Courses at Utrecht University, The Netherlands
(Feb 2018 - )

Supervision:

Master

  • Amr Ahmed (on-going), Utrecht University (internship at Accenture), DevSecOps Framework: Accelerating Security in Software Production
  • Jarno Bredenoord (on-going), Utrecht University (internship at Ernst & Young), Privacy and Security in the Internet of Things
  • Alexander van Loon (on-going), Utrecht University (internship at 3WebApps), Value creation in the e-commerce ecosystem through blockchain
  • Oka Arntzen (on-going), Utrecht University (internship at Rabobank), TBC

Bachelor

  • Mick Koomen (2018), co-supervised at Radboud University, Using power analysis to differentiate between malicious repackaged apps and clean apps
  • Paul van Grol (2018), Utrecht University, Comparison of Multi-signature schemes for performance improvement of OmniLedger

Courses at Radboud University, The Netherlands
(Oct 2015 - Dec 2017)

Supervision:

Master

  • Martijn Terpstra (2017), Radboud University, Attribute-based credentials on smartwatches [pdf]

Bachelor

  • Ward Theunisse (2017), Radboud University, Breaking the chain: Security analysis of a pilot system for detainee monitoring in the Dutch Custodial Institutions Agency [pdf]
  • Jordy Gennissen (2017), Radboud University (internship at Royal Holloway, University of London), Gamut: Sifting through Images to Detect Malicious Android Apps [pdf]
  • Stijn Meijer (2016), Radboud University, Secure Location Verification for ADS-B [pdf]
  • Bas Visser (2015), Radboud University, Additional Source of Entropy as a Service in the Android user-space [pdf]
  • Maarten Derks (2015), Radboud University, Fair Privacy: Improving Usability of Android Permission System [pdf]

Courses taught at Deakin University, Australia
(2010 - 2015)

  • Patterns in Space, 1st year Bachelor of IT, Teaching Assistant
  • Fundamentals of Information Technology, 1st year Bachelor of IT, Teaching Assistant
  • Discrete Mathematics, 1st year Bachelor of IT, Teaching Assistant
  • Introduction to Statistics and Data Analysis, 1st year Bachelor of IT, Teaching Assistant
  • Introduction to Cryptography, 2nd year Bachelor of IT, Teaching Assistant
  • Public Key Cryptography, 3rd year Bachelor of IT, Teaching Assistant
  • Computer Crime and Digital Forensics, 2nd year Bachelor of IT, co-Lecturer
  • Cloud Computing Technologies, Master in IT, Teaching Assistant