Master Projects

Select CurriculumSelect SupervisorYear

Available

Master 4TU.CybSec (M-CSC)

Detecting Adaptive Data Exfiltration

Fighting Data Breaches through Distributed Systems: Determining and Reducing the consequences of a cyber attack


Master Business Information Technology (M-BIT)

Can You Predict The Next Cyber Threat?

Evaluating the societal impact of disruptions of energy supply

Experimenting with anti-fraud forms

Identification of possible threats to the functioning of smart grids

Remote Patient Monitoring

Reviewing state-of-the art in gaming simulations and stakeholder workshops


Master Computer Science (M-CSC)

Hypermedia-driven application development in user-centric service composition systems

Semantic description and registry for Web-based services

Supporting the development of user-driven service composition applications


Master Electrical Engineering (M-EE)

Advanced Face Detection

Develop a model-based approach for 3D object recognition with Microsoft HoloLens.

Development and validation of Likelihood Ratio methods for Forensic Individualisation

Pose compensation of facial images using 3D morphable models for improved face recognition


In Progress

Master Business Information Technology (M-BIT)

A scenario planning for Interbank Payments and Decentralized Ledger Platforms

Adopting the Cloud: A Multi-Method Approach Towards Developing a Cloud Maturity Model

Report

Applying Data Science to Improve Municipal Youth Care

Applying Intelligence Amplification to the Problem of Schema Matching

Assessing the level of security of an organization by analyzing the enterprise architecture: A Methodology.

Capability-based planning with Togaf and ArchiMate

Enterprise architecture transformation: Roadmap plan analysis and visualization

Multi-Criteria and Model-Based Analysis for Project Selection

The Design of a common Data Model for generic synchromodal Cargo-Tracking in Logistics using Web Scraping and Big & Open Data

Report

Towards an Integrated Architecture Model of Smart Manufacturing Enterprises

Report

VICA: The Dutch Windmill - towards a contemporary business information management maturity model.


Master Computer Science (M-CSC)

Java code virtualization of industrial-strenght Java code

Multi-level views in a SUM-based environment


Master Electrical Engineering (M-EE)

Occulusion handling in soccer player tracking


Master Embedded Systems (M-EMSYS)

Development of a high resolution pressure sensor and electronics for hand disease treatment


Master Kerckhoffs Institute (M-KI)

Remote mobile device forensics


Master Telematics (M-TEL)

NFC in physical access control


Completed

End-date

Master 4TU.CybSec (M-CSC)

Towards a Likelihood-Based Biometric Comparison in the Encrypted Domain

Aug-2016

Report

Bring Your Own Authenticator/Authentication Security in Physical Access Control Systems

Aug-2016

Report

Analyzing White-box Designs for Differential Computation Analysis Resistance

Aug-2016

Report

Gathering Intelligence from the Bitcoin Peer-to-Peer Network

Aug-2016

Report

Achieving 128-bit Security Against Quantum Computer Attacks in Open VPN

Aug-2016

Report


Master Business Information Technology (M-BIT)

Demand Response Interoperability for the residental European Energy Market

Aug-2017

Standardising the requirements engineering process for a software product vendor

Jun-2017

Report

Managing Information within the Three Lines of Defense to Ensure Valid Audit Trails

Jun-2017

Report

Modeling and Analyzing Digital Business Ecosystems

May-2017

Report

A project portfolio method using capability-based planning

Nov-2016

Report

Towards a scalable environment for traffic information services

Oct-2016

Report

Towards Self-Sovereign Identity using Blockchain Technology

Oct-2016

Report

The start of IT Governance in an academic medical centre

Oct-2016

Report

An architectural design for LAN-based web applications in a military mission- and safety-critical context

Oct-2016

Report

Data Driven Banking: Applying Big Data to accurately determine Consumer Creditworthiness

Oct-2016

Report

Strategic Planning using Reasoning Tree Based Approach

Aug-2016

Report

Pensioenbewustzijn: kan IT hieraan bijdragen?

