Overzicht CSA scripties

Ieder jaar in februari studeren er ‘CSA-studenten’ af. Zij ontvangen tijdens een feestelijke ceremonie in aanwezigheid van familie, vrienden, werkgevers hun MSc Cyber Security van de Universiteit Leiden uit handen van docenten op de Campus van The Hague Security Delta. De CSA-studenten komen uit diverse publieke en private organisaties en werken als CISO, consultant, beleidsmedewerker, jurist, IT-specialist, project-/procesmanager, etc. De scripties bestrijken een brede variëteit van cyber security onderwerpen en presenteren inzichten en oplossingen voor verscheidene cyber security uitdagingen. Zie hieronder een overzicht op titel, auteur en keywords.

 

 

 

 

  • A cybersecurity information sharing process for Storm Su...
    Master CS/Jeroen Gaiser
    >
  • A cybersecurity info...
    Master CS/Jeroen Gaiser
    >
  • A cybersecurity information sharing process for Storm Su...
    Master CS/Jeroen Gaiser
    >
  • A de minimis rule for personal data breach notifications...
    Master CS/Machiel Bolhuis
    >
  • A de minimis rule fo...
    Master CS/Machiel Bolhuis
    >
  • A de minimis rule for personal data breach notifications...
    Master CS/Machiel Bolhuis
    >
  • A generic approach for detecting security anomalies in I...
    Master CS/Jaap Mooij
    >
  • A generic approach f...
    Master CS/Jaap Mooij
    >
  • A generic approach for detecting security anomalies in I...
    Master CS/Jaap Mooij
    >
  • A methodology for quantifying the level of cybersecurity...
    Master CS/Robert de Vries
    >
  • A methodology for qu...
    Master CS/Robert de Vries
    >
  • A methodology for quantifying the level of cybersecurity...
    Master CS/Robert de Vries
    >
  • A Process Model for Phishing Prevention
    Master CS/Paulo Ribeiro do Nascimento
    >
  • A Process Model for...
    Master CS/Paulo Ribeiro do Nascimento
    >
  • A Process Model for Phishing Prevention
    Master CS/Paulo Ribeiro do Nascimento
    >
  • A security architecture for software defined wide area n...
    Master CS/Mark Dirksen
    >
  • A security architect...
    Master CS/Mark Dirksen
    >
  • A security architecture for software defined wide area n...
    Master CS/Mark Dirksen
    >
  • An improved key distribution and updating mechanism for...
    Master CS/Marcel van Leent
    >
  • An improved key dist...
    Master CS/Marcel van Leent
    >
  • An improved key distribution and updating mechanism for...
    Master CS/Marcel van Leent
    >
  • Are the Dutch government controls for the protection of...
    Master CS/Erik van Garderen
    >
  • Are the Dutch govern...
    Master CS/Erik van Garderen
    >
  • Are the Dutch government controls for the protection of...
    Master CS/Erik van Garderen
    >
  • Can a Robot Do My Job? A Study on the Potential of Artif...
    Master CS/Esther van Luit
    >
  • Can a Robot Do My Jo...
    Master CS/Esther van Luit
    >
  • Can a Robot Do My Job? A Study on the Potential of Artif...
    Master CS/Esther van Luit
    >
  • Can NL trust 5G?
    Master CS/Farley Wazir
    >
  • Can NL trust 5G?
    Master CS/Farley Wazir
    >
  • Can NL trust 5G?
    Master CS/Farley Wazir
    >
  • Caring for Security
    Master CS/David Willems
    >
  • Caring for Security
    Master CS/David Willems
    >
  • Caring for Security
    Master CS/David Willems
    >
  • ConsensusPKI. Data driven public key ecosystem backed by...
