Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2010 | 2007 | 2006 | 2003
2024
Analysis of DNS Dependencies and their Security Implications in Australia: A Comparative Study of General and Indigenous Populations (2024)[Working paper › Preprint]. ArXiv.org. Nazemi, N., Tavallaie, O., Mandalari, A. M., Haddadi, H., Holz, R. & Zomaya, A. Y.https://doi.org/10.48550/arXiv.2408.12958This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data (2024)Computer communication review, 54(2), 2-9. Sommese, R., Van Rijswijk-Deij, R. & Jonker, M.https://doi.org/10.1145/3687234.3687236LESS-ON: Load-aware edge server shutdown for energy saving in cellular networks (2024)Computer networks, 252. Article 110675 (E-pub ahead of print/First online). Gómez, B., Bayhan, S., Coronado, E., Villalon, J. & Garrido, A.https://doi.org/10.1016/j.comnet.2024.110675An Empirical Characterization of Anycast Convergence Time (2024)In ANRW 2024 - Proceedings of the 2024 Applied Networking Research Workshop (pp. 23-30). Association for Computing Machinery. Degen, B., Jonker, M., van Rijswijk-Deij, R. & Sommese, R.https://doi.org/10.1145/3673422.3674890Assessing the security of Internet paths: A case study of Dutch critical infrastructures (2024)In ANRW 2024 - Proceedings of the 2024 Applied Networking Research Workshop (pp. 67-73). Association for Computing Machinery. Khadka, S. K., Bayhan, S., Holz, R. & Hesselman, C. E. W.https://doi.org/10.1145/3673422.3674899Rethinking Safety and Security of the Energy System for a Green Future (2024)[Contribution to conference › Abstract] International Workshop on Safety-Security Interaction, Sensei 2024. van Rijswijk - Deij, R. M., Hoogsteen, G. & Hurink, J. L.Revisiting Edge AI: Opportunities and Challenges (2024)IEEE internet computing, 28(4), 49-59. Meuser, T., Lovén, L., Bhuyan, M., Patil, S. G., Dusdar, S., Aral, A., Bayhan, S., Becker, C., de Lara, E., Ding, A. Y., Edinger, J., Gross, J., Mohan, N., Pimentel, A., Riviere, E., Schulzrinne, H., Simoens, P., Solmaz, G. & Welzl, M.https://doi.org/10.1109/MIC.2024.3383758Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics (2024)In TMA 2024 - Proceedings of the 8th Network Traffic Measurement and Analysis Conference. IEEE. Jaw, E., Müller, M., Hesselman, C. & Nieuwenhuis, L.https://doi.org/10.23919/TMA62044.2024.10559067DarkDNS: Revisiting the Value of Rapid Zone Update (2024)[Working paper › Preprint]. Sommese, R., Akiwate, G., Affinito, A., Muller, M., Jonker, M. & Claffy, K. C.https://doi.org/10.48550/arXiv.2405.12010Exploring the Benefit of Path Plausibility Algorithms in BGP (2024)In Proceedings of the 2024 Network Operations and Management Symposium (NOMS 2024). IFIP (Accepted/In press). Rodday, N. M., Dreo Rodosek, G., Pras, A. & van Rijswijk - Deij, R. M.Are You Sure You Want To Do Coordinated Vulnerability Disclosure? (2024)[Contribution to conference › Paper] 9th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2024 (Accepted/In press). Chen, T.-H.On the resilience of cellular networks: How can national roaming help? (2024)IEEE transactions on network and service management, 21(2), 1702-1714. Weedage, L., Rangel Carneiro Magalhaes, S., Stegehuis, C. & Bayhan, S.https://doi.org/10.1109/TNSM.2024.3352168Online Positioning of a Drone-Mounted Base Station in Emergency Scenarios (2024)IEEE transactions on vehicular technology, 73(4), 5572-5586. Pijnappel, T. R., van den Berg, J. L. (., Borst, S. C. & Litjens, R.https://doi.org/10.1109/TVT.2023.3329960Decoding Online Hate in the United States: A BERT-CNN Analysis of 36 Million Tweets from 2020 to 2022 (2024)In 18th IEEE International Conference on Semantic Computing (ICSC2024) (pp. 329-334). IEEE. Sekhar Pandey, S., Garcia-Robledo, A. & Zangiabady, M.https://doi.org/10.1109/ICSC59802.2024.00059Swamp of Reflectors: Investigating the Ecosystem of Open DNS Resolvers (2024)In Passive and Active Measurement - 25th International Conference, PAM 2024, Proceedings (pp. 3-18) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 14538 LNCS). Springer. Yazdani, R., Jonker, M. & Sperotto, A.https://doi.org/10.1007/978-3-031-56252-5_1Towards Security Transparency of Autonomous Systems on the Internet (2024)In Computer Security. ESORICS 2023 International Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II (pp. 510-513) (Lecture Notes in Computer Science; Vol. 14399). Springer Nature. Khadka, S. K., Holz, R. & Hesselman, C.https://doi.org/10.1007/978-3-031-54129-2_30Deep Dive into NTP Pool's Popularity and Mapping (2024)Proceedings of the ACM on Measurement and Analysis of Computing Systems, 8(1). Article 15. Moura, G. C. M., Davids, M., Schutijser, C., Hesselman, C., Heidemann, J. & Smaragdakis, G.https://doi.org/10.1145/3639041ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart Homes (2024)[Contribution to conference › Paper] (Accepted/In press). Rezaei, T., Bayhan, S., Continella, A. & van Rijswijk - Deij, R. M.Internet Sanctions on Russian Media: Actions and Effects (2024)In Free and Open Communications on the Internet (pp. 1-12). FOCI. Kristoff, J., Müller, M., Filastò, A., Resing, M., Kanich, C. & ten Oever, N.https://www.petsymposium.org/foci/2024/foci-2024-0001.phpODESA: Load-Dependent Edge Server Activation for Lower Energy Footprint (2024)[Contribution to conference › Paper] 25th IEEE Wireless Communications & Networking Conference, WCNC 2024. Gómez, B., Bayhan, S., Coronado, E., Villalon, J. & Garrido, A.Security Risk Indicator for Open Source Software to Measure Software Development Status (2024)In Information Security Applications: 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers (pp. 143-156) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 14402). Springer. Kuzuno, H., Yano, T., Omo, K., van der Ham, J. & Yamauchi, T.https://doi.org/10.1007/978-981-99-8024-6_12
2023
