Maarten Hinderik Everts

dr.

20142020

Research activity per year

If you made any changes in Pure these will be visible here soon.

Fingerprint

Dive into the research topics where Maarten Hinderik Everts is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting

    Bortolameotti, R., van Ede, T. S., Continella, A., Hupperich, T. M., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A., 30 Mar 2020, 35th Annual ACM Symposium on Applied Computing, SAC 2020. Association for Computing Machinery (ACM), p. 1696-1705 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    3 Citations (Scopus)
    203 Downloads (Pure)
  • Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach

    Lathouwers, S., Everts, M. & Huisman, M., 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SCITEPRESS Digital Library, p. 784-795 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    102 Downloads (Pure)
  • Practical Mutation Testing for Smart Contracts

    Honig, J. J., Everts, M. H. & Huisman, M., 2019, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Pérez-Solà, C., Navarro-Arribas, G., Biryukov, A. & García-Alfaro, J. (eds.). Cham: Springer, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 11737).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
    1 Downloads (Pure)
  • Victim-Aware Adaptive Covert Channels

    Bortolameotti, R., van Ede, T. S., Everts, M. H., Jonker, W., Hartel, P. H., Peter, A. & Continella, A., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). p. 450-471 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
    1 Downloads (Pure)
  • Multi-client predicate-only encryption for conjunctive equality tests

    van de Kamp, T., Peter, A., Everts, M. H. & Jonker, W., 10 Nov 2018, Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers. Capkun, S. & Chow, S. S. M. (eds.). Springer, p. 135-157 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11261 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)