Jul-2016

Report

Applying the intelligence Amplification into decision making

May-2016

Report

Cloud Strife: an analysis of Cloud-based Shadow IT and a framework for managing its risks and opportunities

Feb-2016

Report

Integrating Value Modeling into Archimate

Feb-2016

Report

Improving the Processes and Safeguards for Fraud Detection and Prevention is US Medicaid

Jan-2016

Report

Improving Customer Satisfaction through Personalization

Nov-2015

Report

Knowing how to know: A practical approach to Knowledge Systems for UL Transaction Security

Oct-2015

Improving customer satisfaction by prioritizing the work backlog.

Sep-2015

Report

Information Security Risks for Car Manufacturers base on the in-Vehicle Network

Sep-2015

Report

Agile Scaling @ Topicus. Scaling Scrum with help of Agile Scaling frameworks at Topicus Finance.

Aug-2015

Report

Design a platform for providing home-based services concerning: care, safety, comfort and fun.

Jul-2015

Report

Predicting the performance of ERP in a changing and challenging energy market.

Jul-2015

Report

Business cases for Point-of-Care Testing (POCT)

Jul-2015

Report

The Fit between Business Processes and Proces Mining related Activities: a Process Mining Success Model

Jul-2015

Report

Improving the dock and staging lane capacity within the warehouses of Albert Heijn by a dynamic allocation during the day

May-2015

A Reference Model Method to align the development of one software system with multiple Hinterland Container Terminals

Mar-2015

Report

On-Premise to SaaS Integration Risk Mitigation

Mar-2015

Report

IS/IT Integration in mergers & acquisitions: a framework for a systematic approach

Feb-2015

Report

The influence of trust on inter-organizational information sharing in logistic outsourcing relationships

Jan-2015

Report

Cyber Security in the supply chain of industrial devices

Dec-2014

Report

An exploration of Content-Driven Commerce

Nov-2014

Report

Collaborative Cyber Security in Retail Organizations

Oct-2014

Report

Managing customer innovation in the financial services industry

Oct-2014

Report

Quantifying the Contribution of Enterprise Architecture to Business Goals

Oct-2014

Report

The Impact of Enterprise Architecture on Business Performance

Sep-2014

Report

Improving the boarding process of external insiders in large organisations

Sep-2014

Report

Automated external Fraud Prevention in the public sector

Sep-2014

Report

Using Change Management to Improve CRM User Acceptance

Sep-2014

Report

A framework for cloud adoption from Enterprise Architecture and Business Perspective Validation case study: The implementation of cloud-based contact distribution in Philips Consumer Lifestyle.

Aug-2014

Report

Enterprise architecture transformation: Roadmap plan analysis and visualization

Aug-2014

Selecting a BI Architecture that fits an organisation's requirements.

Aug-2014

xRM at a Bilateral Trade Organisation

Jul-2014

Report

Assessing the Impact of Business Process Redesign on Internal Control within Banks: A Methodology.

Jun-2014

Report

Combining Enterprise Architecture to better support decisionmaking

Jun-2014

Designing Secure Enterprise Architectures. A comprehensive approach: framework, method and modelling language.

May-2014

The relationship between enterprise architecture, business complexity and business performance

Jan-2014

Success-Driven Application Portfolio Management

Jan-2014

Bringing Enterprise Architecture to the Boardroom

Nov-2013

Business Process Management Value Map

Nov-2013

Get Ready for the Cloud - Tailoring Enterprise Architecture for Cloud Ecosystem

Nov-2013

Exploring the Use of Social Media in Organisational Processes: A Task-Technology Perspective

Sep-2013

Report

Increasing the maturity of IT-operations at the Dutch Railways

Sep-2013

Report

Smart integration of electric vehicles in the electricity system: towards, a reference architecture for charging electric vehicles

Sep-2013

Report

The characteristics of a new semantic standards development method: The Pressure Cooker

Jul-2013

Report

Identifying and Dealing with Knowledge Transfer Challenges in Software Development

Jun-2013

The value of ontologies for developing Semantic Standards

Jun-2013

Report

Dealing with changes on shared software components

Feb-2013

Measuring and Analysing customer satisfaction. A case study at Nibag B.V.