Advancing in Reverse: A Comprehensive Characterization of IN-ADDR. ARPA Deployment (2023)In AINTEC '23: Proceedings of the 18th Asian Internet Engineering Conference (pp. 37-45). Association for Computing Machinery. Arouna, A., Livadariu, I., van Rijswijk-Deij, R. M. & Jonker, M.https://doi.org/10.1145/3630590.3630595Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue (2023)[Working paper › Preprint]. van Hove, K., van der Ham, J. & van Rijswijk - Deij, R. M.https://doi.org/10.48550/arXiv.2312.07284Impact of Power Consumption Models on the Energy Efficiency of Downlink NOMA Systems (2023)IEEE Transactions on Green Communications and Networking, 7(4), 1739-1753. Article 10153599. Magalhães, S. R. C., Bayhan, S. & Heijenk, G.https://doi.org/10.1109/TGCN.2023.3286578rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure (2023)Digital Threats, 4(4), 1-24. Article 58. Hove, K. v., Vos, J. v. d. H.-d. & Rijswijk-Deij, R. v.https://doi.org/10.1145/3617182Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns (2023)Proceedings of the ACM on Networking, 1(3). Article 24. Sattler, P., Zirngibl, J., Jonker, M., Gasser, O., Carle, G. & Holz, R.https://doi.org/10.1145/3629146Trust in Transit: Internet Security for the next generation (2023)[Book/Report › Inaugural speech]. University of Twente. Hesselman, C. E. W.Mobile apps and children's privacy: A traffic analysis of data sharing practices among children's mobile iOS apps (2023)Archives of disease in childhood, 108(11), 943-945. Pimienta, J., Brandt, J., Bethe, T., Holz, R., Continella, A., Jibb, L. & Grundy, Q.https://doi.org/10.1136/archdischild-2023-325960Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns (2023)[Working paper › Preprint]. ArXiv.org. Sattler, P., Zirngibl, J., Jonker, M., Gasser, O., Carle, G. & Holz, R.https://doi.org/10.48550/arXiv.2310.17012Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain Names (2023)In IMC 2023: Proceedings of the 2023 ACM on Internet Measurement Conference (pp. 714-715). Association for Computing Machinery. Sommese, R. & Jonker, M.https://doi.org/10.1145/3618257.3624994MintEDGE: Multi-tier sImulator for eNergy-aware sTrategies in Edge Computing (2023)In ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking (pp. 1-3). Article 120. ACM Press. Gómez, B., Bayhan, S., Coronado, E., Villalon, J. & Garrido, A.https://doi.org/10.1145/3570361.3615727Ten years of Vulnerability Disclosure in the Netherlands (2023)[Non-textual form › Web publication/site]. van der Ham, J. & Terra, F.https://emagazine.one-conference.nl/2023/ten-years-of-vulnerability-disclosure-in-the-netherlands/Anycast in the age of hypergiants: Towards tools and techniques for the other 99% of ASes (2023)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Bertholdo, L.https://doi.org/10.3990/1.9789036557320Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training (2023)In ICCCN 2023 - 2023 32nd International Conference on Computer Communications and Networks (Proceedings - International Conference on Computer Communications and Networks, ICCCN; Vol. 2023-July). IEEE. Tricomi, P. P., Tarahomi, S., Cattai, C., Martini, F. & Conti, M.https://doi.org/10.1109/ICCCN58024.2023.10230134Thermal management under real-time constraints: Utilizing temperature dynamics for optimal performance (2023)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Ozceylan, B.https://doi.org/10.3990/1.9789036557962Optimal Geocast Scheduling under Multicasts and Relaying in mmWave Vehicular Networks (2023)In 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (pp. 241-250). Havinga, T., Bayhan, S. & Heijenk, G.https://doi.org/10.1109/WoWMoM54355.2022.00043Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict (2023)In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 487-494). Article 10190662. IEEE. Haq, M. Y. M., Abhishta, A., Sommese, R., Jonker, M. & Nieuwenhuis, L. J. M.https://doi.org/10.1109/EuroSPW59978.2023.00060Power Allocation for Multi-Cell Non-Orthogonal Multiple Access Networks: Energy Efficiency vs. Throughput vs. Power Consumption (2023)In 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit). IEEE. Rangel Carneiro Magalhaes, S., Bayhan, S. & Heijenk, G.https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188279Lowering the Barriers to Working with Public RIR-Level Data (2023)In ANRW '23: Proceedings of the Applied Networking Research Workshop (pp. 24-26). Association for Computing Machinery. Arouna, A., Livadariu, I. & Jonker, M.https://doi.org/10.1145/3606464.3606473National roaming as a fallback or default? (2023)In IFIP Networking 2023. IEEE. Weedage, L., Rangel Carneiro Magalhaes, S. & Bayhan, S.https://doi.org/10.23919/IFIPNetworking57963.2023.10186409No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information (2023)In 2023 IEEE Symposium on Security and Privacy (SP) (pp. 203-219) (Proceedings - IEEE Symposium on Security and Privacy; Vol. 2023-May). IEEE. de Smale, S., van Dijk, R., Bouwman, X., van der Ham, J. & van Eeten, M.https://doi.org/10.1109/SP46215.2023.00012Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach (2023)In 2023 IEEE 9th International Conference on Network Softwarization (NetSoft). IEEE. Tarahomi, S., Holz, R. & Sperotto, A.https://doi.org/10.1109/NetSoft57336.2023.10175501Perspectives on Negative Research Results in Pervasive Computing (2023)IEEE pervasive computing, 22(3), 63-72. Peltonen, E., Mohan, N., Zdankin, P., Shreedhar, T., Nguyen, T., Bayhan, S., Crowcroft, J., Kangasharju, J. & Nicklas, D.https://doi.org/10.1109/MPRV.2023.3273718Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute (2023)In 2023 7th Network Traffic Measurement and Analysis Conference (TMA) (pp. 1-10). IEEE. Yazdani, R., Nosyk, Y., Holz, R., Korczyński, M., Jonker, M. & Sperotto, A.https://doi.org/10.23919/TMA58422.2023.10198955Everything in Its Right Place: Improving DNS resilience (2023)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Sommese, R.https://doi.org/10.3990/1.9789036556699Impact of Multi-connectivity on Channel Capacity and Outage Probability in Wireless Networks (2023)IEEE transactions on vehicular technology, 72(6), 7973 - 7986. Weedage, L., Stegehuis, C. & Bayhan, S.https://doi.org/10.1109/TVT.2023.3242358Application-level performance of cross-layer scheduling for social VR in 5G (2023)In 2023 IEEE Wireless Communications and Networking Conference, WCNC 2023 - Proceedings (IEEE Wireless Communications and Networking Conference (WCNC); Vol. 2023). IEEE. Du, Z., van den Berg, J. L., Dimitrovski, T. & Litjens, R.https://doi.org/10.1109/WCNC55385.2023.10118957A Second Look at DNS QNAME Minimization (2023)In Passive and Active Measurement : 24th International Conference, PAM 2023 Virtual Event, March 21–23, 2023 Proceedings (pp. 496-521) (Lecture Notes in Computer Science; Vol. 13882). Springer. Magnusson, J., Müller, M., Brunstrom, A. & Pulls, T.https://doi.org/10.1007/978-3-031-28486-1_21Betrouwbaarheid DNS-Infrastructuur Nederlandse Overheid bij Beschikbaarheidsproblemen: Strategisch Adviesrapport (2023)[Book/Report › Report]. Nationaal Cyber Security Centrum. Moura, G., Sommese, R. & Jonker, M.Operational Domain Name Classification: From Automatic Ground Truth Generation to Adaptation to Missing Values (2023)In Passive and Active Measurement - 24th International Conference, PAM 2023, Proceedings (pp. 564-591) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13882 LNCS). Springer. Bayer, J., Benjamin, B. C., Maroofi, S., Wabeke, T., Hesselman, C., Duda, A. & Korczyński, M.https://doi.org/10.1007/978-3-031-28486-1_24Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers (2023)In Passive and Active Measurement: 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023, Proceedings (pp. 46-68). Khan, E., Sperotto, A., Ham, J. v. d. & Rijswijk-Deij, R. v.https://doi.org/10.1007/978-3-031-28486-1_3Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to Practice (2023)In Proceedings EthiCS 2023: The 2nd International Workshop on Ethics in Computer Security, February 27, 2022, San Diego, CA, USA. Internet Society. Reidsma, D., van der Ham, J. & Continella, A.https://doi.org/10.14722/ethics.2023.237352An Anycast Federation for DNS Resolvers (2023)[Contribution to conference › Abstract]. Bertholdo, L. M., Holz, R., van Rijswijk - Deij, R. M., Granville, L. Z. & Hesselman, C. E. W.https://ant.isi.edu/events/dinr2023/program.htmlAnalytical Approach for Optimal Deployment of Drone Base Stations in Cellular Networks (2023)In ICC 2023 - IEEE International Conference on Communications: Sustainable Communications for Renaissance (pp. 6591-6596) (IEEE International Conference on Communications; Vol. 2023-May). IEEE. Pijnappel, T. R., van den Berg, J. L., Borst, S. C. & Litjens, R.https://doi.org/10.1109/ICC45041.2023.10278620Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict (2023)[Contribution to conference › Paper] 8th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2023. Haq, M. Y. M., Abhishta, A., Sommese, R., Jonker, M. & Nieuwenhuis, L. J. M.Dash Sylvereye: A Python Library for Dashboard-Driven Visualization of Large Street Networks (2023)IEEE Access, 11, 121142-121161. Article 10292630. Garcia-Robledo, A. & Zangiabady, M.https://doi.org/10.1109/ACCESS.2023.3327008E-Go Bicycle Intelligent Speed Adaptation System for Catching the Green Light (2023)[Contribution to conference › Paper] 20th EAI International Conference on Mobile and Ubiquitous Systems, MobiQuitous 2023. Ben Fredj, K., Pallamreddy, A. R., Heijenk, G., Havinga, P. J. M. & Huang, Y.Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy (2023)[Contribution to conference › Paper] 8th IEEE European Symposium on Security and Privacy. Liu, E., Akiwate, G., Jonker, M., Mirian, A., Ho, G., Voelker, G. M. & Savage, S.https://doi.org/10.48550/arXiv.2302.07287Impact of Power Consumption Models on the Energy Efficiency of Downlink NOMA Systems (2023)[Working paper › Preprint]. ArXiv.org. Magalhaes, S. R. C., Bayhan, S. & Heijenk, G.On the resilience of cellular networks: how can national roaming help? (2023)[Working paper › Working paper]. ArXiv.org. Weedage, L., Rangel, S., Stegehuis, C. & Bayhan, S.https://doi.org/10.48550/arXiv.2301.03250
2022
On the Asymmetry of Internet eXchange Points - Why Should IXPs and CDNs Care? (2022)In 18th International Conference on Network and Service Management. Bertholdo, L., Ferreira, S. L. A., Ceron, J. M., Holz, R., Granville, L. Z. & van Rijswijk - Deij, R. M.The Effect of the Russian-Ukrainian Conflict from the Perspective of Internet eXchanges (2022)In 18th International Conference on Network and Service Management, CNSM 2022. Trusin, C., Santanna, J. & Bertholdo, L.Assessing e-Government DNS Resilience (2022)In 18th International Conference on Network and Service Management. Sommese, R., Jonker, M., van der Ham, J. & Moura, G.https://doi.org/10.23919/CNSM55787.2022.9965155Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks (2022)In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (pp. 263-275). Association for Computing Machinery. Yazdani, R., Hilton, A., van der Ham, J., van Rijswijk - Deij, R. M., Deccio, C., Sperotto, A. & Jonker, M.https://doi.org/10.1145/3545948.3545959Investigating the impact of DDoS attacks on DNS infrastructure (2022)In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 51-64). Association for Computing Machinery. Sommese, R., Claffy, K., van Rijswijk - Deij, R. M., Chattopadhyay, A., Dainotti, A., Sperotto, A. & Jonker, M.https://doi.org/10.1145/3517745.3561458On Unifying Diverse DNS Data Sources (2022)In IMC 2022: Proceedings of the 2022 ACM Internet Measurement Conference, Nice, France, October 25-27, 2022 (pp. 752-753). Association for Computing Machinery. Arouna, A., Jonker, M. & Livadariu, I.https://doi.org/10.1145/3517745.3563022Poster: Observable KINDNS: Validating DNS Hygiene (2022)In IMC '22: Proceedings of the 2022 ACM Internet Measurement Conference, Nice, France, October 25-27, 2022 (pp. 740-741) (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC). Association for Computing Machinery. Sommese, R., Jonker, M. & Claffy, K. C.https://doi.org/10.1145/3517745.3563016Retroactive identification of targeted DNS infrastructure hijacking (2022)In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 14-32). Association for Computing Machinery. Akiwate, G., Sommese, R., Jonker, M., Durumeric, Z., Claffy, K., Voelker, G. M. & Savage, S.https://doi.org/10.1145/3517745.3561425Saving Brian's privacy: The perils of privacy exposure through reverse DNS (2022)In IMC '22: Proceedings of the 22nd ACM Internet Measurement Conference (pp. 1-13). Association for Computing Machinery. van der Toorn, O., van Rijswijk - Deij, R., Sommese, R., Sperotto, A. & Jonker, M.https://doi.org/10.1145/3517745.3561424Where .ru?: assessing the impact of conflict on russian domain infrastructure (2022)In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 159-165). Association for Computing Machinery. Jonker, M., Akiwate, G., Affinito, A., Claffy, K., Botta, A., Voelker, G. M., van Rijswijk - Deij, R. M. & Savage, S.https://doi.org/10.1145/3517745.3561423Proactive threat detection: A DNS based approach (2022)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. van der Toorn, O. I.https://doi.org/10.3990/1.9789036554428Improving Proximity Classification for Contact Tracing using a Multi-channel Approach (2022)In Proceedings of the 47th Conference on Local Computer Networks (LCN) (pp. 64-72). IEEE. Lanfer, E., Hänel, T., van Rijswijk - Deij, R. M. & Aschenbruck, N.https://doi.org/10.48550/arXiv.2201.10401Guest Editors Introduction: Special Section on Recent Advances in Network Security Management (2022)IEEE transactions on network and service management, 19(3), 2251-2254. Badonnel, R., Fung, C., Scott-Hayward, S., Li, Q., Valenza, F. & Hesselman, C.https://doi.org/10.1109/TNSM.2022.3202426Introduction to the Special Issue on the 2020 FIRST Conference (2022)Digital Threats, 3(3), 1-1. Article 18. Desiderá, L. & van der Ham, J.https://doi.org/10.1145/3549069Improving Operational Efficiency In EV Ridepooling Fleets By Predictive Exploitation of Idle Times (2022)[Working paper › Preprint]. ArXiv.org. Provoost, J. C., Kamilaris, A., Gidófalvi, G., Heijenk, G. J. & Wismans, L. J. J.https://doi.org/10.48550/arXiv.2208.14852Modelling