Maarten Everts
TitleCited byYear
Depth-dependent halos: Illustrative rendering of dense line data
MH Everts, H Bekker, JBTM Roerdink, T Isenberg
IEEE Transactions on Visualization and Computer Graphics 15 (6), 2009
1392009
FI3D: Direct-touch interaction for the exploration of 3D scientific visualization spaces
L Yu, P Svetachov, P Isenberg, MH Everts, T Isenberg
IEEE transactions on visualization and computer graphics 16 (6), 1613-1622, 2010
852010
Autologous platelet gel and fibrin sealant enhance the efficacy of total knee arthroplasty: improved range of motion, decreased length of stay and a reduced incidence of …
PAM Everts, RJJ Devilee, CJM Oosterbos, CB Mahoney, ME Schattenkerk, ...
Knee Surgery, Sports Traumatology, Arthroscopy 15 (7), 888-894, 2007
762007
Storytelling in information visualizations: Does it engage users to explore data?
J Boy, F Detienne, JD Fekete
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
532015
Designing privacy-by-design
J van Rest, D Boonstra, M Everts, M van Rijn, R van Paassen
Annual Privacy Forum, 55-72, 2012
412012
DTI in context: illustrating brain fiber tracts in situ
P Svetachov, MH Everts, T Isenberg
Computer Graphics Forum 29 (3), 1023-1032, 2010
242010
Interactive exploratory visualization of 2d vector fields
T Isenberg, MH Everts, J Grubert, S Carpendale
Computer Graphics Forum 27 (3), 983-990, 2008
202008
Exploration of the brain’s white matter structure through visual abstraction and multi-scale local fiber tract contraction
MH Everts, E Begue, H Bekker, JBTM Roerdink, T Isenberg
IEEE transactions on visualization and computer graphics 21 (7), 808-821, 2015
192015
Illustrative line styles for flow visualization
M Everts, H Bekker, JBTM Roerdink, T Isenberg
Short Paper Proceedings of the 19th Pacific Conference on Computer Graphics …, 2011
92011
Interactive illustrative line styles and line style transfer functions for flow visualization
MH Everts, H Bekker, JBTM Roerdink, T Isenberg
arXiv preprint arXiv:1503.05787, 2015
72015
UbiKiMa: Ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography
M Everts, JH Hoepman, J Siljee
Proceedings of the 2013 ACM workshop on Digital identity management, 19-24, 2013
62013
Private sharing of IOCs and sightings
T van de Kamp, A Peter, MH Everts, W Jonker
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
52016
Revocable Privacy 2011–use cases
W Lueks, MH Everts, JH Hoepman, RJ Siljee
Groningen: TNO, 2012
42012
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
32017
Mobile devices to the identity rescue
G Alpár, MH Everts
IFIP PrimeLife International Summer School on Privacy and Identity …, 2013
32013
Visualizing white matter structure of the brain using Dijkstra's algorithm
MH Everts, H Bekker, JBTM Roerdink
Image and Signal Processing and Analysis, 2009. ISPA 2009. Proceedings of …, 2009
32009
Revocable privacy: Principles, use cases, and technologies
W Lueks, MH Everts, JH Hoepman
Annual Privacy Forum, 124-143, 2015
22015
Flow visualization using illustrative line styles
M Everts, H Bekker, JBTM Roerdink, T Isenberg
Proceedings of the National ICT. OPEN/SIREN 2011 Workshop (November 14--15 …, 2011
22011
Vote to link: Recovering from misbehaving anonymous users
W Lueks, MH Everts, JH Hoepman
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
12016
Indicators of malicious SSL connections
R Bortolameotti, A Peter, MH Everts, D Bolzoni
International Conference on Network and System Security, 162-175, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20