Thomas Janssen: Recommender Systems voor het realtime aanbieden van nieuwssecties
 
- Tom van den Broek: Object Relational Mappings
 
- Vincent Driessen: The Power of Wobbly Types
 
This page was generated on Mon Nov  3 03:33:39 AM CET 2025