Depth-dependent halos: Illustrative rendering of dense line data MH Everts, H Bekker, JBTM Roerdink, T Isenberg IEEE Transactions on Visualization and Computer Graphics 15 (6), 1299-1306, 2009 | 190 | 2009 |
Designing privacy-by-design J van Rest, D Boonstra, M Everts, M van Rijn, R van Paassen Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014 | 129 | 2014 |
FI3D: Direct-touch interaction for the exploration of 3D scientific visualization spaces L Yu, P Svetachov, P Isenberg, MH Everts, T Isenberg IEEE transactions on visualization and computer graphics 16 (6), 1613-1622, 2010 | 118 | 2010 |
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ... Proceedings of the 33rd Annual computer security applications Conference …, 2017 | 58 | 2017 |
Exploration of the brain’s white matter structure through visual abstraction and multi-scale local fiber tract contraction MH Everts, E Begue, H Bekker, JBTM Roerdink, T Isenberg IEEE transactions on visualization and computer graphics 21 (7), 808-821, 2015 | 40 | 2015 |
DTI in context: Illustrating brain fiber tracts in situ P Svetachov, MH Everts, T Isenberg Computer Graphics Forum 29 (3), 1023-1032, 2010 | 39 | 2010 |
Practical mutation testing for smart contracts JJ Honig, MH Everts, M Huisman International Workshop on Data Privacy Management, International Workshop on …, 2019 | 38 | 2019 |
Interactive exploratory visualization of 2d vector fields T Isenberg, MH Everts, J Grubert, S Carpendale Computer graphics forum 27 (3), 983-990, 2008 | 25 | 2008 |
Interactive illustrative line styles and line style transfer functions for flow visualization MH Everts, H Bekker, JBTM Roerdink, T Isenberg arXiv preprint arXiv:1503.05787, 2015 | 16 | 2015 |
Proximity discovery, authentication and link establishment between mobile devices in 3GPP LTE F Fransen, P Veugen, S De Kievit, M Everts US Patent 9,820,134, 2017 | 15 | 2017 |
Private sharing of IOCs and sightings T van de Kamp, A Peter, MH Everts, W Jonker Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016 | 15 | 2016 |
Headprint: detecting anomalous communications through header-based application fingerprinting R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ... Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020 | 13 | 2020 |
Illustrative line styles for flow visualization M Everts, H Bekker, JBTM Roerdink, T Isenberg Short Paper Proceedings of the 19th Pacific Conference on Computer Graphics …, 2011 | 13 | 2011 |
UbiKiMa: Ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography M Everts, JH Hoepman, J Siljee Proceedings of the 2013 ACM workshop on Digital identity management, 19-24, 2013 | 12 | 2013 |
Will that smart contract really do what you expect it to do? MH Everts, F Muller Groningen: TNO, 2018 | 11 | 2018 |
An analysis of atomic swaps on and between ethereum blockchains using smart contracts P Bennink, LV Gijtenbeek, OV Deventer, M Everts Technical report 11, 2017-2018, 2018 | 10 | 2018 |
Governance and business models of blockchain technologies and networks MO Van Deventer, C Brewster, M Everts TNO, 2017 | 10 | 2017 |
Vote to link: Recovering from misbehaving anonymous users W Lueks, MH Everts, JH Hoepman Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016 | 9 | 2016 |
Revocable privacy: Principles, use cases, and technologies W Lueks, MH Everts, JH Hoepman Privacy Technologies and Policy: Third Annual Privacy Forum, APF 2015 …, 2016 | 9 | 2016 |
Indicators of malicious SSL connections R Bortolameotti, A Peter, MH Everts, D Bolzoni Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 9 | 2015 |