Feb-2013

Analysis of a paper- and software-based Scrum Task Board

Oct-2012

Report

IT-Based Risks in Advergame Campaigns

Aug-2012

Report

Enterprise knowledge - reference architecture for visualization and prototype implementation using Wiki

Aug-2012

Report

Only for the money? Motives for introducing shared services in government organizations

Aug-2012

Report

Adoption of wireless sensoring in a pharmaceutical supply chain

Aug-2012

Report

A requirements specification of an information system to support planned and unplanned use of share meeting rooms

Aug-2012

Report

The potential of crowd sourcing applications in organizational context

Aug-2012

Report

Designing a performance dashboard at Sigmax

May-2012

Report

Business Intelligence for horizontal cooperation in logistics

May-2012

Report

Developing a method for identifying unwanted requirements dependencies

Mar-2012

Enhancing Information Quality in Shell, global functions IT

Dec-2011

Precedent for doing things differently: case studies of agile software development in large, distributed outsourcing projects

Dec-2011

Coordination within and between groups in a growing software development organization

Nov-2011

Design and evaluate a deployment process for the ES benefits management method

Nov-2011

Report

Requirements engineering in market-facing projects; A case study

Oct-2011

Report

Electronic retail payments at public events: A preliminary study

Sep-2011

KLM Flight Folder: Requirements Elication & Solution Specification for an Electronic Flight Bag

Aug-2011

Report

Be Seated in the Front Row – Requirements Engineering for the Radio 4 Concerthuis

Aug-2011

A SOA based architecture for dealing with D&D requirements in the homecare domain

Aug-2011

Report

Properties Relevant for Inferring Provenance

Aug-2011

Report

Improving e-Government by utilising m-Government features

Jun-2011

Improving IT sourcing maturity from a roles perspective

Jun-2011

Report

Performance of Alliance Portfolio configuration Strategies under Strategic Uncertanty: An Agent – based approach

Jun-2011

Report

Designing a tool for norm interventions in IT strategy projects

Jun-2011

Report

Secure Cloud Computing in the dutch Financial Service Market

May-2011

Report

Using DrawBridge54© to improve the quality of user participation in IS projects

Apr-2011

Report

Social norms to motivate IT use

Mar-2011

Report

Assessing the Quality of the Requirements Process

Mar-2011

Report

The potential of Continuous auditing & Continuous Monitoring

Feb-2011

Report

Using Actor-Network theory to understand inter-organizational network aspects for strategic information systems planning

Feb-2011

Report

Selecting and evaluating a Benefits Management method for IT projects

Feb-2011

Report


Master Biomedical Engineering (M-BME)

Validation of Clinical Application Software

Aug-2012

Daily physical activity patterns of post cancer patients and the relation with perceived fatigue

Apr-2011

Effects of flow fluctuations during administration of vasoactive drugs with infusion pumps

Apr-2011

Improving mobility of monitored patients – A hospital case

Jan-2011


Master Computer Science (M-CSC)

Cycle-Accurate Timing Channel Analysis of Binary Code

May-2017

Report

Towards an architecture design for a future societal energy supply system

Apr-2017

Threat modelling for future vehicles

Feb-2017

Report

On-demand app development

Dec-2016

Report

A reference architecture of Integration Platforms

Sep-2016

Report

Improving payment authorization rates

Sep-2016

Report

Partitioning of Spatial Data in Publish-subscribe Messaging Systems

Aug-2016

Report

Methodological guideline to find the most suitable design pattern to implement adaptability

Apr-2016

Report

Framework for Enterprise Uncertainty-Driven Decision-Making

Nov-2015

Report

Domain-Specific Language Testing Framework

Oct-2015

Report

BPMN Plus: a Modelling language for Unstructured Business Process

Aug-2015

Report

Virtual Machine Delivery Network

Jan-2015

Report

Improving information system development and operations using the DevOps conceptual framework

Nov-2014

Report

Evaluating data structures for runtime storage of aspect instances

Nov-2014

Report

Ad-Hoc Context-Driven Changes in a Business Process

Nov-2014

Report

A Behavior Description Language for Ontologically Grounded Conceptual Models

Nov-2014

Report

A modeling approach for secure business processing.

