Maarten Hinderik Everts

dr.

20142020

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Maarten Hinderik Everts is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting

Bortolameotti, R., van Ede, T. S., Continella, A., Hupperich, T. M., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. H. & Peter, A., 30 Mar 2020, SAC'20. p. 1696-1705 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
  • 7 Downloads (Pure)

    Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach

    Lathouwers, S., Everts, M. & Huisman, M., 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SCITEPRESS Digital Library, p. 784-795 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
  • 24 Downloads (Pure)

    Practical Mutation Testing for Smart Contracts

    Honig, J. J., Everts, M. H. & Huisman, M., 2019, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Pérez-Solà, C., Navarro-Arribas, G., Biryukov, A. & García-Alfaro, J. (eds.). Cham: Springer, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 11737).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 1 Citation (Scopus)
    1 Downloads (Pure)

    Victim-Aware Adaptive Covert Channels

    Bortolameotti, R., van Ede, T. S., Continella, A., Everts, M. H., Jonker, W., Hartel, P. H. & Peter, A., 2019, Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohalsen, A. (eds.). p. 450-471 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 304).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)

    DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 8 Citations (Scopus)
    4 Downloads (Pure)