Search Results - "Van Bruggen, Dirk"
-
1
The Cost Effectiveness of Duplicate Genotyping for Testing Genetic Association
Published in Annals of human genetics (01-05-2009)“…Summary We consider a modification to the traditional genome wide association (GWA) study design: duplicate genotyping. Duplicate genotyping (re‐genotyping…”
Get full text
Journal Article -
2
Gene set analyses for interpreting microarray experiments on prokaryotic organisms
Published in BMC bioinformatics (05-11-2008)“…Despite the widespread usage of DNA microarrays, questions remain about how best to interpret the wealth of gene-by-gene transcriptional levels that they…”
Get full text
Journal Article -
3
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Published in 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC) (01-12-2019)“…The human side of cyber is fundamentally important to understanding and improving cyber operations. With the exception of Capture the Flag (CTF) exercises,…”
Get full text
Conference Proceeding -
4
An exploratory investigation of message-person congruence in information security awareness campaigns
Published in Computers & security (01-06-2014)“…In this study, we sought to answer the question of whether certain information security awareness message themes are more or less effective for different types…”
Get full text
Journal Article -
5
Studying the impact of security awareness efforts on user behavior
Published 01-01-2014“…Security has long been a technical problem with technical solutions. Over time, it has become apparent that human behavior is a major weakness in technical…”
Get full text
Dissertation -
6
Work in progress - Development of a HCI course on the Microsoft Surface
Published in 2010 IEEE Frontiers in Education Conference (FIE) (01-10-2010)“…With the advent of multi-touch devices, there exist exciting new opportunities for course development in the area of Human Computer Interfacing (HCI). From the…”
Get full text
Conference Proceeding -
7
Is There WiFi Yet? How Aggressive WiFi Probe Requests Deteriorate Energy and Throughput
Published 04-02-2015“…WiFi offloading has emerged as a key component of cellular operator strategy to meet the data needs of rich, mobile devices. As such, mobile devices tend to…”
Get full text
Journal Article -
8
Studying the impact of security awareness efforts on user behavior
Get full text
Dissertation