Every year in February ‘CSA students' graduate. During a festive ceremony they receive their MSc Cyber ​​Security at Leiden University from lecturers at the Campus of The Hague Security Delta in the presence of family, friends, employers. These MSc graduates come from a variety of public and private organisations and have a job role as CISO, consultant, policy, lawyer, IT specialist, project / process manager, etc. Theses cover a wide variety of subjects and present innovative insights and solutions for various cyber security challenges. See an overview below of titles, authors and keywords.

 

 

 

  • A de minimis rule for personal data breach notifications...
    Machiel Bolhuis
    >
  • A de minimis rule fo...
    Machiel Bolhuis
    >
  • A de minimis rule for personal data breach notifications...
    Machiel Bolhuis
    >
  • A generic approach for detecting security anomalies in I...
    Jaap Mooij
    >
  • A generic approach f...
    Jaap Mooij
    >
  • A generic approach for detecting security anomalies in I...
    Jaap Mooij
    >
  • A Process Model for Phishing Prevention
    Paulo Ribeiro do Nascimento
    >
  • A Process Model for...
    Paulo Ribeiro do Nascimento
    >
  • A Process Model for Phishing Prevention
    Paulo Ribeiro do Nascimento
    >
  • An improved key distribution and updating mechanism for...
    Marcel van Leent
    >
  • An improved key dist...
    Marcel van Leent
    >
  • An improved key distribution and updating mechanism for...
    Marcel van Leent
    >
  • Caring for Security
    David Willems
    >
  • Caring for Security
    David Willems
    >
  • Caring for Security
    David Willems
    >
  • Cyber Confidence-Building Measures
    Kraesten Arnold
    >
  • Cyber Confidence-Bui...
    Kraesten Arnold
    >
  • Cyber Confidence-Building Measures
    Kraesten Arnold
    >
  • Cyber Threat Intelligence
    Daan Planqué
    >
  • Cyber Threat Intelli...
    Daan Planqué
    >
  • Cyber Threat Intelligence
    Daan Planqué
    >
  • Essence of Encryption
    Jeroen Veen
    >
  • Essence of Encryptio...
    Jeroen Veen
    >
  • Essence of Encryption
    Jeroen Veen
    >
  • Guaranteeing authenticity and integrity in signalling ex...
    Ewout Pronk
    >
  • Guaranteeing authent...
    Ewout Pronk
    >
  • Guaranteeing authenticity and integrity in signalling ex...
    Ewout Pronk
    >
  • How to bring HTTPS to the masses?
    Maarten Aertsen
    >
  • How to bring HTTPS t...
    Maarten Aertsen
    >
  • How to bring HTTPS to the masses?
    Maarten Aertsen
    >
  • Multi actor roadmap to improve cyber security of consume...
    Herbert Leenstra
    >
  • Multi actor roadmap...
    Herbert Leenstra
    >
  • Multi actor roadmap to improve cyber security of consume...
    Herbert Leenstra
    >
  • Payment Services Directive 2
    Stephan Hellmann
    >
  • Payment Services Dir...
    Stephan Hellmann
    >
  • Payment Services Directive 2
    Stephan Hellmann
    >
  • Policy strategies for VPN for consumers in the Netherlan...
    Nelly Ghaoui
    >
  • Policy strategies fo...
    Nelly Ghaoui
    >
  • Policy strategies for VPN for consumers in the Netherlan...
    Nelly Ghaoui
    >
  • SDN South-bound Interface Attack Mitigation
    Lucio Jankok
    >
  • SDN South-bound Inte...
    Lucio Jankok
    >
  • SDN South-bound Interface Attack Mitigation
    Lucio Jankok
    >
  • Targeted attacks and the human vulnerability
    Derk-Jan van Mourik
    >
  • Targeted attacks and...
    Derk-Jan van Mourik
    >
  • Targeted attacks and the human vulnerability
    Derk-Jan van Mourik
    >
  • The implementation of the Dutch Cabinet’s policy on data...
    Carlo Koch
    >
  • The implementation o...
    Carlo Koch
    >
  • The implementation of the Dutch Cabinet’s policy on data...
    Carlo Koch
    >
  • The influence of Dark Web on border control
    Edwin Noordzij
    >
  • The influence of Dar...
    Edwin Noordzij
    >
  • The influence of Dark Web on border control
    Edwin Noordzij
    >