Curriculum Vitae Pieter Hartel

Pieter Hartel Prof dr. Pieter H. Hartel

Potted History

Prof Dr Pieter Hartel is a full professor of Cyber security at Delft University of Technology. He holds a part time position at the University of Twente. He has 23 years of research and teaching experience in Cyber Security. He was the principal investigator of a recently completed 13.5M Euro EU project on socio technical cyber security risk management. He was one of the founding fathers of the Dutch National Sentinels research program, which had a budget of over 15M Euro for scientific research. He was one of the initiators of the Kerckhoffs Institute (2006 - 2016) and the 4TU Cyber Security Master Specialization (from 2015). He has 12 years of international experience working in Switzerland, the UK, the US, Malaysia, and Singapore.

Publications

H-index 34 (22 over the last 5 years) according to Google Scholar
Publications listed by ACM , DBLP , Scopus , EPrints , Google Scholar

Research Interests

Cyber Security, Crime Science.

Editorships

  1. G Laycock (editor-in-chief) and P Hartel and M Junger (associate editors) Crime Science, A Springer Open Access Journal from 2012
  2. J Domingo-Ferrer and PH Hartel (editors special issue) Special issue on smart cards Computer Networks Magazine, 36(4), Jul. 2001.
  3. S Diehl, PH Hartel, and P Sestoft (editors special issue) Special issue on Principles of abstract machines Future Generation Computer Systems, 16(7), May 2000.
  4. PH Hartel (editor special issue) Special issue on Smart cards Future Generation Computer Systems, 13(1), Jul. 1997.
  5. PH Hartel and MJ Plasmeijer (editors special issue) Special issue on State-of-the-art applications of pure functional programming languages. J. Functional Programming, 5(3), Jul. 1995.

International roles

  1. Founding member of IFIP working group 8.8 on smart cards . (Secretary Sep. 1998 - Jan. 2000 and Chair Jan. 2000 - Dec. 2004).
  2. Member of the board of CaberNet, a Network of Excellence in Distributed and Dependable Computing Systems, Jan. 2001 - Mar. 2004.
  3. Member of the steering committee of RESET, a Road map for smart cards, Sep. 2002 - May 2003.
  4. Consultant to the European Commission in Jun. 2001 on the Smartcard of 2010 .
  5. General Secretary of the European Association for Programming Languages and Systems EAPLS Apr. 1996 - Dec. 2001.
  6. Coordinator Erasmus/Socrates program Declarative Systems Sep. 1994 - Sep. 1999.
  7. Grant application reviewer for IST FP 5&6 of the European Commission, the Engineering and Physical Sciences Research Council of the UK, the Innovation and Technology Commission of Hong Kong, the Science and Engineering Research Council A*STAR of Singapore

National roles

  1. Member of the RVO Evaluation Committee for the 3rd tender SBIR Cyber Security RVO (Spring 2017)
  2. Member of the NWO Evaluation Committee for the Free Competition Computer Science NWO (Jul. 2009 - Jul. 2010)
  3. Secretary of the ICT Innovation Platform Security and Privacy Veilig Verbonden (Nov. 2006 - Dec. 2010)
  4. Member of the Board of the Netherlands Institute for Research on ICT NIRICT, (Jun. 2005 - Aug. 2008)
  5. Coordinator of the theme "Digital security" for the Dutch National Research Agenda ICT (Informatica Platform ) (Feb. 2005 - Mar. 2005)
  6. Member of the NWO/EW Innovation Research Incentives Scheme committee VENI (Vernieuwingsimpuls ) (Sep. 2003 - Dec. 2004)
  7. Member of the program committee of SENTINELS, a funding program for security research in the Netherlands under auspices of STW, NWO and EZ, (since Jan. 2004.)
  8. Co-chair (with Bart Jacobs of KUN) of the preparation committee of SENTINELS, a funding program for security research in the Netherlands under auspices of STW, NWO and EZ, (May 2001 - Dec. 2003)
  9. Member of the program committee of IOP GenCom, a funding program for generic communication in the private environment (Jan. 2003 - Feb. 2004)
  10. Member of the board of the graduate school IPA (Apr. 2003 - Jun. 2005)
  11. Member of the computer science board of the organisation Post Academic Technical Training PATO (May 2002 - May 2005)
  12. Grant application reviewer for NWO and STW.
  13. Member of several professorial appointment committees in Amsterdam, Delft, Eindhoven, and Nijmegen.

