Welcome...

dr. M.H. Everts (Maarten)

Assistant Professor

Expertise

Engineering & Materials Science
Communication
Computer Hardware
Cryptography
Http
Moderators
Monitoring
Testing
Mathematics
Encryption

Publications

Recent
Lathouwers, S. , Everts, M. , & Huisman, M. (2020). Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. In S. Furnell, P. Mori, E. Weippl, & O. Camp (Eds.), Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE (pp. 784-795). SCITEPRESS Digital Library. https://doi.org/10.5220/0009371207840795
Bortolameotti, R., van Ede, T. S. , Continella, A., Hupperich, T. M. , Everts, M. H., Rafati, R. , Jonker, W. , Hartel, P. , & Peter, A. (2020). HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery (ACM). https://doi.org/10.1145/3341105.3373862
Bortolameotti, R., van Ede, T. S. , Everts, M. H. , Jonker, W. , Hartel, P. H. , Peter, A. , & Continella, A. (2019). Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.), Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST). https://doi.org/10.1007/978-3-030-37228-6_22
Honig, J. J. , Everts, M. H. , & Huisman, M. (2019). Practical Mutation Testing for Smart Contracts. In C. Pérez-Solà, G. Navarro-Arribas, A. Biryukov, & J. García-Alfaro (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings (pp. 289-303). (Lecture Notes in Computer Science; Vol. 11737). Springer. https://doi.org/10.1007/978-3-030-31500-9_19
van de Kamp, T. , Peter, A. , Everts, M. H. , & Jonker, W. (2018). Multi-client predicate-only encryption for conjunctive equality tests. In S. Capkun, & S. S. M. Chow (Eds.), Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers (pp. 135-157). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11261 LNCS). Springer. https://doi.org/10.1007/978-3-030-02641-7_7

UT Research Information System

Courses Academic Year  2022/2023

Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.
 

Courses Academic Year  2021/2022

Contact Details

Visiting Address

University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands

Social Media