Jump to:
2025,
2024,
2023,
2022,
2021,
2020,
2019,
2018,
2017,
2016,
2015,
2014,
2013,
2012,
2011,
2010,
2009,
2008,
2007
2025
Chiara Rizzato: Parental control effectiveness : Evaluating filtering solutions of the leading Italian ISPs
June 2025
June 2025
Pedro Henrique Wo de Alcantara: Evaluating bi-directional connectionless BLE for bike-to-bike communication
May 2025
May 2025
Bas Palinckx: Exposing Potential Origin Networks of Malicious Spoofed Traffic through Anycast Catchment Mapping
April 2025
April 2025
Borna Mahovic: Exploring Optimization and Cross-Modal Learning for Radar Target Detection in Range-Doppler Maps
April 2025
April 2025
Yoran Dani Staal: Measuring Power Consumption of a Virtualized 5G Mobile Network Using OpenAirInterface
February 2025
February 2025
David Pröschold: Cyber Security Maturity in European Startup Enterprises : An Empirical Investigation
January 2025
January 2025
2024
Max Resing: Safe Links or Safe Leaks? : A Deep Dive into Information Exposure via Microsoft Safe Links on Public Sources
November 2024
November 2024
R. Oostveen: CWE-ASSIST: A framework for automating CWE classification
November 2024
November 2024
Bas Bleijerveld: A Scalable Recommendation System for Selective Retention of DDoS Traffic : Entropy-Based Network Traffic Analysis
October 2024
October 2024
J. van der Kaaij: A Look into the Scanned and Non-Scanned IPv4 Address Space
September 2024
September 2024
Roman Khavrona: Tracking Internet Host Usage Types : Classification and Trends via Reverse DNS Data
September 2024
September 2024
M. Mavropoulos Papoudas: Measuring the impact of DDOS attacks on mail service infrastructures
September 2024
September 2024
Youwei Xu: Understanding and Characterizing CDN Services and Paid Features
September 2024
September 2024
L. Berenschot: Early Warning System for Newly Registered Malicious Domains : A Machine Learning and Certificate Transparency Approach
August 2024
August 2024
J.G.W. Nijland: Rirmap : Using a Graph Database to Enhance Exploratory Research for RIR WHOIS data
July 2024
July 2024
M. Ansar: Web Crawl Refusals: Insights From Common Crawl
May 2024
May 2024
B.G. Nijenhuis: Leveraging 5G NR-U Bandwidth Parts in Coexistence with Wi-Fi
April 2024
April 2024
N.M. Overkamp: ReScan : High performance mass scan responder
April 2024
April 2024
2023
S.J. Witt: An Internet-wide investigation of publicly accessible databases
November 2023
November 2023
Kyriakos Chatzimichail: Synchronization improvement in automotive Ethernet networks
November 2023
November 2023
August Karlsson: Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT
November 2023
November 2023
Vlad-Cristian Andrei: The security impact of DNS and TLS on the websites reconnaissance process
August 2023
August 2023
Remi Hendriks: Improving anycast census at scale
July 2023
July 2023
R.L.H. Fontein: Investigating DNS Information Flow In Corporate Networks
June 2023
June 2023
G. Christou: On Services Exposed by DNS Infrastructure: A KINDNS Investigation
June 2023
June 2023
A. van Harten: The role of WebSDR usage in open source intelligence gathering during geopolitical events
April 2023
April 2023
D.L.M. Lummen: Is Telegram the new Darknet? A comparison of traditional and emerging digital criminal marketplaces
April 2023
April 2023
H. Goswami: A framework for detecting and preventing DoS attacks in automotive ethernet switches
March 2023
March 2023
W.J. Kobes: Governmental domain name management : policy versus practice
February 2023
February 2023
J.J. Sonneveld: Profiling Users by Access Behaviour Using Data Available to a Security Operations Center
January 2023
January 2023
2022
R.S. Dijkstra: How can the eradication phase of incident response for ransomware incidents be improved based on previous ransomware incidents?