    Master CS/Volkan Kaya
    >
  • ConsensusPKI. Data d...
    Master CS/Volkan Kaya
    >
  • ConsensusPKI. Data driven public key ecosystem backed by...
    Master CS/Volkan Kaya
    >
  • Cyber Confidence-Building Measures
    Master CS/Kraesten Arnold
    >
  • Cyber Confidence-Bui...
    Master CS/Kraesten Arnold
    >
  • Cyber Confidence-Building Measures
    Master CS/Kraesten Arnold
    >
  • Cyber Threat Intelligence
    Master CS/Daan Planqué
    >
  • Cyber Threat Intelli...
    Master CS/Daan Planqué
    >
  • Cyber Threat Intelligence
    Master CS/Daan Planqué
    >
  • Essence of Encryption
    Master CS/Jeroen Veen
    >
  • Essence of Encryptio...
    Master CS/Jeroen Veen
    >
  • Essence of Encryption
    Master CS/Jeroen Veen
    >
  • Evaluating server-side internet proxy detection methods
    Master CS/Hans Hoogstraaten
    >
  • Evaluating server-si...
    Master CS/Hans Hoogstraaten
    >
  • Evaluating server-side internet proxy detection methods
    Master CS/Hans Hoogstraaten
    >
  • Exploring the Dutch Digital Infrastructure. Data Issues,...
    Master CS/Alex Claver
    >
  • Exploring the Dutch...
    Master CS/Alex Claver
    >
  • Exploring the Dutch Digital Infrastructure. Data Issues,...
    Master CS/Alex Claver
    >
  • Fake news, or framed news, that is the question
    Master CS/Elserike Looije
    >
  • Fake news, or framed...
    Master CS/Elserike Looije
    >
  • Fake news, or framed news, that is the question
    Master CS/Elserike Looije
    >
  • Fighting in the fifth dimension
    Master CS/John van Veenhuizen
    >
  • Fighting in the fift...
    Master CS/John van Veenhuizen
    >
  • Fighting in the fifth dimension
    Master CS/John van Veenhuizen
    >
  • Guaranteeing authenticity and integrity in signalling ex...
    Master CS/Ewout Pronk
    >
  • Guaranteeing authent...
    Master CS/Ewout Pronk
    >
  • Guaranteeing authenticity and integrity in signalling ex...
    Master CS/Ewout Pronk
    >
  • How to bring HTTPS to the masses?
    Master CS/Maarten Aertsen
    >
  • How to bring HTTPS t...
    Master CS/Maarten Aertsen
    >
  • How to bring HTTPS to the masses?
    Master CS/Maarten Aertsen
    >
  • Improving cyber safety awareness education at Dutch elem...
    Master CS/Arjan Spiering
    >
  • Improving cyber safe...
    Master CS/Arjan Spiering
    >
  • Improving cyber safety awareness education at Dutch elem...
    Master CS/Arjan Spiering
    >
  • Managing risks in the cyber realm: From a traditional to...
    Master CS/Emma Meines
    >
  • Managing risks in th...
    Master CS/Emma Meines
    >
  • Managing risks in the cyber realm: From a traditional to...
    Master CS/Emma Meines
    >
  • Multi actor roadmap to improve cyber security of consume...
    Master CS/Herbert Leenstra
    >
  • Multi actor roadmap...
    Master CS/Herbert Leenstra
    >
  • Multi actor roadmap to improve cyber security of consume...
    Master CS/Herbert Leenstra
    >
  • Multi-stakeholder roadmap for implementing consumer vuln...
    Master CS/Hinko Bastiaanse
    >
  • Multi-stakeholder ro...
    Master CS/Hinko Bastiaanse
    >
  • Multi-stakeholder roadmap for implementing consumer vuln...
    Master CS/Hinko Bastiaanse
    >
  • Payment Services Directive 2
    Master CS/Stephan Hellmann
    >
  • Payment Services Dir...
    Master CS/Stephan Hellmann
    >
  • Payment Services Directive 2
    Master CS/Stephan Hellmann
