Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
How to Detect System Compromise & Data Exfiltration
How to Leverage Log Data for Effective Threat Detection
The territorial implications of demographic change in the North Sea Region – scope for a transnational planning approach? Stefanie Dühr, Radboud University.
FIXatdl and the 2010 Flash Crash presented at Princeton Qwafafew
Twiga- 2013 Grant Narrative (w:o Budget)