20142017
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Maarten Hinderik Everts is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles
HTTP Engineering & Materials Science
Moderators Engineering & Materials Science
Visualization Engineering & Materials Science
Flow visualization Engineering & Materials Science
Cryptography Engineering & Materials Science
Transfer functions Engineering & Materials Science
Brain Engineering & Materials Science
voter Social Sciences

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2014 2017

  • 7 Conference contribution
  • 1 Paper
  • 1 Article
  • 1 Working paper
4 Citations (Scopus)
3 Downloads (Pure)

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting

Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

HTTP
Communication
Malware

Multi-client Predicate-only Encryption for Conjunctive Equality Tests

van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2017.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
Cryptography
Hardware
Monitoring
Testing
3 Citations (Scopus)
2 Downloads (Pure)

Private Sharing of IOCs and Sightings

van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2016, 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. New York: Association for Computing Machinery (ACM), p. 35-38 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

information exchange
compromise
candidacy
threat
evaluation

Reliably determining data leakage in the presence of strong attackers

Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W. & Hartel, P. H., Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: Association for Computing Machinery (ACM), p. 484-495 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Vote to link: Recovering from misbehaving anonymous users

Lueks, W., Everts, M. H. & Hoepman, J. H., 24 Oct 2016, WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. Association for Computing Machinery (ACM), p. 111-122 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Moderators
voter
moderator
service provider
reputation