Principal investigator of an external grant applications

  1. SERIOUS: Security requirements for serious Apps (2015-2019)
    Sponsor NWO (628.001.011) principal investigator
  2. TREsPASS: Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security (2012-2016)
    Sponsor EC (FP7-ICT-2011-8) coordinator
  3. VISPER: The VIrtual Security PERimeter for digital, physical, and organisational security (2007 - 2011)
    Sponsor STW (TIT.7628) principal investigator
  4. A4: Adaptive non-volatile storAge systems for Adaptive Applications (2004 - 2008)
    Sponsor STW (TES.6369), principal investigator
  5. Applet mis-use in client-server applications (1997)
    Sponsor British Telecom (STRF97/33) principal investigator
  6. Smart card software generators (1996 - 1997)
    Sponsor QC Technology, The Netherlands, principal investigator
  7. Resource Constrained Shortest Path (1995)
    Sponsors NWO and the British Council (BR 62-416), principal investigator
  8. Erasmus, (1994 - 1997)
    Sponsor EC (ICP-94-NL-4040), coordinator

Co-investigator or local contact person of an external grant applications

  1. Crime Science Open Access Journal (2012 - 2014)
    Sponsor NWO (50.915.224) principal applicant M Junger co-applicant PH Hartel
  2. Natural Teggs: Egg classification (2009 - 2011)
    Sponsor Ministry of Economic Affairs / Pieken in de Delta (PID091043) contact person for Twente PH Hartel
  3. Kindred Spirits: Privacy Enhanced Social Networking (2009 - 2013)
    Sponsor STW (10527) principal investigator RL Lagendijk co-investigator PH Hartel
  4. ALwEN: Ambient Living with Embedded Networks (2008 - 2010)
    Sponsor SenterNovem (PNE07007) contact person for Twente PH Hartel
  5. SPCMHD: Secure Patient-Centric Management of Health Data (2007 - 2011)
    Sponsor Philips Research (RWC-EP-061-07156-gvg) principal investigator W Jonker, co-investigator PH Hartel
  6. ProTeM: Pobe-based Terabit Memory (2007 - 2011)
    Sponsor EC (IST-2005-2.5.2) contact person for Twente L Abelmann
  7. SEDAN: Searchable Data Encryption (2007 - 2011)
    Sponsor STW (EIT.7630) principal investigator H van Tilborg co-investigator PH Hartel
  8. VRIEND: Value-Based Security Risk Mitigation in Enterprise Networks that are Decentralized (2007 - 2011)
    Sponsor STW (TIT.7635) principal investigator RJ Wieringa co-investigator PH Hartel
  9. MOCA: Modeling Control Aspects of Embedded Systems (2005 - 2009)
    Sponsor NWO (600.065.120.24N20), principal investigator A Mader
  10. IPID: Integrated Policy-based Intrusion Detection (2005 - 2008)
    Sponsor STW (TIT.6679), principal investigator RJ Wieringa co-investigator PH Hartel
  11. Secure Grip (2004 - 2008)
    Sponsor STW (TIT.6323), principal investigator RNJ Veldhuis co-investigator PH Hartel
  12. TEAHA: TEAHA: The European Application Home Alliance (2004 - 2007)
    Sponsor EC (IST-1-507029-STP), contact person for Twente J Scholten
  13. Inspired: Integrated Secure Platform for Interactive Personal Devices (2004 - 2007)
    Sponsor EC (IST-1-507894-IP), contact person for Twente PH Hartel
  14. Freeband/I-Share: Sharing resources in virtual communities for storage, communications, and processing of multimedia data (2004 - 2008)
    Sponsor Ministry of Economic Affairs / BSIK, contact person for Twente PH Hartel
  15. BRICKS: Basic Research in Informatics for Creating the Knowledge Society (2004 - 2008)
    Sponsor Ministry of Economic Affairs / BSIK, contact person for Twente S Etalle
  16. Smart Surroundings (2004 - 2008)
    Sponsor Ministry of Economic Affairs / BSIK, principal investigator PJM Havinga
  17. Secure Meta Data: Secure Content Management in Ambient Environments - how about security and meta data? (2003 - 2007)
    Sponsor Philips Research (RWC-061-JH-03007-JH), principal investigator W Jonker, co-investigator PH Hartel
  18. MoMS: Methods of Modelling Embedded Systems (2003 - 2007)
    Sponsor NWO (632.001.202), principal investigator A Mader
  19. LicenseScript: A language and framework for calculating licenses on information over constrained domains (2002 - 2004)
    Sponsor Telematica Institute, principal investigator S Etalle co-investigator PH Hartel
  20. RESET: Roadmaps for European research on Smartcard related Technologies (2002 - 2003)
    Sponsor EC (IST-2001-39046), member of the steering committee PH Hartel
  21. EYES: Energy Efficient Sensor Networks (2001 - 2003)
    Sponsor EC (IST-2001-34734), principal investigator PJM Havinga
  22. CaberNet: Network of Excellence in Distributed and Dependable Computing Systems (2000 - 2003)
    Sponsor EC (IST-2000-25088), member of the executive board PH Hartel
  23. Gecko: Communication and Scheduling in Reconfigurable Multimedia Terminals (2001 - 2005)
    Sponsor NWO (612.064.103), principal investigator GJM Smit
  24. @home: At Home Anywhere (2001 - 2005)
    Sponsor NWO (600.065.120), principal investigator J Scholten co-investigator PH Hartel
  25. Security in Multi Agent architectures (2000)
    Sponsor DERA, Malvern, principal investigator D DeRoure
  26. ABCD: Validation of Business Critical Systems (2000 - 2003)
    Sponsor EPSRC (GR/M91013), principal investigator P Henderson
  27. Matisse: Methods for Industrial Strength Systems Engineering (2000 - 2002)
    Sponsor EC (IST-1999-11435), contact person for Southampton MJ Butler
  28. Parallel declarative programming (1996 - 1998)
    Sponsor NWO/SION (612-33-003), principal investigator KR Apt co-investigator PH Hartel
  29. AUTOMAP: language and compiler support for coarse-grain parallelism (1996 - 2000)
    Sponsor NWO/SION, principal investigator HJ Sips co-investigator PH Hartel
  30. Intelligent Code Scheduling (1994 - 1998)
    Sponsor NWO/SION (612-317-123), contact person for Amsterdam PH Hartel