Aug-2014

Report

Development of a Personal Information Security Assistant prototype

Aug-2014

Report

Towards a Unifying Framework for Modelling and Executing Model Transformations

Jun-2014

Report

Design and evaluation of a recommender system for high school courses in The Netherlands

Dec-2013

Middleware for Internet Things

Nov-2013

Current Established Risk Assessment Methodologies and Tools

Aug-2013

Report

Automatic Distribution Analysis of Business Processes for Cloud-Based BPM

Aug-2013

Report

Deciding between mobile implementation platforms

Jul-2013

Report

Efficiently Protecting Virtualized Desktop Infrastuctures Against Malware

Jul-2013

Report

An CCTV analysis of leadership in formal groups

Jun-2013

Report

Finding you on the Internet: Matching identities of people and Twitter accounts

Jun-2013

Report

Architectal design of Modular ESB systems

Feb-2013

Report

QoS-aware model-driven SOA using SoaML

Dec-2012

From delivery stories to effort estimation – an empirical study

Sep-2012

Analysis of Indirect Influence Relations in Goal Oriented Requirements Engineering

Aug-2012

Report

Data location compliance in cloud computing

Aug-2011

Report

On the quality of quality models

Jul-2011

Report


Master Electrical Engineering (M-EE)

Detection of morphed facial photographs

Jul-2017

Redesign the E-Cone: a tool for treatment of hand diseases

Jul-2017

Report

Deep verification learning

Dec-2016

Report

Using a challenge to improve face spoofing detection

Dec-2016

Report

Design and validation of a face recognition framework

Jun-2013

Report

Verification Based on Synthetic Fingerprints

Mar-2013

Multiple regional PCA-LDA-based

Jan-2013

Vascular pattern of the finger: biometric of the future? Sensor design, data collection and performance verification

Jul-2012

Report


Master EIT ICT Labs - Security and Privacy (M-EitIctLabs)

Detecting Exploit kits using Machine Learning

Nov-2016

Report

Detecting Lateral Movement Attacks through SMB using BRO

Nov-2016

Report

Dual Laser Fault Injection Attack

Sep-2016

Report

Concept-Drift in Web-Based IDS: Evaluating Current Capabilities & Future Challenges

Aug-2015

Report

SIDekICk: SuspIcious DomaIn Classification in the .nl zone

Aug-2015

Report

Security Analysis of Mobile Payment Systems

Jul-2015

Report

Behavioral Analysis of Obfuscated Code

Jul-2015

Report

Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them

Sep-2014

Report

Techniques and Experiments to Explore Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor's Instruction Execution

Aug-2014

Report

C&C botnet detection over SSL

Aug-2014

Report

Evaluation of HIMMO with Long identifiers, an Extension of the HIMMO Key Establishment Scheme

Aug-2014

Report

Secure and privacy-preserving national eID systems with Attribute-based credential technologies

Aug-2014

Report

The Impact of Cyber Security on SMEs

Aug-2014

Report


Master Embedded Systems (M-EMSYS)

Behavioural Analysis of Program Intent Using Data Origins, Influence and Context

Jun-2017

Report

Crack Detection in Semiconductor Products- Machine Vision techniques for Detection of Cracks in Semiconductor Products

Oct-2014

Report

Image processing on smart cameras

Sep-2014

Improved normalization for PCA-LDA-based regional face recognition

Feb-2014


Master Human Media Interaction (M-HMI)

Vascular pattern recognition for finger veins using biometric graph matching

Sep-2015

Report


Master Industrial Engineering and Management (M-IEM)

Get more out of video conferencing

Dec-2011

Report

An exploration of the factors influencing the adoption of the social bookmarking at OCÉ.

