[go: up one dir, main page]

Follow
Maarten Everts
Maarten Everts
CTO at Linksight and Assistant Professor at the University of Twente
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Depth-dependent halos: Illustrative rendering of dense line data
MH Everts, H Bekker, JBTM Roerdink, T Isenberg
IEEE Transactions on Visualization and Computer Graphics 15 (6), 1299-1306, 2009
1962009
Designing privacy-by-design
J van Rest, D Boonstra, M Everts, M van Rijn, R van Paassen
Annual Privacy Forum, 55-72, 2012
1392012
FI3D: Direct-touch interaction for the exploration of 3D scientific visualization spaces
L Yu, P Svetachov, P Isenberg, MH Everts, T Isenberg
IEEE transactions on visualization and computer graphics 16 (6), 1613-1622, 2010
1222010
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
612017
Practical mutation testing for smart contracts
JJ Honig, MH Everts, M Huisman
International Workshop on Data Privacy Management, 289-303, 2019
472019
Exploration of the brain’s white matter structure through visual abstraction and multi-scale local fiber tract contraction
MH Everts, E Begue, H Bekker, JBTM Roerdink, T Isenberg
IEEE transactions on visualization and computer graphics 21 (7), 808-821, 2015
442015
DTI in context: Illustrating brain fiber tracts in situ
P Svetachov, MH Everts, T Isenberg
Computer Graphics Forum 29 (3), 1023-1032, 2010
412010
Interactive exploratory visualization of 2D vector fields
T Isenberg, MH Everts, J Grubert, S Carpendale
Computer graphics forum 27 (3), 983-990, 2008
262008
Repeated knowledge distillation with confidence masking to mitigate membership inference attacks
F Mazzone, L Van Den Heuvel, M Huber, C Verdecchia, M Everts, F Hahn, ...
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022
182022
Private sharing of IOCs and sightings
T van de Kamp, A Peter, MH Everts, W Jonker
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
172016
Interactive illustrative line styles and line style transfer functions for flow visualization
MH Everts, H Bekker, JBTM Roerdink, T Isenberg
arXiv preprint arXiv:1503.05787, 2015
172015
Proximity discovery, authentication and link establishment between mobile devices in 3GPP LTE
F Fransen, P Veugen, S De Kievit, M Everts
US Patent 9,820,134, 2017
162017
Headprint: detecting anomalous communications through header-based application fingerprinting
R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ...
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020
152020
Governance and business models of blockchain technologies and networks
MO Van Deventer, C Brewster, M Everts
152017
UbiKiMa: Ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography
M Everts, JH Hoepman, J Siljee
Proceedings of the 2013 ACM workshop on Digital identity management, 19-24, 2013
122013
Illustrative line styles for flow visualization
M Everts, H Bekker, JBTM Roerdink, T Isenberg
Short Paper Proceedings of the 19th Pacific Conference on Computer Graphics …, 2011
122011
Efficient Ranking, Order Statistics, and Sorting under {CKKS}
F Mazzone, M Everts, F Hahn, A Peter
34th USENIX Security Symposium (USENIX Security 25), 8541-8558, 2025
112025
An analysis of atomic swaps on and between ethereum blockchains using smart contracts
P Bennink, LV Gijtenbeek, OV Deventer, M Everts
Tech. report, 2018. https://work. delaat. net/rp/2017-2018/p42/report. pdf, 2018
112018
Will that smart contract really do what you expect it to do?
MH Everts, F Muller
Groningen: TNO, 2018
112018
Indicators of malicious SSL connections
R Bortolameotti, A Peter, MH Everts, D Bolzoni
International Conference on Network and System Security, 162-175, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20