the packet delivery of V2V messages based on the macroscopic traffic parameters (2022)In 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring). IEEE. Chandramohan, A. & Heijenk, G.https://doi.org/10.1109/VTC2022-Spring54318.2022.9860488Relying Party Resiliency Platform (2022)[Dataset Types › Dataset]. Zenodo. van Hove, K.https://doi.org/10.5281/zenodo.7572512Addressing the challenges of modern DNS: a comprehensive tutorial (2022)Computer science review, 45. Article 100469. van der Toorn, O., Müller, M., Dickinson, S., Hesselman, C., Sperotto, A. & van Rijswijk - Deij, R.https://doi.org/10.1016/j.cosrev.2022.100469An Empirical View on Consolidation of the Web (2022)ACM Transactions on Internet Technology, 22(3). Article 70. Doan, T. V., van Rijswijk - Deij, R., Hohlfeld, O. & Bajpai, V.https://doi.org/10.1145/3503158Minimizing the Maximum Processor Temperature by Temperature-Aware Scheduling of Real-Time Tasks (2022)IEEE transactions on very large scale integration (VLSI) systems, 30(8), 1084-1097. Ozceylan, B., Haverkort, B. R. H. M., de Graaf, M. & Gerards, M. E. T.https://doi.org/10.1109/TVLSI.2022.3160601Stochastic String Stability of Vehicle Platoons via Cooperative Adaptive Cruise Control With Lossy Communication (2022)IEEE transactions on intelligent transportation systems, 23(8), 10912-10922. Acciani, F., Frasca, P., Heijenk, G. & Stoorvogel, A. A.https://doi.org/10.1109/TITS.2021.3097199Beam-align: distributed user association for mmWave networks with multi-connectivity (2022)[Working paper › Preprint]. ArXiv.org. Weedage, L., Stegehuis, C. & Bayhan, S.https://doi.org/10.48550/arXiv.2206.13166Domain Name Lifetimes: Baseline and Threats (2022)In Proceedings of the 6th edition of the Network Traffic Measurement and Analysis Conference (TMA Conference 2022). International Federation for Information Processing (IFIP). Affinito, A., Sommese, R., Akiwate, G., Savage, S., Claffy, K., Voelker, G. M., Botta, A. & Jonker, M.https://tma.ifip.org/2022/wp-content/uploads/sites/11/2022/06/tma2022-paper32.pdfDomain Parking: Largely Present, Rarely Considered! (2022)In Proceedings of the 6th edition of the Network Traffic Measurement and Analysis Conference (TMA Conference 2022). International Federation for Information Processing (IFIP). Zirngibl, J., Deutch, S., Sattler, P., Aulbach, J., Carle, G. & Jonker, M.https://tma.ifip.org/2022/wp-content/uploads/sites/11/2022/06/tma2022-paper26.pdfNo Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers (2022)In Proceedings of the 2022 Workshop on Traffic Measurements for Cybersecurity: 2022 IEEE European Symposium on Security and Privacy Workshops (pp. 322-331). IEEE. Haq, M. Y. M., Jonker, M., van Rijswijk - Deij, R. M., Claffy, k., Nieuwenhuis, L. J. M. & Abhishta, A.https://doi.org/10.1109/EuroSPW55150.2022.00039Control over unreliable networks: Consensus and platooning (2022)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Acciani, F.https://doi.org/10.3990/1.9789036553803Towards a Federated Anycast Network: It's Always DNS (2022)[Contribution to conference › Paper] Trans European Research and Education Network Conference, TNC 2022. Bertholdo, L. & van Rijswijk - Deij, R. M.DMEF: Dynamic Malware Evaluation Framework (2022)In Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022: Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022 (Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022: Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022). IEEE. Dietz, C., Antzek, M., Dreo, G., Sperotto, A. & Pras, A.https://doi.org/10.1109/NOMS54207.2022.9789908Hosting Industry Centralization and Consolidation (2022)In Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022: Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022 (pp. 1-9). Zembruzki, L., Sommese, R., Granville, L. Z., Selle Jabocs, A., Jonker, M. & Moura, G.https://doi.org/10.1109/NOMS54207.2022.9789881Dynamic detection of mobile malware using smartphone data and machine learning (2022)Digital Threats, 3(2). Article 9. Panman de Wit, S., Bucur, D. & van der Ham, J.https://doi.org/10.1145/3484246Artifacts - Anycast Agility: Network Playbooks to Fight DDoS (2022)[Other contribution › Other contribution]. Zenodo. Rizvi, A. S. M., Bertholdo, L. M., Ceron, J. & Heidemann, J.https://doi.org/10.5281/zenodo.6505557LogoMotive: Detecting Logos on Websites to Identify Online Scams - A TLD Case Study (2022)In Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings (pp. 3-29) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13210 LNCS). Springer. van den Hout, T., Wabeke, T., Moura, G. C. M. & Hesselman, C.https://doi.org/10.1007/978-3-030-98785-5_1A matter of degree: characterizing the amplification power of open DNS resolvers (2022)In Passive and Active Network Measurement: 23rd International Conference, PAM 2022, Virtual Event, March 28–30, 2022, Proceedings (pp. 293-318). Springer. Yazdani, R., Rijswijk-Deij, R. v., Jonker, M. & Sperotto, A.https://doi.org/10.1007/978-3-030-98785-5_13Dynamic Edge Offloading for Real-time Video Processing Pipelines (2022)In IEEE 23rd International Workshop on Multimedia Signal Processing, MMSP 2021. IEEE. Kleinrouweler, J. W., DImitrovski, T., Braam, S., Hindriks, R., Van Den Berg, H., D'Acunto, L. & Niamut, O.https://doi.org/10.1109/MMSP53017.2021.9733589Rpkiller: Threat Analysis from an RPKI Relying Party Perspective (2022)[Working paper › Preprint]. ArXiv.org. Hove, K. v., Ham, J. v. d. & Rijswijk-Deij, R. v.https://doi.org/10.48550/arXiv.2203.00993Anycast Agility: Network Playbooks to Fight DDoS (2022)In Proceedings of the 31st USENIX Security Symposium, Security 2022 (pp. 4201-4218). USENIX Association. Rizvi, A. S. M., Bertholdo, L., Ceron, J. & Heidemann, J.Internet of Things - Technology and Applications: 4th IFIP International cross-Domain Conference, IFIP IoT 2021 (2022)[Book/Report › Book editing] Internet of Things - Technology and Applications, IFIP IoT 2021. Springer Nature. Camarinha-Matos, L. M., Heijenk, G., Katkoori, S. & Strous, L.https://doi.org/10.1007/978-3-030-96466-5Old but Gold: Prospecting TCP to Engineer and Live Monitor DNS Anycast (2022)In Passive and Active Measurement - 23rd International Conference, PAM 2022, Proceedings (pp. 264-292) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13210 LNCS). Springer. Moura, G. C. M., Heidemann, J., Hardaker, W., Charnsethikul, P., Bulten, J., Ceron, J. M. & Hesselman, C.https://doi.org/10.1007/978-3-030-98785-5_12Under the Hood of DANE Mismanagement in SMTP (2022)In Proceedings of the 31st USENIX Security Symposium, Security 2022 (pp. 1-16). USENIX Association. Lee, H., Ashiq, M. I., Müller, M., van Rijswijk-Deij, R., Kwon, T. (. & Chung, T.
2021
Decentralizing Computation with Edge Computing: Potential and Challenges (2021)In IWCI'21: Proceedings of the Interdisciplinary Workshop on (de) Centralization in the Internet (pp. 34-36). ACM Publishing. Zavodovski , A., Corneo, L., Johnsson, A., Mohan, N., Bayhan, S., Zhou, P., Wong, W. & Kangasharju, J.https://doi.org/10.1145/3488663.3493689Importance sampling for Markovian tandem queues using subsolutions: exploring the possibilities (2021)Simulation : transactions of the Society for Modeling and Simulation International, 97(12), 849-866. Buijsrogge, A., de Boer, P. T. & Scheinhardt, W. R. W.https://doi.org/10.1177/00375497211041351Data-Driven Optimization of Drone-Assisted Cellular Networks (2021)In 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2021 (pp. 233-240) (International Conference on Wireless and Mobile Computing, Networking and Communications; Vol. 2021-October). IEEE. Pijnappel, T. R., Van Den Berg, J. L., Borst, S. C. & Litjens, R.https://doi.org/10.1109/WiMob52687.2021.9606389Ethical Approaches to Cybersecurity (2021)In The Oxford Handbook of Digital Ethics (pp. 611-630). Oxford University Press. Macnish, K. N. J. & van der Ham, J.https://doi.org/10.1093/oxfordhb/9780198857815.013.28The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core (2021)In IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference (pp. 419-434). ACM Publishing. Nawrocki, M., Jonker, M., Schmidt, T. C. & Waehlisch, M.https://doi.org/10.1145/3487552.3487835Who’s Got Your Mail?: Characterizing Mail Service Provider Usage (2021)In IMC 2021 - Proceedings of the 2021 ACM Internet Measurement Conference (pp. 122-136). ACM Publishing. Liu, E., Akiwate, G., Jonker, M., Mirian, A., Savage, S. & Voelker, G. M.https://doi.org/10.1145/3487552.3487820Future Network Services: Communicatienetwerken voor en door Nederland (2021)[Book/Report › Report]. Smeitink, E., Herrebout, F., van Bussel, H., Nooren, P., Heijnen, P., Wijngaard, P., Wilkens, J., Kuipers, F., Heemstra de Groot, S., Smolders, B., Heijenk, G., van den Berg, H. L. & Zaalberg, J.https://publications.tno.nl/publication/34638839/2xVZxj/TNO-2021-communicatienetwerken.pdfANYway: Measuring the Amplification DDoS Potential of Domains (2021)In 2021 17th International Conference on Network and Service Management (CNSM). Article 9615596 (International Conference on Network and Service Management (CNSM); Vol. 2021). IEEE. van der Toorn, O., Krupp, J., Jonker, M., van Rijswijk - Deij, R. M., Rossow, C. & Sperotto, A.https://doi.org/10.23919/CNSM52442.2021.9615596Making DNSSEC Future Proof (2021)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Müller, M. C.https://doi.org/10.3990/1.9789036551816Characterization of Anycast Adoption in the DNS Authoritative Infrastructure (2021)In TMA Conference 2021: Proceedings of the 5th Network Traffic Measurement and Analysis Conference, Virtual, September 14-15, 2021. IFIP. Sommese, R., Akiwate, G., Jonker, M., Moura, G., Davids, M., van Rijswijk - Deij, R. M., Voelker, G. M., Savage, S., Claffy, K. & Sperotto, A.https://dl.ifip.org/db/conf/tma/tma2021/tma2021-paper1.pdfForecasting the Impact of IXP Outages Using Anycast (2021)In Proceedings of the 5th Network Traffic Measurement and Analysis Conference (TMA). IFIP. Bertholdo, L. M., Ceron, J. M., Granville, L. Z. & van Rijswijk - Deij, R. M.https://dl.ifip.org/db/conf/tma/tma2021/tma2021-paper10.pdfInterference Mitigation by Adaptive Analog Spatial Filtering for MIMO Receivers (2021)IEEE transactions on microwave theory and techniques, 69(9), 4169-4179. Article 9443039. Abbasi Alaei, M., Golabighezelahmad, S., de Boer, P.-T., van Vliet, F. E., Klumperink, E. A. M. & Kokkeler, A. B. J.https://doi.org/10.1109/TMTT.2021.3081110Modelling activation of congestion control for estimating channel load in vehicular networks (2021)In 2021 Wireless Days (WD). Article 9508285. IEEE. Chandramohan, A. & Heijenk, G.https://doi.org/10.1109/WD52248.2021.9508285Increasing the Transparency, Accountability and Controllability of multi-domain networks with the UPIN framework (2021)In TAURIN'21: Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (pp. 8-13). Bazo, R., Hesselman, C. E. W., Boldrini, L. & Grosso, P.https://doi.org/10.1145/3472951.3473506Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021) Final Report (2021)Computer communication review, 51(3), 33-40. Claffy, K., Clark, D., Heidemann, J., Bustamente, F., Jonker, M., Schulman, A. & Zegura, E.https://doi.org/10.1145/3477482.3477489Simplified Harmonic Rejection Mixer Analysis and Design Based on a Filtered Periodic Impulse Model (2021)IEEE transactions on circuits and systems II: express briefs, 68(7), 2292-2296. Article 9324800. de Boer, P.-T., Oude Alink, M. S. & Klumperink, E. A. M.https://doi.org/10.1109/TCSII.2021.3051769TANGLED: A Cooperative Anycast Testbed (2021)In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM) (pp. 766-771). Article 9463960. IEEE. Bertholdo, L. M., Ceron, J. M., de Vries, W. B., Schmitt, R. d. O., Granville, L. Z., van Rijswijk - Deij, R. M. & Pras, A.https://ieeexplore.ieee.org/abstract/document/9463960A Sensitivity Analysis on the Potential of 5G Channel Quality Prediction (2021)In 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). Article 9448944 (IEEE Vehicular Technology Conference, VTC; Vol. 2021). IEEE. Anbalagan, S. N., Litjens, R., Das, K., Chiumento, A., Havinga, P. J. M. & van den Berg, H. L.https://doi.org/10.1109/VTC2021-Spring51267.2021.9448944Drone-Assisted Cellular Networks: Optimal Positioning and Load Management (2021)In 2021 IEEE 93rd Vehicular Technology Conference, VTC 2021-Spring - Proceedings. Article 9448643 (IEEE Vehicular Technology Conference; Vol. 2021-April). IEEE. Pijnappel, T. R., Van Den Berg, J. L., Borst, S. C. & Litjens, R.https://doi.org/10.1109/VTC2021-Spring51267.2021.9448643On the potential of multicast in millimeter wave vehicular communications (2021)In 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021. Article 9448670. IEEE. Mendler, G. & Heijenk, G.https://doi.org/10.1109/VTC2021-Spring51267.2021.9448670EdgeDASH: Exploiting Network-Assisted Adaptive Video Streaming for Edge Caching (2021)IEEE transactions on network and service management, 18(2), 1732-1745. Article 9253667. Bayhan, S., Maghsudi, S. & Zubow, A.https://doi.org/10.1109/TNSM.2020.3037147JOI: Joint placement of IoT analytics operators and pub/sub message brokers in fog-centric IoT platforms (2021)Future generation computer systems, 119, 7-19. Happ, D., Bayhan, S. & Handziski, V.https://doi.org/10.1016/j.future.2021.01.026Toward a Better Understanding of “Cybersecurity” (2021)Digital Threats, 2(3). Article 18. van der Ham, J.https://doi.org/10.1145/3442445Dash Sylvereye: A WebGL-powered Library for Dashboard-driven Visualization of Large Street Networks (2021)[Working paper › Preprint]. ArXiv.org. Garcia-Robledo, A. & Zangiabady, M.https://doi.org/10.48550/arXiv.2105.14362A National Programmable Infrastructure to Experiment with Next-Generation Networks (2021)In Proceedings of the IM 2021 - 2021 IFIP/IEEE International Symposium on Integrated Network Management (pp. 778-782). Article 9464003. IEEE. Gross, P., Hesselman, C., Hendriks, L., Hill, J., Konstantaras, S., Pol, R. V. D., Reijs, V., Ruiter, J. D. & Schutijser, C.https://ieeexplore.ieee.org/document/9464003Improving Temperature Prediction Accuracy Using Kalman and Particle Filtering Methods (2021)In 2020 26th International Workshop on Thermal Investigations of ICs and Systems (THERMINIC). Article 9420535 (International Workshop on Thermal Investigations of ICs and Systems, THERMINIC; Vol. 2020). IEEE. Ozceylan, B., Haverkort, B. R., de Graaf, M. & Gerards, M. E. T.https://doi.org/10.1109/THERMINIC49743.2020.9420535Vector Modulator-Based Analog Beamforming Using the Least Euclidean Distance Criterion (2021)IEEE Access, 9, 65411-65417. Article 9410225. Alaei, M. A., Kokkeler, A. B. J. & de Boer, P.