Jan-2011


Master Kerckhoffs Institute (M-KI)

A Bayesian Network Model for Predicting Data Breaches Caused by Insiders of a Health Care Organization

Dec-2016

Report

Self-adaptation to concept drift in web-based anomaly detection

Nov-2016

Report

Feasibility of End-To-End Encryption using Attribute-Based Encryption in Health Care

Nov-2016

Report

Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly

Nov-2016

Report

Spoofing detection for face recognition on mobile devices

Oct-2016

Automatic Deployment of specifcation-based Intrusion Detection in the BACnet Protocol

Sep-2016

Report

Secure Element analysis

Aug-2016

Report

Privacy-Preserving Social DNA-Based Recommender

Jul-2015

Report

Evaluation of the robustness of payment terminals with the use of fuzzing

Jul-2015

Report

Detection of APT Malware through External and Internal Network Traffic Correlation

Feb-2015

Report

Practical Cyber-Attacks on Autonomous Verhicles

Feb-2015

Report

Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injection using harmonic waves'

Jan-2015

Report

Sousveillance on Intelligent Transportation Systems

Dec-2014

Report

Design and feasibility of mobile peer-to-peer payment systems

Nov-2014

Report

Analysing Persuasion Principles in Phishing Emails

Oct-2014

Report

Prioritizing Computer Forensics Using Triage Techniques

Aug-2014

Report

Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption

Aug-2014

Report

Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Aug-2014

Report

Then and Now: On the Maturity of Cybercrime Markets

Jul-2014

Report

Protecting high school students from bullying: Bully Shield

Jun-2014

Report

Finding Relations between Botnet C&CS for Forensic Purposes

May-2014

Report

User Space Memory Analysis

Nov-2013

Report

Continuous Forensic Readiness

Oct-2013

Report

Permeance of ICT in Crime in India

Aug-2013

Report

Detection of leadership in informal (small)groups based on CCTV information

Jun-2013

Report

Efficiently Protecting Virtualized Desktop Infrastructures Against Malware

Jun-2013

Report

FCScan: A New Lightweight and Effective Approach for Detecting Malicious Content in Electronic Documents

Jun-2013

Report

POPCORN: Privacy-preserving charging for eMobility

Jan-2013

Report

XNU: a security evaluation

Jan-2013

Report

Detecting botnets using file system indicators

Dec-2012

Report

Claiming Security Properties in a Service Oriented Architecture

Nov-2012

Report

Evaluation of Multiple Enrollment for Fingerprint Recognition

Sep-2012

Report

SeDyA: Secure Dynamic Aggregation in VANETs

Aug-2012

Report

Secure and Privacy-Preserving Broadcast Authentication for IVC

Jul-2012

Report

Detecting outliers in web-based network traffic

Jun-2012

Report

Detection of Web Based Command & Control Channels

Nov-2011

Report

Towards automated truancy detection

Aug-2011

Report

Face Recognition at a Distance: a study of super resolution

Aug-2011

Report

Securing Patient Information in Medical Databases

Aug-2011

Report

Secure searching through encrypted data: Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption

Aug-2011

Report

Hybrid Intrusion detection network monitoring with honeypots

Apr-2011

Report

Reviewing and Optimizing the Security of FIGO

Feb-2011

Report

Threat Detection Systems

Oct-2010

Report

Using Machine Learning Techniques for Advanced Passive Operating System Fingerprinting

Aug-2010

Report

Sharing Nonlinear Gates in the Presence of Glitches

Jul-2010

Report

Cloud Computing & Confidentiality

May-2010

Report

Context-Free - Language Parser for Advanced Network Intrusion Detection

Mar-2010

Report

Practical Client Puzzle from Repeated Squaring

Aug-2009

Report


Master Mechanical Engineering (M-ME)

Assesment of crowd flow analysis based on optical flow

Jan-2014


Master Public Administration (M-PA)

The Influence of Neighborhood Crime and Income on Altruism

Jan-2014

Report


Master Telematics (M-TEL)

Using existing software to build a virtual community for telemedicine

Jun-2013

Report



[BACK]