Projects
Towards a balance in the new welfare state: dynamic comparison of the social security systems in five leading European countries and their performance in terms of old and new social risks. University of Antwerp
Feasibility study for a monitoring system for antisocial behaviour and feelings of insecurity at school Ghent University
The study investigates the desirability and the feasibility of a monitor for antisocial behaviour and feelings of insecurity among pupils, and for feelings of insecurity among teachers. Both the development and the implementation of a monitoring system are assessed. Existing monitors, registration systems and databases are examined and further analysed. These data are complemented by data from a web survey and from focus groups among ...
OBPWO: Feasibility study for a monitoring system for antisocial behaviour and feelings of insecurity at school Vrije Universiteit Brussel
Women's Access to Social Security Schemes in Mozambique: Rethinking the Social Security Legal Framework in gender terms. Hasselt University
The development of the private security industry in Belgium (1907-1990). A historical-criminological perspective on contemporary changes in security and crime control. Vrije Universiteit Brussel
A principled approach to cross-layer software and hardware design for security KU Leuven
Computer systems are constructed by building abstractions on top of
one another, thus making it possible for engineers to focus on the
part of the system they have expertise in. For instance, hardware
engineers and software engineers can work relatively independently
from one another.
While the layered design approach has been extremely successful
and has many advantages (including: enabling portability and ...
DNS Abuse and Active Authentication: Applications of Machine Learning in Cyber Security KU Leuven
In today’s digital world, cyber security is essential for a fair and well-functioning society. People, as well as companies and governments must be able to trust their computers, mobile devices and the services they use from companies and governments.
An important element of cyber security is the fight against cyber crime. This fight has surpassed the deployment of ‘passive infrastructure’ such as firewalls and access control systems ...
Post-quantum cryptography for long-term security KU Leuven
Online banking, e-commerce, telemedicine, mobile communication, and cloud computing depend fundamentally on the security of the underlying cryptographic algorithms. Public-key algorithms are particularly crucial since they provide digital signatures and establish secure communication without requiring in-person meetings.
Essentially all applications today are based on RSA or on the discrete-logarithm problem in finite fields or on ...
Security of Software on Mobile Devices KU Leuven
Mobile phones are progressing at a rapid and steady ...