| Depth-dependent halos: Illustrative rendering of dense line data MH Everts, H Bekker, JBTM Roerdink, T Isenberg IEEE Transactions on Visualization and Computer Graphics 15 (6), 1299-1306, 2009 | 196 | 2009 |
| Designing privacy-by-design J van Rest, D Boonstra, M Everts, M van Rijn, R van Paassen Annual Privacy Forum, 55-72, 2012 | 139 | 2012 |
| FI3D: Direct-touch interaction for the exploration of 3D scientific visualization spaces L Yu, P Svetachov, P Isenberg, MH Everts, T Isenberg IEEE transactions on visualization and computer graphics 16 (6), 1613-1622, 2010 | 122 | 2010 |
| Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ... Proceedings of the 33rd Annual computer security applications Conference …, 2017 | 61 | 2017 |
| Practical mutation testing for smart contracts JJ Honig, MH Everts, M Huisman International Workshop on Data Privacy Management, 289-303, 2019 | 47 | 2019 |
| Exploration of the brain’s white matter structure through visual abstraction and multi-scale local fiber tract contraction MH Everts, E Begue, H Bekker, JBTM Roerdink, T Isenberg IEEE transactions on visualization and computer graphics 21 (7), 808-821, 2015 | 44 | 2015 |
| DTI in context: Illustrating brain fiber tracts in situ P Svetachov, MH Everts, T Isenberg Computer Graphics Forum 29 (3), 1023-1032, 2010 | 41 | 2010 |
| Interactive exploratory visualization of 2D vector fields T Isenberg, MH Everts, J Grubert, S Carpendale Computer graphics forum 27 (3), 983-990, 2008 | 26 | 2008 |
| Repeated knowledge distillation with confidence masking to mitigate membership inference attacks F Mazzone, L Van Den Heuvel, M Huber, C Verdecchia, M Everts, F Hahn, ... Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022 | 18 | 2022 |
| Private sharing of IOCs and sightings T van de Kamp, A Peter, MH Everts, W Jonker Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016 | 17 | 2016 |
| Interactive illustrative line styles and line style transfer functions for flow visualization MH Everts, H Bekker, JBTM Roerdink, T Isenberg arXiv preprint arXiv:1503.05787, 2015 | 17 | 2015 |
| Proximity discovery, authentication and link establishment between mobile devices in 3GPP LTE F Fransen, P Veugen, S De Kievit, M Everts US Patent 9,820,134, 2017 | 16 | 2017 |
| Headprint: detecting anomalous communications through header-based application fingerprinting R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ... Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020 | 15 | 2020 |
| Governance and business models of blockchain technologies and networks MO Van Deventer, C Brewster, M Everts | 15 | 2017 |
| UbiKiMa: Ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography M Everts, JH Hoepman, J Siljee Proceedings of the 2013 ACM workshop on Digital identity management, 19-24, 2013 | 12 | 2013 |
| Illustrative line styles for flow visualization M Everts, H Bekker, JBTM Roerdink, T Isenberg Short Paper Proceedings of the 19th Pacific Conference on Computer Graphics …, 2011 | 12 | 2011 |
| Efficient Ranking, Order Statistics, and Sorting under {CKKS} F Mazzone, M Everts, F Hahn, A Peter 34th USENIX Security Symposium (USENIX Security 25), 8541-8558, 2025 | 11 | 2025 |
| An analysis of atomic swaps on and between ethereum blockchains using smart contracts P Bennink, LV Gijtenbeek, OV Deventer, M Everts Tech. report, 2018. https://work. delaat. net/rp/2017-2018/p42/report. pdf, 2018 | 11 | 2018 |
| Will that smart contract really do what you expect it to do? MH Everts, F Muller Groningen: TNO, 2018 | 11 | 2018 |
| Indicators of malicious SSL connections R Bortolameotti, A Peter, MH Everts, D Bolzoni International Conference on Network and System Security, 162-175, 2015 | 10 | 2015 |