    >
  • Policy instruments and the adoption of DNSSEC; A case st...
    Master CS/Rene Bakker
    >
  • Policy instruments a...
    Master CS/Rene Bakker
    >
  • Policy instruments and the adoption of DNSSEC; A case st...
    Master CS/Rene Bakker
    >
  • Policy strategies for VPN for consumers in the Netherlan...
    Master CS/Nelly Ghaoui
    >
  • Policy strategies fo...
    Master CS/Nelly Ghaoui
    >
  • Policy strategies for VPN for consumers in the Netherlan...
    Master CS/Nelly Ghaoui
    >
  • Processing Electromagnetic Parameters from a Secret Data...
    Master CS/Susan Varenbrink
    >
  • Processing Electroma...
    Master CS/Susan Varenbrink
    >
  • Processing Electromagnetic Parameters from a Secret Data...
    Master CS/Susan Varenbrink
    >
  • Public Private Partnership in the French National Cyber...
    Master CS/René Marchal
    >
  • Public Private Partn...
    Master CS/René Marchal
    >
  • Public Private Partnership in the French National Cyber...
    Master CS/René Marchal
    >
  • Public-Private Partnerships in Indian Industrial IoT.
    Master CS/Chandrasekhar Muppiri
    >
  • Public-Private Partn...
    Master CS/Chandrasekhar Muppiri
    >
  • Public-Private Partnerships in Indian Industrial IoT.
    Master CS/Chandrasekhar Muppiri
    >
  • Reports, Rewards, and Recriminations. A critical look at...
    Master CS/Kees Wassenaar
    >
  • Reports, Rewards, an...
    Master CS/Kees Wassenaar
    >
  • Reports, Rewards, and Recriminations. A critical look at...
    Master CS/Kees Wassenaar
    >
  • Risk assessment for I2P with an enhanced outproxy design
    Master CS/Dolf Smits
    >
  • Risk assessment for...
    Master CS/Dolf Smits
    >
  • Risk assessment for I2P with an enhanced outproxy design
    Master CS/Dolf Smits
    >
  • SDN South-bound Interface Attack Mitigation
    Master CS/Lucio Jankok
    >
  • SDN South-bound Inte...
    Master CS/Lucio Jankok
    >
  • SDN South-bound Interface Attack Mitigation
    Master CS/Lucio Jankok
    >
  • Targeted attacks and the human vulnerability
    Master CS/Derk-Jan van Mourik
    >
  • Targeted attacks and...
    Master CS/Derk-Jan van Mourik
    >
  • Targeted attacks and the human vulnerability
    Master CS/Derk-Jan van Mourik
    >
  • The Design of a Risk Management Framework for Machine Le...
    Master CS/Antony Hibbert
    >
  • The Design of a Risk...
    Master CS/Antony Hibbert
    >
  • The Design of a Risk Management Framework for Machine Le...
    Master CS/Antony Hibbert
    >
  • The implementation of the Dutch Cabinet’s policy on data...
    Master CS/Carlo Koch
    >
  • The implementation o...
    Master CS/Carlo Koch
    >
  • The implementation of the Dutch Cabinet’s policy on data...
    Master CS/Carlo Koch
    >
  • The influence of Dark Web on border control
    Master CS/Edwin Noordzij
    >
  • The influence of Dar...
    Master CS/Edwin Noordzij
    >
  • The influence of Dark Web on border control
    Master CS/Edwin Noordzij
    >
  • The Internet of Things: a privacy label for IoT products...
    Master CS/Rob van Diermen
    >
  • The Internet of Thin...
    Master CS/Rob van Diermen
    >
  • The Internet of Things: a privacy label for IoT products...
    Master CS/Rob van Diermen
    >
  • The Unified Kill Chain
    Master CS/Paul Pols
    >
  • The Unified Kill Cha...
    Master CS/Paul Pols
    >
  • The Unified Kill Chain
    Master CS/Paul Pols
    >