Industrial consultant

  1. LME Design Automation, Southampton, UK, 1999 - 2001
  2. Mindport BV, Hoofddorp, The Netherlands, 1999 - 2001
  3. Integrity Arts (now Sun MicroSystems) Cupertino, California, 1996 - 2006
  4. QC Technology, Zaandam, 1994 - 1996
  5. Touch Technology, Phoenix, Arizona, 1996

Reviewer

Reviewer for over 60 International Journals, Conferences, Workshops and Book publishers

PhD Supervisor

7 current students and 21 completions in 12 years. For details see See supervised PhD students

Member of Habilitation committees

  1. Saarbruecken, May 2003

External Examiner of PhDs

  1. B Gedrojc, Delft, Oct 2011, Private Computing with Untrustworthy Proxies
  2. F D Garcia, Nijmegen, May 2008, Formal and Computational Cryptography: Protocols, Hashes, and Commitments
  3. W H M Hafkamp, Amsterdam (UvA), Mar. 2008, Als alle informatie telt : een onderzoek naar kwetsbaarheden- en incidentenresponse bij ICT-organisaties
  4. I D Shterev, Delft, Mar. 2007, Quantization-Based Watermarkiung: Methods for Amplitude Scale Estimation, Security and Linear Filter Invariance
  5. M Warnier, Nijmegen, Nov. 2006, Language Based Security for Java and JML
  6. K Cartrysse, Delft, Nov. 2005, Private computing and Mobile code systems
  7. S Daskapan, Delft, Apr. 2005, MEDUSA: survivable information security
  8. H van Dijk, Delft, Nov. 2005, Democratic processing: Mastering the complexity of communicating systems
  9. G Muller, Delft, Jun. 2004, CAFCR: A Multi-view Method for Embedded Systems Architecting; Balancing Genericity and Specificity
  10. P Serrarens, Nijmegen, Jan. 2001, Communication Issues in Distributed Functional Computing
  11. M Kesseler, Nijmegen, Apr. 1996, The implementation of Functional Languages on Parallel Machines with Distributed Memory
  12. J Kamperman, Amsterdam (UvA), Feb. 1996, Compilation of term rewriting systems
  13. P Achten, Nijmegen, Feb. 1996, Interactive functional programs: models, methods and implementation

Internal Examiner of PhDs

  1. M Caselli, Twente, Nov. 2016, Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security
  2. M Feiri, Twente, Oct. 2016, Scalable Broadcast Authentication for V2V Communication
  3. R Hofstede, Twente, Jun. 2016, Flow-based Compromise detection
  4. P Knapik, Twente, Jan 2016, Automotive Security Functions The Use of New Technologies to Tackle Vehicle-Related Crime
  5. A van Cleeff, Twente, Jun. 2015, Physical and Digital Security Mechanisms: Properties, Combinations and Trade-offs
  6. S Dietzel, Twente, Apr. 2015, Resilient in-network aggregation for vehicular networks
  7. Meiru Mu, Twente, Jul. 2013, Texture Representation for Low-resolution Palmprint Recognition
  8. S Damjanovic, Twente, Nov. 2012, Dense Stereo Matching: In the pursuit of an ideal similarity measure
  9. E Zambon, Twente, Jan. 2011, Towards Optimal IT Availability Planning: Methods and Tools
  10. JBC Engelen, Twente, Jan. 2011, Optimization of Comb-Drive Actuators: Nanopositioners for Probe-Based Data Storage and Musical MEMS
  11. A Sperotto, Twente, Oct. 2010, Flow-based Intrusion Detection
  12. EJC Kelkboom, Twente, Oct. 2010, On the Performance of Helper Data Template Protection Schemes
  13. HJW van Heerde, Twente, Jun. 2010, Privacy-aware data management by means of data degradation: making private date less sentive over time
  14. T Staijen, Twente, Jun. 2010, Graph-based Specification and Verification for Aspect-Oriented languages
  15. V Nunes Leal Franquera, Twente, Nov. 2009, Finding multi-step attacks in computer betworks using heuristic search and mobile ambients
  16. GM Beumer, Twente, Oct. 2009, Face Recognition, a Landmarks Tale
  17. X Shang, Twente, Dec. 2008, Grip-pattern recognition: Applied to a Smart Gun
  18. I Nagy, Twente, Jun. 2006, On the Design of Aspect-Oriented Composition Models for Software Evolution
  19. J van Ruth, Twente, Jun. 2006, Flattening Queries over Nested Data Types
  20. L Cloth, Twente, Jan. 2006, Model Checking Algorithms for Markov Reward Models
  21. A Bazen, Twente, Sep. 2002, Fingerprint Identification - Feature Extraction, Matching and Database Search
  22. T Stabell-Kulo, Twente, Jul. 2002, Private Computing: The Trusted Digital Assistant
  23. F Sluiman, Twente, Mar. 2002, Linear Data Structures for Storage Allocation in Attribute Evaluation
  24. W van Oortmerssen, Southampton, Jul. 2000, Concurrent tree space transformation in the Aardappel programming language
  25. H McEvoy, Amsterdam (UvA), Oct. 1997, Coordinating multiset transformers
  26. R Hofman, Amsterdam (UvA), May. 1994, Scheduling and grain size control
  27. K Langendoen, Amsterdam (UvA), Apr. 1993, Graph reduction on shared-memory multiprocessors

International Invited talks

  1. Int. Seminar on Cybercrime and ICT Security for a Good Governance link
    Batam, Indonesia, 17 Dec. 2011, Keynote
  2. Int. Conf. on Soft Computing and Pattern recognition HIS
    Malacca, Malaysia, 5 Dec. 2011, Invited tutorial
  3. Int. Seminar on Cyber Crime link
    Malacca, Malaysia, 30 Dec. 2010, Keynote
  4. EU/NSF/DHS seminar on Cyber security and Trust
    Champaign, Illinois, 26-27 Apr. 2007, Invited talk
  5. 6th Int. Workshop on Issues in the Theory of Security WITS
    Vienna, Austria, Mar. 25-26, 2006, Keynote
  6. Int. Workshop Construction and Analysis of Safe, Secure and Interoperable Smart cards CASSIS
    Marseille, France, March 10-14, 2004, Invited talk

Conferences and Workshops TPC member

  1. 18th IEEE Int. Symp. on High Assurance Systems Engineering HASE
    Sinagpore, 12-14 Jan. 2017, TPC member
  2. Inaugural Singapore Cyber Security R&D Conference : Cyber Security by Design SG-CRC
    Singapore, 14-15 Jan. 2016, TPC member
  3. 10th Int. Conf. on Critical Information Infrastructures Security CRITIS
    Berlin, Germany, 5-7 Oct. 2015, TPC member
  4. 9th Int. Conf. on Critical Information Infrastructures Security CRITIS
    Limassol, Cyprus, 13-15 Oct. 2014, TPC member
  5. 8th Int. Conf. on Critical Information Infrastructures Security CRITIS
    Amsterdam, The Netherlands, 16-18 Sep. 2013, TPC co-chair
  6. 3rd Workshop on Socio-Technical aspects in Security and Trust STAST
    New Orleans, Louisiana, 29 Jun. 2013, TPC member
  7. Cyber Security Conference
    Washinton D.C., 14-16 Dec. 2012, TPC member
  8. 4th IEEE International Conference on Information Privacy, Security, Risk and Trust PASSAT
    Amsterdam, The Netherlands, 3-6 Sep. 2012, General co-chair
  9. 2nd Workshop on Socio-Technical aspects in Security and Trust STAST
    Cambridge, Massachusetts, 29 Jun. 2012, TPC member
  10. 1st Workshop on Socio-Technical aspects in Security and Trust STAST
    Milano, Italy, 8 Sep. 2011, TPC member
  11. Workshop on Security and Privacy in Cloud Computing SPCC
    Brussels, Belgium, 17 May. 2010, TPC member
  12. 2nd Int. Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use IWSSI/SPMU
    Helsinki, Finland, 17 May. 2010, TPC member
  13. 26th IEEE Symp. on Massive Storage Systems and Technologies (MSST): Research Track MSST
    Lake Tahoe, Nevada, 6-7 May. 2010, TPC member
  14. Symposium on Sensor Network Security SNSec
    Melbourne, Australia, 7-10 Dec. 2009, TPC member
  15. 8th IFIP Smart card research and advanced application conference CARDIS
    Royal Holloway, University of London, UK, 8-11 Sep. 2008, TPC member
  16. Workshop on Security and Privacy Issues in Mobile Phone Use SPMU
    Sydney, Australia, 19 May 2008 TPC member
  17. 2nd Benelux Workshop on Information and System Security WISSEC
    Luxembourg, 20-21 Sep. 2007, TPC member
  18. 12th European Symposium On Research In Computer Security ESORICS
    Dresden, Germany, 24-26 Sep. 2007, TPC member
  19. 1st Benelux Workshop on Information and System Security WISSEC
    Antwerp, Belgium, 8-9 Nov. 2006, TPC member
  20. 3rd Workshop on Secure Data Management SDM
    Seoul, Korea, 10-11 Sep. 2006, TPC member
  21. 11th European Symposium On Research In Computer Security ESORICS
    Hamburg, Germany, 18-19 Sep. 2006, TPC member
  22. 7th IFIP Smart card research and advanced application conference CARDIS
    Tarragona, Spain, 19-21 Apr. 2006, TPC member
  23. 14th European Symposium on Programming ESOP
    Vienna, Austria, 25 Mar.-2 Apr. 2006, TPC member
  24. 2nd Workshop on Secure Data Management SDM
    Trondheim, Norway, Aug. 30-Sep. 2, 2005, TPC member
  25. IFIP Working Group 11.2 - Small Systems Security Workshop
    Chiba City, Japan, 31 May 2005, TPC member
  26. 1st Workshop on Secure Data Management in a Connected World SDM
    Toronto, Canada, Aug. 30-Sep. 3, 2004, TPC member
  27. 6th IFIP Smart card research and advanced application conference CARDIS
    Toulouse, France, 22-27 Aug. 2004, TPC member
  28. IFIP Working Group 11.2 - Small Systems Security Workshop
    Athens, Greece, 27 May 2003, TPC member
  29. 5th IFIP Smart card research and advanced application conference CARDIS
    San Jose, California, 20-22 Nov. 2002, TPC member
  30. 10th European Symposium on Programming ESOP
    Grenoble, France, 6-14 Apr. 2002, TPC member
  31. 2nd JavaCard Workshop - eSmart
    Cannes, France, 19 Sep. 2001, TPC member
  32. IFIP TC11 16th Int. Conf. on Information Security - IFIPSEC
    Paris, France, 11-13 Jun. 2001, TPC member
  33. 1st JavaCard Workshop - eSmart
    Cannes, France, 14 Sep. 2000, TPC member
  34. 4th IFIP Smart card research and advanced application conference - CARDIS
    Bristol, UK, 20-22 Sep. 1999, TPC member
  35. 1st Workshop on Abstract Machines - WPAM
    Pisa, Italy, Sep. 1998, TPC member
  36. 3rd IFIP Smart card research and advanced application conference - CARDIS
    Louvain La Neuve, France, Sep. 1998, TPC member
  37. 9th Programming languages: Implementations, Logics, and Programs - PLILP
    Southampton, UK, Sep. 1998, Local organiser, co-chair
  38. European Symposium on Programming - ESOP
    Lisbon, Portugal, Apr. 1998, TPC member
  39. Implementation of Functional Languages - IFL
    St.Andrews, Scotland, Sep. 1997, TPC member
  40. 2nd ACM Int. Conference on functional programming - ICFP
    Amsterdam, The Netherlands, Jun. 1997, Local organiser
  41. 2nd IFIP Smart card research and advanced application conference - CARDIS
    Amsterdam, The Netherlands, Sep. 1996, General chair
  42. 1st Symposium on functional programming languages in Education - FPLE
    Nijmegen, The Netherlands, Dec. 1995, TPC co-chair
  43. 7th ACM Conference on functional programming languages and architecture - FPCA
    La Jolla, California, Jun. 1995, TPC member
  44. 3rd Workshop on implementation of functional languages - IFL
    Southampton, UK, Jun. 1991, Local organiser