December 2022
December 2022
Rezfan Pawirotaroeno: Space Internet Congestion Control : optimising loss-based congestion control algorithms for increased throughput over satellite-terrestrial communication networks
December 2022
December 2022
Karel van Klink: Quantum Key Distribution in a Pan-European Network of National Research and Education Networks, Qualitative and Quantitative Aspects of Implementing a Quantum Key Distribution Network
November 2022
November 2022
J.J. Rengers: DDS in a Zero Trust Cloud Native Environment in the Naval Domain
November 2022
November 2022
Rushvanth Bhaskar: A Day in the Life of NTP : Analysis of NTPPool Traffic
October 2022
October 2022
C. Schmit: Offloading Strategies for the Rendering Process in Edge-enabled Virtual Reality Games
October 2022
October 2022
Jan-Paul Konijn: Multi-domain Cyber-attack Detection in Industrial Control Systems
September 2022
September 2022
M.C. Kellaway: Accelerating the SCION IP Gateway using programmable data planes
September 2022
September 2022
Matthijs Vos: Capability Maturity Measurement of a Security Operations Center through Analysis Detection
September 2022
September 2022
D.J. Eijkel: Anycast in the SCION Internet Architecture
August 2022
August 2022
Akshay Prasad: Investigating whether typosquatting targets children
May 2022
May 2022
A. Chattopadhyay: Resilience of DNS infrastructure against DDoS attacks
March 2022
March 2022
K.W. van Hove: Threat analysis of RPKI relying party software
March 2022
March 2022
Sevinj Jafarli: Providing DNS Security in Post-Quantum Era with Hash-Based Signatures
February 2022
February 2022
G.J. Beernink: Taking the quantum leap: Preparing DNSSEC for Post Quantum Cryptography
February 2022
February 2022
Etienne Khan: Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers
February 2022
February 2022
L.J.A. Jansen: Assessing smart home security : a Zigbee case study
January 2022
January 2022
2021
M.K. Kalyankumar: Directional spectrum sensing in 6 Ghz
December 2021
December 2021
Jesper C. Provoost: Improving Operational Efficiency In EV Ridesharing Fleets By Predictive Exploitation of Idle Times
October 2021
October 2021
C.P.B. Scholten: Automatic detection of zero-day attacks in high-interaction IoT honeypots using static analysis techniques
September 2021
September 2021
A.P. Dekker: Planning Self-Backhauled mmWave Networks with Multi-Connectivity
September 2021
September 2021
L.J.W. de Vries: Detection of DoH tunnelling : comparing supervised with unsupervised learning
September 2021
September 2021
Thijs Havinga: MmWave Beam Control for Geocasting in Vehicular Networks
July 2021
July 2021
2020
E.K. van den Eijnden: Optimal Handover in MEC for an Automotive Application
December 2020
December 2020
D.S. Shabeer Ahmed: Sustainable hitlist : targets for internet scans
November 2020
November 2020
Matthias Caretta Crichlow: A study on Blue Team’s OPSEC failures
October 2020
October 2020
J. Prins: Proactive recognition of domain abuse
October 2020
October 2020
O.N.R. Haalstra: Browser Anti-Fingerprinting as a pathway to Impersonation and Fraud
October 2020
October 2020
G.M. Kahraman: Characterizing Sender Policy Framework configurations at scale
September 2020
September 2020
Riccardo Colombo: On the escalation from Cyber Incidents to Cyber Crises
August 2020
August 2020
Giovanni Ferronato: IoT White Worms : design and application
August 2020
August 2020
C. Hendriks: Proactively detecting crafted domains using active DNS measurements
July 2020
July 2020
S.J. Hartvelt: Assessing the impact of data availability on parking prediction accuracy : a case study using a simulation-based Approach
April 2020
April 2020
R. Tolud: Analysis of malicious domains using active DNS data provided by blacklists
February 2020
February 2020
Kimberly Hengst: Best Practices in Cloud Incident Handling
February 2020
February 2020
H. T. Evci: Efficient and Reliable Delivery of VR over 5G Mobile Networks
January 2020
January 2020
2019
Joeri Kock: A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules
November 2019
November 2019
H.D. van Wieren: Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path
November 2019
November 2019
Sridhar Bangalore Venugopal Sridhar Bangalore Venugopal: Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints
November 2019
November 2019
J.G. Conrads: DDoS Attack fingerprint extraction tool : making a flow-based approach as precise as a packet-based
September 2019
September 2019
Anna Prudnikova: Standardized security assessment framework for ICS devices and pilot project
August 2019
August 2019
Dzulqarnain Dzulqarnain: Investigating IoT malware characteristics to improve network security
August 2019
August 2019
