Presentation
Presentation
Advanced De-identification & Linkage of Personal Data originating from Multiple Sources for Secondary Use (2.9 MiB)
Towards Cryptographic Agility in the Public Sector (1.3 MiB)
Privacy in Practice with Smart Pseudonymization - Lessons from the Belgian Public Sector (3.3 MiB)
Webinar - Privacy in Practice with Smart Pseudonymisation (4.2 MiB)
An introduction to confidential computing (23.8 MiB)
Webinar - An introduction to confidential computing (4.6 MiB)
Webinar AI-augmented Development (3.4 MiB)
Architecting Tomorrow: a Vision on Event-Driven Architecture (3.6 MiB)
Devoxx 2023: Quantum computers Vs. Modern cryptography (4.2 MiB)
Géocodage : quels outils pour quels besoins ? (3.4 MiB)
Guest Lecture VUB 2023 - Quantum computing Vs. Modern cryptography (8.8 MiB)
Fake it till you make it - an introduction to synthetic data (4.1 MiB)
Webinar DEVOXX- Fake it till you make it: an introduction to synthetic data (3.5 MiB)
PostGIS - Gérer des données géographiques dans PostgreSQL (3.6 MiB)
Cybersec 2022 - Kwantumcomputers Vs. Cryptografie (4.9 MiB)
GIS Analytics: quel potentiel pour les données géographiques ? (4.8 MiB)
Webinar SAI - Natural Language Generation (4.0 MiB)
Privacy-enhancing technologies voor de publieke sector (7.3 MiB)
Natural Language Generation (3.5 MiB)
Anonimisatie Vs. Pseudonimisatie (4.7 MiB)
Reusable SHACL Constraint Components for Validating Geospatial Linked Data (1.0 MiB)
Starten met NLP in het Nederlands (1.9 MiB)
Knowledge graphs - Concept, mogelijkheden en aandachtspunten (3.0 MiB)
API - the Smals story (4.0 MiB)
Kwantumcomputers & cryptografie (5.9 MiB)
Some Pitfalls of AI (4.0 MiB)
Webscraping for Analytics (1.8 MiB)
Advanced cryptography for privacy protection - Cases from the government field (2.8 MiB)
Bescherming van persoonsgegevens met geavanceerde cryptografie (7.3 MiB)
AI entre rêve et réalité - AI tussen droom en daad (2.6 MiB)
Talk Infosecurity 2019: Pitfalls in AI (1.7 MiB)
Talk Infosecurity 2019: Blockchain lessons from the government field (2.4 MiB)
From Blockchain to Reality - Cases, ervaringen & lessons learned (7.2 MiB)
Conversational interfaces en chatbots (5.9 MiB)
Conversational_interfaces_en_chatbots (6.0 MiB)
7 Myths About Bitcoin @ Infosecurity 2018 (3.4 MiB)
Fighting Fraud with Graph Databases (1.8 MiB)
The Quantum-World (3.1 MiB)
Graph & Network analytics (13.1 MiB)
Linking Together Personal Data in the Era of Big Data & GDPR (2.7 MiB)
Blockchain & Smart Contracts (7.3 MiB)
Data Protection 2.0 (3.8 MiB)
Privacy vs. Analytics (6.9 MiB)
Data Visualization (8.3 MiB)
Strong Mobile Authentication (6.3 MiB)
Cloud Security Guidance (4.2 MiB)
Social Media & eGovernment (7.3 MiB)
Gevoelige Overheidsdata en de Cloud (9.0 MiB)
Infosessie Application Platform as a Service (6.0 MiB)
Streamlining Analytics (6.0 MiB)
Email Address Reliability (4.1 MiB)
Archivage des bases de données (6.5 MiB)
Bring Your Own Device & Mobile Security - L’art de faire cohabiter des appareils personnels et professionnels en entreprise (4.5 MiB)
Introduction à Cloud Encryption - Comment protéger la confidentialité des données hébergées dans le cloud (1.6 MiB)
Security Information & Event Management (SIEM) - Privileged Account Management (PAM) (5.3 MiB)
High Availability Concepts (3.2 MiB)
Predictive analytics (3.7 MiB)
NoSQL - Hype ou Innovation (3.1 MiB)
Gestion des certificats digitaux et méthodes alternatives de chiffrement (1.8 MiB)
Cloud computing - Concept vaporeux ou réelle innovation ? (1.8 MiB)
Gestion intégrée des anomalies - Evaluer et améliorer la qualité des données (4.5 MiB)
Mobiele Applicaties - update (1.5 MiB)
Product Review
Research reports
Techno