Naar inhoud ↓
Uitgelicht

Illegale Opsporingsmethoden in Nederland

Een diepgaande analyse van illegale opsporingsmethoden binnen het Nederlandse rechtssysteem. Dit onderzoek belicht de juridische grenzen van digitale opsporing, de gevolgen van onrechtmatig verkregen bewijs, en de balans tussen effectieve criminaliteitsbestrijding en grondrechtenbescherming.

Het artikel behandelt onder meer: onrechtmatige doorzoekingen, schending van het verschoningsrecht, vormverzuimen in het opsporingsonderzoek, en de toepassing van artikel 359a Sv (bewijsuitsluiting).

Lees meer over illegale opsporingsmethoden bij CyberSecurityAD →

Onderzoeksstatistieken

250+ Publicaties (2020-2025)
45 Actieve Onderzoekers
12 PhD Trajecten
€2.5M Onderzoeksfinanciering

Recente Publicaties 2025

2025

Advanced Techniques in Digital Forensics: A Comprehensive Framework for Cryptocurrency Investigation

,

Journal of Digital Forensics, Security and Law, Vol. 20(2), pp. 45-78

This paper presents a novel framework for investigating cryptocurrency-related crimes, combining blockchain analysis with traditional forensic methods. Our approach has been validated in collaboration with Dutch law enforcement agencies.

Peer-Reviewed Article Open Access
2025

Machine Learning Approaches for Automated Malware Classification in Enterprise Environments

,

IEEE Transactions on Information Forensics and Security, Vol. 20(4), pp. 892-907

We propose a deep learning architecture for real-time malware classification achieving 98.7% accuracy on the EMBER dataset, with practical implementation guidelines for enterprise security operations centers.

Peer-Reviewed Article Impact Factor: 7.231
2025

Privacy-Preserving Data Analytics: Balancing GDPR Compliance with Business Intelligence

,

European Journal of Information Systems, Vol. 34(1), pp. 112-134

This interdisciplinary study examines practical approaches to implementing differential privacy in business analytics while maintaining GDPR compliance and data utility.

Peer-Reviewed Article Open Access
2025

Dark Web Monitoring for Law Enforcement: Technical and Ethical Considerations

,

ACM Computing Surveys, Vol. 57(3), Article 42

A comprehensive survey of dark web monitoring techniques, including ethical frameworks for law enforcement use and privacy considerations for researchers.

Survey Article Impact Factor: 16.6

Publicaties 2024

2024

Zero-Trust Architecture Implementation: A Case Study in Dutch Financial Institutions

,

Computers & Security, Vol. 145, 103892

An empirical study of zero-trust security model implementation across three major Dutch banks, with lessons learned and best practices.

Case Study Impact Factor: 5.105
2024

Deepfake Detection in Video Conferencing: A Real-Time Approach

,

IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2024)

We present a lightweight neural network architecture capable of detecting deepfakes in real-time video streams with minimal latency overhead.

Conference Paper Best Paper Award
2024

Ransomware Economics: Understanding the Business Model of Cybercriminals

, ,

Journal of Cybersecurity, Vol. 10(2), tyae012

An economic analysis of ransomware-as-a-service operations, including payment patterns and negotiation strategies observed in real incidents.

Peer-Reviewed Article Open Access
2024

Ethical AI in Criminal Justice: A Framework for Algorithmic Accountability

AI & Society, Vol. 39, pp. 1023-1045

This paper proposes a comprehensive framework for ensuring algorithmic accountability in AI systems used by law enforcement and judicial institutions.

Peer-Reviewed Article
2024

Supply Chain Security in Software Development: Detecting Compromised Dependencies

,

USENIX Security Symposium 2024

We present DEPGUARD, a tool for detecting malicious code in software dependencies using static analysis and machine learning.

Conference Paper Distinguished Paper Award

Boeken & Hoofdstukken

2024

Handboek Digitale Opsporing (3e editie)

Van der Berg, J. (Red.)

Boom Juridisch, ISBN: 978-90-8974-XXX-X

Het standaardwerk voor digitale opsporing in Nederland, gebruikt door politie, OM en rechtspraak.

Handboek Nederlands
2023

Applied Cybersecurity: From Theory to Practice

Hassan, A., Van der Berg, J.

Springer, ISBN: 978-3-031-XXXXX-X

A comprehensive textbook covering practical cybersecurity skills for students and professionals.

Textbook English

Onderzoeksthema's

Onze publicaties clusteren rond de volgende onderzoeksthema's:

Digitale Opsporing

Digital forensics, cryptocurrency investigation, dark web analysis, OSINT methodologies

65+ publicaties

Cybersecurity

Network security, malware analysis, incident response, security architecture

80+ publicaties

AI & Machine Learning

Deep learning, computer vision, NLP, automated threat detection

45+ publicaties

Privacy & Ethics

GDPR compliance, algorithmic accountability, ethical AI, data protection

30+ publicaties

FinTech & Blockchain

Cryptocurrency, blockchain security, digital payments, regulatory technology

25+ publicaties

Toegang tot Publicaties

University Applied Sciences onderschrijft Open Access en maakt zoveel mogelijk onderzoek vrij toegankelijk:

  • Institutional Repository: Alle publicaties zijn beschikbaar via ons eigen repository
  • NARCIS: Nederlandse publicaties vindbaar via het nationale portaal
  • Google Scholar: Geïndexeerd voor maximale vindbaarheid
  • ORCID: Alle onderzoekers hebben een ORCID-profiel

Voor toegang tot publicaties achter een paywall, neem contact op met de betreffende auteur.

Externe Bronnen & Samenwerkingen

Voor actuele informatie over digitale opsporing, forensisch IT-onderzoek en cybersecurity verwijzen wij graag naar de volgende externe bronnen: