GH

G.J. Habben Jansen

2 records found

Mining Attack Strategy

Using Process Mining to extract attacker strategy from IDS alerts

Ever since the invention of the Internet, more and more computers are connected throughout the world. Though this has brought numerous new inventions used every day, like social media, e-commerce, and video conferencing, it also opens up new opportunities for cyber criminals. As ...

Teaching Assistant Management Platform

Automating the recruitment and scheduling of teaching assistants

The majority of the courses in the Computer Science Bachelor at the Delft University of Technology use so called lab sessions to provide an opportunity for students to ask questions about course material and get feedback on their assignment. In order to optimally support the stud ...