Teaching

  1. Course Operating systems for 2nd/3rd year Bachelor students
    (32 lectures; 2012: 72 students, 2013: 94 students, 2014: 68 students, 2015: 72 students, 2016: 76 students)
  2. Course Introduction to Information Security for Bachelor students
    (16 lectures; 2012: 19 students, 2013: 34 students)
  3. Course Cyber Crime Science for Master students
    (20 lectures; 2011: 34 students, 2012: 33 students, 2013: 50 students, 2014: 32 students, 2015: 32 students)
  4. Course Introduction Computer Security for Master students
    (16 lectures; 2008: 42 students, 2009: 36 students, 2010: 37 students)
  5. Course Concurrent and Distributed Programming for 3rd year Bachelor students
    (16 lectures; 2003: 101 students, 2004: 101 students, 2005: 91 students)
  6. Post Academic Training (PATO) Course Internet Security
    (2 days; 2002: 12 students)
  7. Course Distributed E-Business Techniques for Master students
    (16 lectures; 2001: 28 students, 2002: 30 students, 2003: 38 students, 2004: 37 students)
  8. Part III individual project coordinator
    (1996: 171 students; 1997: 185 students; 1998: 200 students; 1999: 182 students)
  9. Course Programming Principles for first year Bachelor student
    (1995: 30 lectures; 1996,1997,1998: 60 lectures)
  10. Workshop Semantics of programming languages for post graduate students
    (1994: 40 lectures)
  11. Course Implementation of functional programming languages for Master students
    (1989 - 1995: 6 x 20 lectures)
  12. Course Functional programming for Master students
    (1992 - 1995: 3 x 20 lectures, 3 x 30 hours laboratories)
  13. Supervision of final year undergraduate student projects
    (1982 - 2012: total 45 students)
  14. Course Operating systems for 2nd/3rd year Bachelor students
    (1985 - 1986: 2 x 26 lectures, 2 x 100 hours laboratories)
  15. Course Unix (Shell Research Amsterdam)
    (1985: 4 lectures)
  16. Course Introductory programming for first year students
    (1983 - 1984, 2 x 13 lectures, 2 x 50 hours laboratories)
  17. Laboratories Computer organisation
    (1982 - 1984, 3 x 100 hours laboratories, 1993 course supervision)
  18. Presentations to various audiences designed to attract more students

