Cyber Security

Dit onderzoek heeft zich gericht op het ontwerpen, uitvoeren en overdragen van een Attack & Defend Capture the Flag (CTF), een ...

What is the best approach to developing an AI agent that assists users of AtticSecurity.com in monitoring and responding to Office ...

"How well are IoT devices protected against common and emerging cybersecurity threats using the provided framework on IoT ...

How to re-design Guadian360’s InfoSec vulnerability scanner for Debian based systems?

How can a security test bench for IoT devices be created to complement the INTERSECT framework, to perform automated security ...

The main research question of the project is: "What are the security implications of using Homomorphic Encryption?" ...

How to ensure viable and safe tool, including info sec, while also testing the cyber security of the web app?

Hoofdvraag: How can best practices in IoT security be implemented and demonstrated to ensure secure IoT systems? ...