Cyber Security

Attack & Defend CTF: Gamified Cybersecurity
Attack & Defend CTF: Gamified Cybersecurity

Dit onderzoek heeft zich gericht op het ontwerpen, uitvoeren en overdragen van een Attack & Defend Capture the Flag (CTF), een ...

Read more
Building an AI Agent for Understandable Security
Building an AI Agent for Understandable Security

What is the best approach to developing an AI agent that assists users of AtticSecurity.com in monitoring and responding to Office ...

Read more
How secure are IoT products?
How secure are IoT products?

"How well are IoT devices protected against common and emerging cybersecurity threats using the provided framework on IoT ...

Read more
InfoSec Agent
InfoSec Agent

How to re-design Guadian360’s InfoSec vulnerability scanner for Debian based systems?

Read more
IoT security test workbench
IoT security test workbench

How can a security test bench for IoT devices be created to complement the INTERSECT framework, to perform automated security ...

Read more
Police Automating Interview
Police Automating Interview

The project: ...

Read more
Security of Homomorphic Encryption
Security of Homomorphic Encryption

The main research question of the project is: "What are the security implications of using Homomorphic Encryption?" ...

Read more
Security Upgrade
Security Upgrade

How to ensure viable and safe tool, including info sec, while also testing the cyber security of the web app?

Read more
Showcasing IoT Security Best Practices
Showcasing IoT Security Best Practices

Hoofdvraag: How can best practices in IoT security be implemented and demonstrated to ensure secure IoT systems? ...

Read more
Curious to learn more about the InnovationLab? Get in touch!

Let's talk!