I hereby would like to invite you to the annual RP2 presentations, where the SNE students will be presenting their research.
Considering the wide variety of presentations the day promises to be very interesting and we hope you will join us.
Program (Printer friendly version: HTML, PDF): The event is stretched over two days: Tuesday July 3 and Thursday July 5, 2018.
Tuesday July 3, 2018, Auditorium C0.110, FNWI, Sciencepark 904, Amsterdam. | |||||||
Time | D | #RP | Title | Name(s) | LOC |
RP | #stds |
12h40 | |
|
Welcome, introduction. | Cees de Laat | |
|
|
12h45 | 25 | 91 |
Predicting Anomalies in Cyberinfrastructure. | Henk van Doorn, Chris Kuipers | SURFnet | 2 |
2 |
13h10 | 20 | 88 |
Attack path mapping on Amazon Web Services. |
Peter Bennink | Deloitte | 2 |
1 |
13h30 | 20 | 5 |
NinjaWrite to NTFS drives on Windows. |
Rick van Gorp | Deloitte | 2 |
1 |
13h50 | 20 | 35 | Automatic phishing mail identification based on language markers. | Shahrukh Zaidi | KPMG | 2 |
1 |
14h10 | 20 | (bio) break | |
|
|
|
|
14h30 | 25 | 97 |
Invisible Internet Project - I2P. |
Dirk Gaastra, Kotaiba Alachkar | Deloitte | 2 |
2 |
14h55 | 25 | 95 |
Impact of GPS Spoofing. |
Luc Gommans, Bart Hermans | Secura | 2 |
2 |
15h20 | 25 | 23 |
DDOS mitigation techniques in the AMS-IX IXP network. | Lennart van Gijtenbeek, Tim Dijkhuizen | AMSiX | 2 |
2 |
15h45 | 15 |
(bio) break | |
|
|
|
|
16h00 | 20 | 1 | A comparative security evaluation of default configurations. | Bernardus Jansen | TUDelft/UvA | 2 |
1 |
16h20 | 20 | 93 | Privacy Analysis of DNS Resolver Solutions. | Jeroen van Heugten | NLNetLabs | 2 |
1 |
16h40 | 20 | 96 | Verifying email security techniques for Dutch organizations. | Vincent van Dongen | NLNetLabs | 2 |
1 |
17h00 | |
|
*
|
End | |
|
|
Thursday July 5, 2018, Auditorium C0.110, FNWI, Sciencepark 904, Amsterdam. | |||||||
Time | D | #RP | Title | Name(s) | LOC |
RP | #stds |
12h40 | |
|
Welcome, introduction. | Cees de Laat | |
|
|
12h45 | 25 | 30 | Content-based Classification of Fraudulent Webshops. | Sjors Haanen, Mick Cox | SIDN | 2 |
2 |
13h10 | 20 | 92 | DoS on a Bitcoin Lightning Network channel. | Willem Rens | TNO | 2 |
1 |
13h30 | 20 | 84 | Using Fault Injection to weaken RSA public key verification. | Ivo van der Elzen | Riscure | 2 |
1 |
13h50 | 20 | 27 | Large scale Log Analytics. | Marcel den Reijer | VANCIS | 2 |
1 |
14h10 | 20 | bio break | |
|
|
|
|
14h30 | 25 | 22 | Optimal implementation of TI-LFA on the new source based SURFnet8 routing ecosystem. |
Peter Prjevara, Fouad Makioui | SURFnet | 2 |
2 |
14h55 | 20 | 98 |
TOR, Hidden Service Intel Extraction. |
Joao Marques | Dearbytes | 2 |
1 |
15h15 | 20 | 76 | Topic Models of Large Document Collections. | Henri.Trenquier | UvA | 2 |
1 |
15h35 | 25 | break | |
|
|
|
|
16h00 | 20 | 72 | Optimizing data services using system logs. | Alexander Blaauwgeers | UvA | 1 |
1 |
16h20 | 20 | 71 | Container deployment scheduling in Kubernetes/Swarm. | Isaac Klop | UvA | 1 |
1 |
16h40 | 20 | 19 | Is the peformance of graph algorithms scale-invariant? | Tim van Zalingen | UvA | 2 |
1 |
17h00 | |
|
*
|
End | |
|
|