Administration

  1. Head of the Computer Science Department (Nov. 2012 - Dec. 2013)
  2. Member of Ethical committee (Apr. 2012 - Dec. 2013)
  3. Study Advisor for Twente of the Kerckhoffs security master (since Apr. 2008)
  4. Chair of the Scientific Information Committee (since Aug. 2008)
  5. Vice Dean of the faculty of Electrical Engineering, Mathematics and Computer science (Jun. 2006 - Aug. 2008)
  6. Head of the Computer Science Department (Jun. 2005 - Aug. 2008)
  7. Head of the Distributed and Embedded Security group (Sep. 2000 - Jun. 2013)
  8. Organiser of the weekly ES cluster seminars (Sep. 2003 - Jun. 2008)
  9. Chair of Staff Student Liaison Committee Computer Science (2002 - 2004)
  10. Member of Academic committee (1996 - 2000)
  11. Organiser of the weekly DSSE group seminars (1995 - 1998)
  12. Member of Research committee (1996 - 2000)
  13. Member of Staff Student Liaison Committee Computer Science (1994 - 1995)
  14. Secretary to the Computer Science Examination Committee (1994 - 1995)
  15. Chair of the working group Modernisation of the Computer Science Curriculum (1993 - 1995)
  16. Editor of the Annual Report of the Department (1992 - 1995)
  17. Co-editor of the Annual Report of the Faculty (1992 - 1995)
  18. Member management team Computer Architecture and Declarative Systems group, including the organisation of the weekly architecture seminars (1991 - 1995)
  19. Co-ordinator of the Dutch PhD student research network Computer Systems, organisation of the semi-annual workshops (1991 - 1995)
  20. Member of Academic Committee (1982 - 1989,1993 - 1995)
  21. Chair of the Departmental Computer and infrastructure Committee (1983 - 1986)
  22. Systems and Networks manager (1982 - 1985)

Education

  1. PhD degree Mathematics and Computer Science, Univ. of Amsterdam (Feb. 1989)
  2. Masters degree Mathematics, Free Univ. Amsterdam (Apr. 1978)
  3. HBS-B (secondary school) (May 1970)

Positions held

  1. Research Associate at Interpol Global Complex for Innovation, Singapore (Nov 2014 - Apr. 2015)
  2. Visiting professor Cyber Security at TU Delft (since Jun. 2013)
  3. Advisor Cyber Security at TNO Cyber Security Lab The Hague (since Jan. 2013)
  4. Visiting professor Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka (Jan. 2009 - Dec. 2011)
  5. Full professor Distributed Systems, Dept. of Computer Science, Univ. of Twente (since Sep. 2000)
  6. Reader, Dept. of Electronics and Computer Science, Univ. of Southampton (Oct. 1995 - Sep. 2000)
  7. Senior Lecturer, Computer Systems Dept, Univ. of Amsterdam (Aug. 1991 - Sep. 1995)
  8. Research Assistant (sabbatical) Dept. of Electronics and Computer Science, Univ. of Southampton (Aug. 1989 - Aug. 1991)
  9. Lecturer, Computer Systems Dept, Univ. of Amsterdam (Sep. 1982 - Aug. 1989)
  10. Research Assistant, Computer graphics Dept, Univ. of Nijmegen (Jul. 1981 - Aug. 1982)
  11. Systems programmer, CERN DD division, Geneva, Switzerland. (Jun. 1978 - Jun. 1981)
Last update: 18 Jan 2017.