====== Posters ====== ^ Title ^ Author ^ Year ^ Orientation ^ Material ^ Status ^ Thumbnail ^ | Models for Risk Assessment of Socio-Technical Systems | Dan Ionita | ? | landscape | paper | hanging in the hallway | {{:poster:models_for_risk_assessment_of_socio-technical_systems.jpg?direct&100|}} | | The Personal Information Security Assistant | Roeland Kegel | ? | portrait | cardboard | hanging in the hallway | {{:poster:the_personal_information_security_assistant.jpg?direct&100|}} | | Developing Situation-Aware Applications for Disaster Management with a Distributed Rule-Based Platform | João Moreira | ? | portrait | cardboard | hanging in the hallway | {{:poster:developing_situation-aware_applications_for_disaster_management_with_a_distributed_rule-based_platform.jpg?direct&100|}} | | SMART LOGISTICS - An enterprise architecture perspective | Prince Singh | ? | portrait | cardboard | hanging in the hallway | {{:poster:smart_logistics_-_an_enterprise_architecture_perspective.jpg?direct&100|}} | | A domain specific language for context-aware well-being systems | Steven Bosems | ? | portrait | cardboard | hanging in the hallway | {{:poster:a_domain_specific_language_for_context-aware_well-being_systems.jpg?direct&100|}} | | FAIR Data Management for Explainable Machine Learning | Donika Xhani | 2024 | portrait | paper | hanging in the hallway | {{:poster:fair_data_management_for_explainable_machine_learning.jpg?direct&100|}} | | Understanding Phishing Victimization from Literature: A Data-Driven Meta-Analysis | Javara Allah Bukhsh | ? | portrait | paper | hanging in the hallway | {{:poster:understanding_phishing_victimization_from_literature_-_a_data-driven_meta-analysis.jpg?direct&100|}} | | HONEYKUBE: Microservices-based Web Honeypot | Chakshu Gupta | ? | landscape | paper | hanging in the hallway | {{:poster:honeykube_-_microservices-based_web_honeypot.jpg?direct&100|}} | | SoK: IoT Device Identification Under Realistic Conditions | Chakshu Gupta | ? | portrait | paper | hanging in the hallway | {{:poster:sok_-_iot_device_identification_under_realistic_conditions.jpg?direct&100|}} | | Inferring Recovery Steps from Cyber Threat Intelligence Reports | Zsolt Kucsván | 2024 | portrait | paper | hanging in the hallway | {{:poster:inferring_recovery_steps_from_cyber_threat_intelligence_reports.jpg?direct&100|}} | | FrameD - Toward Automated Identification of Embedded Frameworks in Firmware Images | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{:poster:framed_-_toward_automated_identification_of_embedded_frameworks_in_firmware_images.jpg?direct&100|}} | | I Still Know What You Watched Last Sunday | Carlotta Tagliaro | 2024 | portrait | paper | hanging in the hallway | {{:poster:i_still_know_what_you_watched_last_sunday.jpg?direct&100|}} | | Dynamic Detection and Classification of Persistence in Windows Malware | Jorik van Nielen | ? | portrait | paper | hanging in the hallway | {{:poster:dynamic_detection_and_classification_of_persistence_in_windows_malware.jpg?direct&100|}} | | Integration of Biometric Recognition and Homomorphic Encryption | Amina Bassit | 2023 | portrait | paper | hanging in the hallway | {{:poster:integration_of_biometric_recognition_and_homomorphic_encryption.jpg?direct&100|}} | | Privacy-Preserving Verification of Clinical Research | Eleftheria Makri | ? | portrait | cardboard | hanging in the hallway | {{:poster:privacy-preserving_verification_of_clinical_research.jpg?direct&100|}} | | DEMO: Privacy-Preserving Telehomecare | Andreas Peter | ? | portrait | cardboard | hanging in the hallway | {{:poster:demo_-_privacy-preserving_telehomecare.jpg?direct&100|}} | | SOFIR: Securely Outsourced Forensic Image Recognition | Christoph Bösch | ? | portrait | cardboard | hanging in the hallway | {{:poster:sofir_-_securely_outsourced_forensic_image_recognition.jpg?direct&100|}} | | Specification-based Intrusion Detection in the BACnet Protocol | Herson Esquivel-Vargas | ? | portrait | cardboard | hanging in the hallway | {{:poster:specification-based_intrusion_detection_in_the_bacnet_protocol.jpg?direct&100|}} | | Publicly Verifiable Private Aggregation of Time-Series Data | Bence Bakondi | ? | portrait | cardboard | hanging in the hallway | {{:poster:publicly_verifiable_private_aggregation_of_time-series_data.jpg?direct&100|}} | | The role of tangibility and iconicity in collaborative modelling tasks | Dan Ionita | ? | portrait | cardboard | stored in Zi2042 | {{:poster:the_role_of_tangibility_and_iconicity_in_collaborative_modelling_tasks.jpg?direct&100|}} | | What Do You Host? A Brief Overview of Self-Hosting Technologies and Services | Floris Breggeman | 2023 | portrait | paper | stored in Zi2042 | {{:poster:what_do_you_host_-_a_brief_overview_of_self-hosting_technologies_and_services.jpg?direct&100|}} | | DeepCASE: Semi-Supervised Contextual Analysis of Security Events | Thijs van Ede | ? | portrait | paper | stored in Zi2042 | {{:poster:deepcase_semi-supervised_contextual_analysis_of_security_events.jpg?direct&100|}} | | TUCCR - Twente University Centre for Cybersecurity Research | ? | ? | portrait | paper | stored in Zi2042 | {{:poster:tuccr_-_twente_university_centre_for_cybersecurity_research.jpg?direct&100|}} | | Defending Cloud Environments: Integrating Static and Runtime Security Measures | Matteo Grella | ? | landscape | paper | stored in Zi2042 | {{:poster:defending_cloud_environments_-_integrating_static_and_runtime_security_measures.jpg?direct&100|}} | | A National Portal to Report Phishing in The Netherlands | Elmer Lastdrager | ? | portrait | paper | stored in Zi2042 | {{:poster:a_national_portal_to_report_phishing_in_the_netherlands.jpg?direct&100|}} | | May I have Your Key? | Pieter Hartel | ? | portrait | paper | stored in Zi2042 | {{:poster:may_i_have_your_key.jpg?direct&100|}} | | Indicators of Malicious SSL Connections | Riccardo Bortolameotti | ? | portrait | paper | stored in Zi2042 | {{:poster:indicators_of_malicious_ssl_connections.jpg?direct&100|}} | | Privacy From Subjective Value To (Subjective) Value Object: An E3-Value Modeling In The Wake of Ethical Big Data Handling In Healthcare | Syeda Amna Sohail | ? | portrait | paper | stored in Zi2042 | {{:poster:privacy_from_subjective_value_to_subjective_value_object_-_an_e3-value_modeling_in_the_wake_of_ethical_big_data_handling_in_healthcare.jpg?direct&100|}} | | OBRE: Optimal Biometric Recognition under Encryption | Amina Bassit | ? | portrait | paper | stored in Zi2042 | {{:poster:obre_-_optimal_biometric_recognition_under_encryption.jpg?direct&100|}} | | Multi-client Predicate-only Encryption for Conjunctive Equality Tests | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{:poster:multi-client_predicate-only_encryption_for_conjunctive_equality_tests.jpg?direct&100|}} | | Private Data Aggregation using Multi-client Functional Encryption | Tim van de Kamp | ? | portrait | paper | stored in Zi2042 | {{:poster:private_data_aggregation_using_multi-client_functional_encryption.jpg?direct&100|}} | | Evaluating Membership Inference Attacks in heterogeneous-data setups | Bram van Dartel (+ Marc Damie) | 2025 | portrait | paper (damaged due to ICT.Open's strong tape) | stored in Zi2042 | {{:poster:poster_ict_open_mia_and_data_heterogeneity.pdf|view the pdf}} | | Guard: Robust Detection of Ansible Security Smells | Matteo Grella | 2025 | portrait | paper | stored in Zi2042 | | | Efficient Ranking, Order Statistics, and Sorting under CKKS | Federico Mazzone | 2025 | landscape | matte paper | hanging in the hallway | {{ :poster:efficient_ranking_order_statistics_and_sorting_under_ckks.pdf|view the pdf}} |