Everts

Research Scientist at TNO and assistant professor at the University of Twente









Personal website: https://nn8.nl & http://scs.ewi.utwente.nl/staff/EvertsMH/

Publications


Interactive Illustrative Line Styles and Line Style Transfer Functions for Flow VisualizationEverts, M. H., Bekker, H., Roerdink, J. B. T. M. & Isenberg, T., 19 Mar 2015.


Multi-client Predicate-only Encryption for Conjunctive Equality Testsvan de Kamp, T. R.Peter, A.Everts, M. H. & Jonker, W., 2017.


Indicators of Malicious SSL ConnectionsBortolameotti, R., Peter, A.Everts, M. H. & Bolzoni, D., Nov 2015, 9th International Conference on Network and System Security, NSS 2015. New York: Springer, p. 162-175 14 p. (Lecture Notes in Computer Science; vol. 9408).


Publicly Verifiable Private Aggregation of Time-Series DataBakondi, B. G., Peter, A.Everts, M. H.Hartel, P. H. & Jonker, W., 1 Aug 2015, 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway, NJ, USA: IEEE, p. 50-59 10 p.


Reliably determining data leakage in the presence of strong attackersBortolameotti, R., Peter, A.Everts, M. H.Jonker, W. & Hartel, P. H., Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: Association for Computing Machinery (ACM), p. 484-495 12 p.


Exploration of the brain's white matter structure through visual abstraction and multi-scale local fiber tract contractionEverts, M. H., Begue, E., Bekker, H., Roerdink, J. B. T. M. & Isenberg, T., 1 Jul 2015, In : IEEE transactions on visualization and computer graphics. 21, 7, p. 808-821 14 p., 7042344.


DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application FingerprintingBortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H.Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386


Vote to link: Recovering from misbehaving anonymous usersLueks, W., Everts, M. H. & Hoepman, J. H., 24 Oct 2016, WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. Association for Computing Machinery (ACM), p. 111-122 12 p.


Privacy-Preserving Verification of Clinical ResearchMakri, E., Everts, M. H., de Hoogh, S., Peter, A.op den Akker, H.Hartel, P. H. & Jonker, W., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Bonn: Gesellschaft für Informatik e.V., p. 481-500 20 p. (Lecture Notes in Informatics (LNI)).


Private Sharing of IOCs and Sightingsvan de Kamp, T. R.Peter, A.Everts, M. H. & Jonker, W., 2016, 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. New York: Association for Computing Machinery (ACM), p. 35-38 4 p.


Evaluation of two different web-based interventions for chronic cancer-related fatigue: online mindfulness-based cognitive therapy and ambulant activity feedbackEverts, F. Z., 11 Jan 2019, Enschede: University of Twente. 268 p.


Physical Behavior Profiles in Chronic Cancer-Related FatigueWolvers, M. D. J., Bussmann, J. B. J., Everts, F. Z., Boerema, S. T., van der Schoot, R. & Vollenbroek-Hutten, M. M. R., 1 Feb 2017, In : International journal of behavioral medicine. 25, 1, p. 30-37 8 p.


Liposomal delivery of dexamethasone attenuates prostate cancer bone metastatic tumor growth in vivoKroon, J., Kroon, J., Buijs, J. T., van der Horst, G., Cheung, H., van der Mark, M., van Bloois, L., Rizzo, L. Y., Lammers, T. G. G. M., Pelger, R. C., Storm, G., van der Pluijm, G. & Metselaar, J. M., 2015, In : Prostate. 75, 8, p. 815-824


Predicting 3D lip movement using facial sEMG: a first step towards estimating functional and aesthetic outcome of oral cancer surgeryEskes, M., van Alphen, M. J. A., Smeele, L. E., Brandsma, D., Balm, A. J. M., Balm, A. J. M. & van der Heijden, F., 2016, In : Medical & biological engineering & computing. online pre-publication, p. 1-11 11 p.


Tussen nanotechnologie en natuur: de elektronica van de toekomstvan der Wiel, W. G., 14 Oct 2013, Natuurkundige voordrachten 2013-2014. Den Haag: Koninklijke Maatschappij voor Natuurkunde onder de zinspreuk Diligentia, p. 51-62 12 p. (Natuurkundige voordrachten: Nieuwe reeks; no. 92).


Towards a predictive model for functional loss after oral cancer treatmentvan Alphen, M. J. A., 27 Aug 2015, Enschede: Universiteit Twente. 132 p.


Psychologische distress in partners van kankerpatiënten: effectiviteit van een online zelfhulpinterventieKöhle, N., 2013, Jaarindex Psychosociaal Oncologisch Onderzoek. Lammens, C., Spelten, E., Duijts, S. & Engelen, V. (eds.). Amsterdam: Nederlandse Vereniging Psychosociale Oncologie (NVPO), p. 47- 1 p.


Quantitative Ansätze zur IT-RisikoanalyseTews, E. & Schlehuber, C., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit. Katzenbeisser, S., Lotz, V. & Weippl, E. R. (eds.). Nederlands Centrum Geestelijke Volksgezondheid, Vol. 228. p. 293-303 11 p. (LNI).

Presentations


-


Other


-