M.A. Açikalin: Profiling Recursive Resolvers at Authoritative Name Servers
August 2019
August 2019
R. Yazdani: Detection of Malicious IDN Homoglyph Domains Using Active DNS Measurements
August 2019
August 2019
Joost Jansen: Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC
August 2019
August 2019
Joost Jansen: Communication of Incident Severity between Customers and Analysts in a Security Operations Center
August 2019
August 2019
Ivan Lukman: Complete Characterization of Publicly Available Domain Blacklists
August 2019
August 2019
R. Kokkelkoren: Catching Flux-networks in the open
April 2019
April 2019
M.M.J. Meijerink: Anomaly-based detection of lateral movement in a Microsoft Windows environment
January 2019
January 2019
2018
Réka Szabó: Penetration testing of AWS-based environments
November 2018
November 2018
Richard Jacob Kers: Low Energy Multi-Hop Mesh Network for Nomadic Localisation Sensors: On the Design, Development and Deployment
September 2018
September 2018
C.J.T.M. Schutijser: Towards automated DDoS abuse protection using MUD device profiles
August 2018
August 2018
Aashik Chandramohan: Machine learning for cooperative automated driving
August 2018
August 2018
D. Meinsma: Digging up Malware
August 2018
August 2018
J.S. Panman de Wit: Dynamic detection of mobile malware using real-life data and machine learning
August 2018
August 2018
I.R. Timmer: Anomaly Detection of malicious TLS traffic
August 2018
August 2018
T Kers: Household occupancy detection for burglary purposes : Risk assessment and effectivity analysis of an unobtrusive, easy-to-implement countermeasure against Wi-Fi tracking.
August 2018
August 2018
R.C.P. Löwik: Tracking of wireless devices: is it possible and solvable?
July 2018
July 2018
J.S. Spenkelink: Consumer-deployable network intrusion detection in public clouds
April 2018
April 2018
T.A.J. Klein Nijenhuis: Discovery and Quantification of Open DNS Resolvers on IPv6
February 2018
February 2018
M.A. Kriele: Noise-based Frequency Offset Modulation Simulation Model Design : For the analysis of Transmit-Reference Medium Access Control in Multiple Access Ad-hoc Wireless Sensor Networks
January 2018
January 2018
2017
Amit Kumar Gupta: Security risk analysis of automotive ethernet networks
October 2017
October 2017
R. Siebel: Video distribution in a D2D enabled 5G network supporting Public Safety Services
August 2017
August 2017
Kareem M.I.A. Fouda: Payload based signature generation for DDoS attacks
August 2017
August 2017
Olivier I. van der Toorn: Combating snowshoe spam with fire
August 2017
August 2017
R. Tjeerdsma: Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge
August 2017
August 2017
Ali Davanian: Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance
August 2017
August 2017
Jelmer Verkleij: Behavioural analysis of program intent using data origins, influence and context
July 2017
July 2017
Alejandro Ozaita Araico: Detection of the crowdedness of a place sensing the devices in the area
June 2017
June 2017
Jon Larizgoitia Burgaña: Design and evaluation of a link-state routing protocol for Internet-Wide Geocasting
June 2017
June 2017
Nora Sarrionandia Uriarte: Efficiency of broadcasting in vehicular networks by means of 5G device-to-device communications
June 2017
June 2017
Tristan Brugman: A methodology for deriving aggregate social tie strengths from mobility traces
March 2017
March 2017
Stijn van Winsen: Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles
February 2017
February 2017
2016
Martijn Hoogesteger: Securing mobile VoIP privacy with tunnels
October 2016
October 2016
M.A. Wicaksana: IPv4 vs IPv6 Anycast Catchment: a Root DNS Study
September 2016
September 2016
W.J.B. Beukema: Enhancing Network Intrusion Detection through Host Clustering
July 2016
July 2016
Y. Lin: Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications
July 2016
July 2016
Yu Qiao: Using tall vehicles as next relay hops in VANET multi-hop communication protocols
June 2016
June 2016
S. Hettinga: Performance analysis for embedded software design
April 2016
April 2016
Daniel Moscoviter: Improving spatial indexing and searching for location-based DNS queries
February 2016
February 2016
2015
Ambesagir S. Hagos: Geocasting solution for bluewave services in the context of vehicular communications
December 2015
December 2015
J. de Vries: The Generation of Booter (black)lists
October 2015
October 2015
Kaspar Hageman: The Performance of ECC Algorithms in DNSSEC: A Model-based Approach
October 2015
October 2015
Nils Miro Rodday: Exploring Security Vulnerabilities of Unmanned Aerial Vehicles
July 2015
July 2015
Justyna Joanna Chromik: Booters (black)list
March 2015
March 2015
B.J. Meijerink: Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks
February 2015
February 2015
E.W. Middelesch: Anonymous and hidden communication channels : a perspective on future developments
February 2015
February 2015
M.E. Fonville: The virtual machine delivery network
February 2015
February 2015
2014
W.B. de Vries: How asymmetric is the Internet? A Study to support DDoS Mitigation approaches
November 2014
November 2014
D.P.M.H. van der Steeg: Flow-based DDoS Attack Detection on Cisco IOS
August 2014
August 2014
M. Jonker: Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation
August 2014
August 2014
Mark Wierbosch: It is raining packets
July 2014
July 2014
M Bolhuis: Using an NFC-equipped mobile phone as a token in physical access control
July 2014
July 2014
Gertjan Kamphuis: Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs
June 2014
June 2014
Rudolf Biesbroek: Last-mile lightpath services : on packet-switched shared infrastructure
May 2014
May 2014
J.M. van Lenthe: Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy
April 2014
April 2014
Luuk Hendriks: SSH Compromise Detection using NetFlow and IPFIX
March 2014
March 2014
W.J. Kooij: Playout delay of TV broadcasting
March 2014
March 2014
M.Y. Aertsen: Verifying functional requirements in multi-layer networks: a case for formal description of computer networks
March 2014
March 2014
Giang T. Pham: Integration of IEC 61850 MMS and LTE to support smart metering communications
January 2014
January 2014
A.D. Nguyen: Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid
January 2014
January 2014
2013
Triadimas Arief Satria: Seamless service continuity in cloud based lte systems
November 2013
November 2013
Marco Pasveer: Importance sampling for probabilistic timed automata
March 2013
March 2013
2012
I. Noppen: Assessing the benefits of spectrum sharing in wireless access networks
December 2012
December 2012
E.H.T.B. Brands: Flow-based monitoring of GTP traffic in cellular networks
August 2012
August 2012
J.W.C. Beusink: Secure access contol to personal sensor information in federations of personal networks
August 2012
August 2012
Jurgen Gijs van den Broek: Real-world analyses of internet protocols
August 2012
August 2012
Laurens Hobert: A study on platoon formations and reliable communication in vehicle platoons
August 2012
August 2012
Christiaan Ottow: Hacking the next web: penetration testing over IPv6
August 2012
August 2012
Hanno Spijker: Improving information dissemination in sparse vehicular networks by adding satellite communication
May 2012
May 2012
2011
Dennis Sluijsmans: Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application
August 2011
August 2011
Pieter van Wijngaarden: Frame capture in IEEE 802.11P vehicular networks: a simulation-based approach
July 2011
July 2011
José Manuel Camacho Camacho: Assembler a bgp-compatible multipath inter-domain routing protocol
June 2011
June 2011
2009
Rafael Ramos Regis Barbosa: On Access Network Identification and Characterization
October 2009
October 2009
Jorrit Schippers: A massively scalable architecture for instant messaging & presence
September 2009
September 2009
G. Vliek: Detecting spam machines, a netflow-data based approach
March 2009
March 2009
E.M. van Eenennaam: Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication
February 2009
February 2009
K. Idserda: Simultaneous binding proxy mobile IPv6
February 2009
February 2009
W. Klein Wolterink: A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone
February 2009
February 2009
S. Roolvink: Detecting attacks involving DNS servers : a netflow data based approach
February 2009
February 2009
2008
H. Boros: Context Discovery Adapter (CDA) Protocol
October 2008
October 2008
Michiel Soer: Analysis and comparison of switch-based frequency converters
September 2008
September 2008
Martin Prins: Fast retransmission for multicast IPTV
September 2008
September 2008
Markus Jevring: Automatic management of bluetooth networks for indoor localization
September 2008
September 2008
Timothy Sealy: Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM)
August 2008
August 2008
M.T. Witteman: Efficient proximity detection among mobile clients using the GSM network
April 2008
April 2008
2007
Wendy Ooms: Providing AAA with the Diameter protocol for multi-domain interacting services
September 2007
September 2007
Ruud Klaver: Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services
September 2007
September 2007
Bertrand Baesjou: Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS
August 2007
August 2007
Desislava C. Dimitrova: Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling)
August 2007
August 2007
S.F.G. Verdonkschot: Design and implementation of a trusted RFID reader
April 2007
April 2007