Leiden University Student Repository

Search results

(21 - 40 of 62)

Pages

Security Risk Assessment of LoRaWan
Reports, Rewards, and Recriminations A Critical Look At The Practice Of Responsible Disclosure Of Vulnerabilities
SDN South-bound Interface Attack Mitigation
Algorithmic Transparency
Weapons security comply or explain
A Process Model for Phishing Prevention
Evaluating server-side internet proxy detection methods
A generic approach for detecting security anomalies in ISP infrastructures
The influence of human behaviour on cybercrime
How to bring HTTPS to the masses? Measuring issuance in the first year of Let's Encrypt
Multi-stakeholder roadmap for implementing consumer vulnerability management.
The Internet of Things: a privacy label for IoT products in a consumer market
Caring for Security: an analysis of the security of eHealth services of Dutch General Practitioners
Dealing with uncertainty: cybersecurity risk assessment approaches.
The influence of law & regulations on the process of digital transformation at banks in the Netherlands
Multi actor roadmap to improve cyber security of consumer used connected cars
The Design of a Risk Management Framework for Machine Learning Systems in Industry 4.0

Pages