-T.https://doi.org/10.1109/ACCESS.2021.3074781Impact of Multi-connectivity on Channel Capacity and Outage Probability in Wireless Networks (2021)[Working paper › Working paper]. ArXiv.org. Weedage, L., Stegehuis, C. & Bayhan, S.https://arxiv.org/abs/2104.09823Surrounded by the Clouds: A Comprehensive Cloud Reachability Study (2021)In WWW '21: Proceedings of the Web Conference 2021 (pp. 295-304). ACM Publishing. Corneo, L., Eder, M., Mohan, N., Zavodovski , A., Bayhan, S., Wong, W., Kangasharju, J., Gunningberg, P. & Ott, J.https://doi.org/10.1145/3442381.3449854Fragmentation, Truncation, and Timeouts: Are Large DNS Messages Falling to Bits? (2021)In Passive and Active Measurement - 22nd International Conference, PAM 2021, Proceedings (pp. 460-477) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12671 LNCS). Springer. Moura, G. C. M., Müller, M., Davids, M., Wullink, M. & Hesselman, C.https://doi.org/10.1007/978-3-030-72582-2_27AI-Empowered Software-Defined WLANs (2021)IEEE communications magazine, 59(3), 54-60. Article 9422336. Coronado, E., Bayhan, S., Thomas, A. & Riggio, R.https://doi.org/10.1109/MCOM.001.2000895A message from the program chairs of TAURIN 2021 (2021)In TAURIN 2021 - Proceedings of the 2021 ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet. Holz, R. & Abhishta, A.https://dl.acm.org/doi/proceedings/10.1145/3472951A self-organizing base station sleeping and user association strategy for dense cellular networks (2021)Wireless networks, 27(1), 307-322. Post, B., Borst, S. & van den Berg, H.https://doi.org/10.1007/s11276-020-02383-3Path-ZVA Simulation Method for Time-Bounded Rare Events in a Semi-Markov Chain (2021)[Contribution to conference › Abstract] 13th International Workshop on Rare-Event Simulation, RESIM 2021 . Reijsbergen, D., de Boer, P.-T. & Scheinhardt, W. R. W.Performance Modelling and Assessment for Social VR Conference Applications in 5G Radio Networks (2021)In 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2021 (pp. 225-232) (International Conference on Wireless and Mobile Computing, Networking and Communications; Vol. 2021-October). IEEE. Morais, J., Braam, S., Litjens, R., Kizhakkekundil, S. & Van Den Berg, H.https://doi.org/10.1109/WiMob52687.2021.9606263Remote validation of router attributes in Path-Aware Inter-domain networks (2021)[Working paper › Working paper]. Bazo, R. & Hesselman, C. E. W.Splitting for a non-Markovian tandem queue (2021)[Contribution to conference › Abstract] 13th International Workshop on Rare-Event Simulation, RESIM 2021 . Buijsrogge, A., de Boer, P.-T. & Scheinhardt, W. R. W.https://resim2021.sciencesconf.org/file/725522UPIN - A shift in network control from operator to end user (2021)[Contribution to conference › Poster] ICT Open 2021. Boldrini, L., Bazo, R., Hesselman, C. E. W. & Grosso, P.
2020
BGP Anycast Tuner: Intuitive Route Management for Anycast Services (2020)In 2020 16th International Conference on Network and Service Management (CNSM). Bertholdo, L. M., Ceron, J. M., Granville, L. Z., Moura, G. C. M., Hesselman, C. & van Rijswijk-Deij, R.https://doi.org/10.23919/CNSM50824.2020.9269102Key Advances in Pervasive Edge Computing for Industrial Internet of Things in 5G and Beyond (2020)IEEE Access, 8, 206734-206754. Article 9257390. Narayanan, A., Sousa de Sena, A., Gutierrez-Rojas, D., Carrillo Melgarejo, D., Hussain, H. M., Ullah, M., Bayhan, S. & Nardelli, P. H. J.https://doi.org/10.1109/ACCESS.2020.3037717Evaluating RPKI ROV Identification Methodologies in Automatically Generated Mininet Topologies (2020)In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '20) (pp. 530-531). ACM SIGCOMM. Rodday, N. M., van Baaren, R., Hendriks, L., van Rijswijk - Deij, R. M., Pras, A. & Dreo Rodosek, G.https://doi.org/10.1145/3386367.3431669Machine learning data center workloads using generative adversarial networks (2020)SIGMETRICS performance evaluation review, 48(2), 21-23. Haverkort, B. R., Finkbeiner, F. & de Boer, P.-T.https://doi.org/10.1145/3439602.3439611Modelling V2V message generation rates in a highway environment (2020)In 2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Article 9253392. IEEE. Chandramohan, A. & Heijenk, G.https://doi.org/10.1109/WiMob50308.2020.9253392Triplet Mining-based Phishing Webpage Detection (2020)In Local Computer Networks. IEEE. Abeywardena, K., Zhao, J., Brent, L., Seneviratne, S. & Holz, R.-G.Characterising attacks targeting low-cost routers: a MikroTik case study (Extended) (2020)[Working paper › Working paper]. ArXiv.org. Ceron, J. M., Scholten, C., Pras, A., Lastdrager, E. & Santanna, J.Pruning Edge Research with Latency Shears (2020)In HotNets'20: The 19th ACM Workshop on Hot Topics in Networks (pp. 182-189). ACM Publishing. Mohan, N., Corneo, L., Zavodovski , A., Bayhan, S., Wong, W. & Kangasharju, J.https://doi.org/10.1145/3422604.3425943Ethics in cybersecurity research and practice (2020)Technology in society, 63. Article 101382. Macnish, K. & van der Ham, J.https://doi.org/10.1016/j.techsoc.2020.101382Clouding up the Internet: How centralized is DNS traffic becoming? (2020)In IMC 2020 - Proceedings of the 2020 ACM Internet Measurement Conference (pp. 42-49). Association for Computing Machinery. Moura, G. C. M., Castro, S., Hardaker, W., Wullink, M. & Hesselman, C.https://doi.org/10.1145/3419394.3423625The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle (2020)In IMC '20: Proceedings of the 20th ACM Internet Measurement Conference (pp. 295-308). ACM Publishing. Müller, M., Toorop, W., Chung, T., Jansen, J. & van Rijswijk-Deij, R.https://doi.org/10.1145/3419394.3423638Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations (2020)[Contribution to conference › Paper] ACM Internet Measurement Conference, IMC 2020. Akiwate, G., Jonker, M., Sommese, R., Foster, I., Voelker, G. M., Savage, S. & Claffy, K.https://doi.org/10.1145/3419394.3423623Retrofitting Post-Quantum Cryptography in Internet Protocols: A Case Study of DNSSEC (2020)Computer communication review, 50(4), 49-57. Mueller, M., de Jong, J., van Heesch, M., Overeinder, B. & van Rijswijk - Deij, R.https://doi.org/10.1145/3431832.3431838Punched Cards over the Air: Cross-Technology Communication Between LTE-U/LAA and WiFi (2020)In 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (pp. 297-306). Article 9217704. IEEE. Gawlowicz, P., Zubow, A., Bayhan, S. & Wolisz, A.https://doi.org/10.1109/WoWMoM49955.2020.00058A Responsible Internet to Increase Trust in the Digital World (2020)Journal of network and systems management, 28(4), 882-922. Hesselman, C., Grosso, P., Holz, R., Kuipers, F., Xue, J. H., Jonker, M., de Ruiter, J., Sperotto, A., van Rijswijk-Deij, R., Moura, G. C. M., Pras, A. & de Laat, C.https://doi.org/10.1007/s10922-020-09564-7LoRadar: LoRa Sensor Network Monitoring through Passive Packet Sniffing (2020)Computer communication review, 50(4), 10-24. Choi, K. N., Kolamunna, H., Uyanwatta, A., Thilakarathna, K., Seneviratne, S., Holz, R., Hassan, M. & Zomaya, A.https://doi.org/10.1145/3431832.3431835MAnycast2: Using Anycast to Measure Anycast (2020)In IMC '20: Proceedings of the 20th ACM Internet Measurement Conference (pp. 456-463). ACM Publishing. Sommese, R., Bertholdo, L. M., Akiwate, G., Jonker, M., van Rijswijk - Deij, R. M., Dainotti, A., Claffy, K. & Sperotto, A.https://doi.org/10.1145/3419394.3423646On the origin of scanning: the impact of location on Internet-wide scans (2020)In IMC '20: Proceedings of the ACM Internet Measurement Conference (pp. 662-679). ACM SIGCOMM. Wan, G., Izhikevich, L., Adrian, D., Yoshioka, K., Holz, R., Rossow, C. & Durumeric, Z.https://doi.org/10.1145/3419394.3424214DeepTxFinder: Multiple Transmitter Localization by Deep Learning in Crowdsourced Spectrum Sensing (2020)In 2020 29th International Conference on Computer Communications and Networks (ICCCN). Article 9209727. Zubow, A., Bayhan, S., Gawlowicz, P. & Dressler, F.https://doi.org/10.1109/ICCCN49398.2020.9209727Sensing the Noise: Uncovering Communities in Darknet Traffic (2020)In 2020 Mediterranean Communication and Computer Networking Conference (MedComNet). Article 9191555. IEEE. Soro, F., Allegretta, M., Drago, I., Mellia, M. & Bertholdo, L. M.https://doi.org/10.1109/MedComNet49392.2020.9191555A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements (2020)In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS & PW) (pp. 559-564). Article 9229740. IEEE. Yazdani, R., van der Toorn, O. & Sperotto, A.https://doi.org/10.1109/EuroSPW51379.2020.00082Into the DDoS maelstrom: A longitudinal study of a scrubbing service (2020)In 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 (pp. 550-558). Article 9229733. IEEE. Moura, G. C. M., Hesselman, C., Schaapman, G., Boerman, N. & De Weerdt, O.https://doi.org/10.1109/EuroSPW51379.2020.00081The Forgotten Side of DNS: Orphan and Abandoned Records (2020)In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 538-543). Article 9229781 (Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020). IEEE. Sommese, R., Jonker, M., van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C. & Sperotto, A.https://doi.org/10.1109/EuroSPW51379.2020.00079TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records (2020)In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 544-549). Article 9229819. IEEE. van der Toorn, O., van Rijswijk-Deij, R., Fiebig, T., Lindorfer, M. & Sperotto, A.https://doi.org/10.1109/EuroSPW51379.2020.00080User-AP Association Management in Software-Defined WLANs (2020)IEEE transactions on network and service management, 17(3), 1838-1852. Article 9115672. Bayhan, S.https://doi.org/10.1109/TNSM.2020.3001869Tangled: A Cooperative Anycast Testbed (2020)[Working paper › Preprint]. ArXiv.org. Bertholdo, L. M., Ceron, J. M., Vries, W. B. d., Schmitt, R. d. O., Granville, L. Z., Rijswijk-Deij, R. v. & Pras, A.https://arxiv.org/abs/2008.12881Demo Abstract: Cross-technology communication between LTE-U/LAA and WiFi (2020)In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020 (pp. 1272-1273). Article 9162587. IEEE. Gawlowicz, P., Zubow, A. & Bayhan, S.https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162587A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email (2020)In Proceedings of the 29th USENIX Security Symposium (pp. 613-630) (Proceedings of the 29th USENIX Security Symposium). USENIX. Lee, H., Gireesh, A., van Rijswijk - Deij, R., Kwon, T. & Chung, T.https://www.usenix.org/conference/usenixsecurity20/presentation/lee-hyeonminTracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization (2020)Computer communication review, 50(3), 3-15. Holz, R., Hiller, J., Amann, J., Razaghpanah, A., Jost, T., Vallina-Rodriguez, N. & Hohlfeld, O.https://doi.org/10.1145/3411740.3411742Update on ACM SIGCOMM CCR reviewing process: Towards a more open review process (2020)Computer communication review, 50(3), 55-56. Holz, R., Mellia, M., Bonaventure, O., Haddadi, H., Caesar, M., Gorinsky, S., Antichi, G., Camp, J., Claffy, k., Raman, B., Sperotto, A., Vianna, A. & Uhlig, S.https://doi.org/10.1145/3411740.3411748Lessons learned organizing the PAM 2020 virtual conference (2020)Computer communication review, 50(3), 46-54. Misa, C., Guse, D., Hohlfeld, O., Durairajan, R., Sperotto, A., Dainotti, A. & Rejaie, R.https://doi.org/10.1145/3411740.3411747The DNS in IoT: Opportunities, Risks, and Challenges (2020)IEEE internet computing, 24(4), 23-32. Article 9133283. Hesselman, C., Kaeo, M., Chapin, L., Claffy, K., Seiden, M., McPherson, D., Piscitello, D., McConachie, A., April, T., Latour, J. & Rasmussen, R.https://doi.org/10.1109/MIC.2020.3005388An empirical study of availability and reliability properties of the Bitcoin Lightning Network (2020)[Working paper › Working paper]. ArXiv.org. Waugh, F. & Holz, R.https://doi.org/10.48550/arXiv.2006.14358aiOS: An Intelligence Layer for SD-WLANs (2020)In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence. Article 9110260 (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. Bayhan, S.https://doi.org/10.1109/NOMS47738.2020.9110260A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web (2020)In TMA Conference 2020: Proceedings of the 4th Network Traffic Measurement and Analysis Conference, Berlin, Germany, June 10-11, 2020. Dagstuhl. Holz, R., Perino, D., Varvello, M., Amann, J., Continella, A., Evans, N., Leontiadis, I., Natoli, C. & Scheitle, Q.https://dblp.org/db/conf/tma/tma2020.htmlHybrid Helmholtz machines: a gate-based quantum circuit implementation (2020)Quantum Information Processing, 19(6). Article 174. van Dam, T. J., Neumann, N. M. P., Phillipson, F. & van den Berg, H.https://doi.org/10.1007/s11128-020-02660-2A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web (2020)[Working paper › Preprint]. ArXiv.org. Holz, R., Perino, D., Varvello, M., Amann, J., Continella, A., Evans, N., Leontiadis, I., Natoli, C. & Scheitle, Q.https://doi.org/10.48550/arXiv.2004.13239On the Impact of Clustering for IoT Analytics and Message Broker Placement across Cloud and Edge (2020)In EdgeSys '20: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking (pp. 43-48). ACM Publishing. Bayhan, S.https://doi.org/10.1145/3378679.3394538DDoS Mitigation: A Measurement-Based Approach (2020)In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020) (pp. 1-6). Article 9110320 (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. Jonker, M., Sperotto, A. & Pras, A.https://doi.org/10.1109/NOMS47738.2020.9110320Infrastructure Support for Contention-Based Forwarding (2020)In 2019 IEEE Vehicular Networking Conference, VNC 2019. Article 9062795 (IEEE Vehicular Networking Conference, VNC; Vol. 2019-December). IEEE. Meijerink, B. & Heijenk, G.https://doi.org/10.1109/VNC48660.2019.9062795Distributed DDoS Defense: A collaborative Approach at Internet Scale (2020)In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020. Article 9110300 (Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020). IEEE. Sperotto, A., Steinberger, J., Baier, H. & Pras, A.https://doi.org/10.1109/NOMS47738.2020.9110300Global-Scale Anycast Network Management with Verfploeter (2020)In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020. Article 9110449 (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. de Vries, W. B., Aljammaz, S. & van Rijswijk - Deij, R. M.https://doi.org/10.1109/NOMS47738.2020.9110449MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification (2020)In Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence. Article 9110336 (2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020); Vol. 2020). IEEE. Ceron, J. M., Scholten, C., Pras, A. & Santanna, J.https://doi.org/10.1109/NOMS47738.2020.9110336Protecting Home Networks from Insecure IoT Devices (2020)In Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020. Article 9110419. IEEE. Lastdrager, E., Hesselman, C., Jansen, J. & Davids, M.https://doi.org/10.1109/NOMS47738.2020.9110419Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD (2020)In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence. Article 9110332 (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. Dietz, C., Dreo, G., Sperotto, A. & Pras, A.https://doi.org/10.1109/NOMS47738.2020.9110332Passive Packet Sniffing Tools for Enabling Wireless Situational Awareness (2020)[Contribution to conference › Paper] Cyber Defence Next Generation Technology & Science Conference 2020 (Postponed). Choi, K. N., Kolamunna, H., Thilakarathna, K., Seneviratne, S., Holz, R., Hassan, M. & Zomaya, A.Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats (2020)Digital Threats, 1(1). Article 4. van der Toorn, O. & Sperotto, A.https://doi.org/10.1145/3373639When Parents and Children Disagree: Diving into DNS Delegation Inconsistency (2020)In Passive and Active Measurement: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020. Proceedings (pp. 175-189) (Lecture Notes in Computer Science; Vol. 12048). Springer. Sommese, R., Moura, G. C. M., Jonker, M., van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C. & Sperotto, A.https://doi.org/10.1007/978-3-030-44081-7_11Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD (2020)In Passive and Active Measurement - 21st International Conference, PAM 2020, Proceedings (pp. 158-174) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12048 LNCS). Springer. Wabeke, T., Moura, G. C. M., Franken, N. & Hesselman, C.https://doi.org/10.1007/978-3-030-44081-7_10CTC-CEM: Low-Latency Cross-Technology Channel Establishment with Multiple Nodes (2020)In 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (pp. 117-126). Article 9217736. Toro-Betancur, V., Bayhan, S., Gawlowicz, P. & Di Francesco, M.https://doi.org/10.1109/WoWMoM49955.2020.00032On state-independent importance sampling for the GI|GI|1 tandem queue (2020)Probability in the engineering and informational sciences, 34(1), 131-156. Buijsrogge, A., de Boer, P.-T. & Scheinhardt, W. R. W.https://doi.org/10.1017/S0269964818000426
2019
A Generic Processor Temperature Estimation Method (2019)In 2019 25th International Workshop on Thermal Investigations of ICs and Systems (THERMINIC). Article 8923636. IEEE. Ozceylan, B., Haverkort, B. R. H. M., de Graaf, M. & Gerards, M. E. T.https://doi.org/10.1109/THERMINIC.2019.8923636On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6 (2019)In 2019 International Symposium on Networks, Computers and Communications, ISNCC 2019. Article 8909187. IEEE. Roddav, N., Streit, K., Rodosek, G. D. & Pras, A.https://doi.org/10.1109/ISNCC.2019.8909187Polymorphic Encryption and Pseudonymisation of IP Network Flows (2019)[Working paper › Preprint]. ArXiv.org. Westerbaan, A. & Hendriks, L.https://doi.org/10.48550/arXiv.1911.02674DDoS Hide & Seek: On the effectiveness of a booter services takedown (2019)In IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference (pp. 65-72). Association for Computing Machinery. Kopp, D., Santanna, J., Wichtlhuber, M., Hohlfeld, O., Poese, I. & Dietzel, C.https://doi.org/10.1145/3355369.3355590Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover (2019)In IMC '19: Proceedings of the Internet Measurement Conference (pp. 1-14). Association for Computing Machinery. Müller, M., Thomas, M., Wessels, D., Hardaker, W., Chung, T., Toorop, W. & Rijswijk-Deij, R. v.https://doi.org/10.1145/3355369.3355570RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins (2019)In IMC '19: ACM Internet Measurement Conference, Amsterdam Netherlands, October, 2019 (pp. 406-419). Association for Computing Machinery. Chung, T., Aben, E., Bruijnzeels, T., Chandrasekaran, B., Choffnes, D., Levin, D., Maggs, B., Mislove, A., van Rijswijk - Deij, R. M., Rula, J. & Sullivan, N.https://doi.org/10.1145/3355369.3355596ACM Chants’19 chairs’ welcome (2019)In CHANTS'19: Proceedings of the 14th Workshop on Challenged Networks (pp. III). Bayhan, S. & Tsiropoulou, E. E.Are darknets all the same? On darknet visibility for security monitoring (2019)In 25th IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019. Article 8847113 (IEEE Workshop on Local and Metropolitan Area Networks; Vol. 2019-July). IEEE. Soro, F., Drago, I., Trevisan, M., Mellia, M., Ceron, J. & Santanna, J. J.https://doi.org/10.1109/LANMAN.2019.8847113Wireless networks hit the road: towards cooperative automated driving (2019)[Book/Report › Inaugural speech]. University of Twente. Heijenk, G.Rolling with Confidence: Managing the Complexity of DNSSEC Operations (2019)IEEE transactions on network and service management, 16(3), 1199-1211. Müller, M., Chung, T., Mislove, A. & van Rijswijk-Deij, R.https://doi.org/10.1109/TNSM.2019.2916176At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes (2019)Journal of Conflict Resolution, 64(2-3), 373-401. Lutscher, P. M., Weidmann, N. B., Roberts, M. E., Jonker, M., King, A. & Dainotti, A.https://doi.org/10.1177/0022002719861676IPBM: an energy efficient reliable interference-aware periodic broadcast messaging protocol for MANETs (2019)Wireless networks, 25(5), 2769-2787. Ünlü, B., Özceylan, B. & Baykal, B.https://doi.org/10.1007/s11276-019-01992-xRare event simulation for non-Markovian tandem queues (2019)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Buijsrogge, A.https://doi.org/10.3990/1.9789036547888DIVVY: An Efficient Shared Cell Scheduling Method and Algorithm for 6TiSCH-Based IoT Networks (2019)IEEE Transactions on Green Communications and Networking, 3(1), 170-179. Article 8527560. Unlu, B., Ozceylan, B. & Baykal, B.https://doi.org/10.1109/TGCN.2018.2879873Introducing smartnics in server-based data plane processing: The ddos mitigation use case (2019)IEEE Access, 7, 107161-107170. Article 8789414. Miano, S., Doriguzzi-Corin, R., Risso, F., Siracusa, D. & Sommese, R.https://doi.org/10.1109/ACCESS.2019.2933491
2018
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure (2018)Crime science, 7. Article 16. Weulen Kranenbarg, M., Holt, T. & van der Ham, J.https://doi.org/10.1186/s40163-018-0090-8When the dike breaks: Dissecting DNS defenses during DDos (2018)In IMC 2018 - Proceedings of the Internet Measurement Conference (pp. 8-21). Association for Computing Machinery. Moura, G. C. M., Heidemann, J., Müller, M., De Schmidt, R. O. & Davids, M.https://doi.org/10.1145/3278532.3278534Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers (2018)Computer communication review, 48(5), 70-76. Abhishta, A., Van Rijswijk-Deij, R. & Nieuwenhuis, L. J. M.https://doi.org/10.1145/3310165.3310175Designing cyber-physical systems with aDSL: A domain-specific language and tool support (2018)In 2018 13th System of Systems Engineering Conference, SoSE 2018 (pp. 225-232). Article 8428770. IEEE. Van Den Berg, F., Garousi, V., Tekinerdogan, B. & Haverkort, B. R.https://doi.org/10.1109/SYSOSE.2018.8428770Application Synchronization among Multiple MEC Servers in Connected Vehicle Scenarios (2018)In 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018: Proceedings. Article 8691039 (IEEE Vehicular Technology Conference; Vol. 2018). IEEE. Ojanperä, T., van den Berg, H., IJntema, W., de Souza Schwartz, R. & Djurica, M.https://doi.org/10.1109/VTCFall.2018.8691039Sideband Asymmetry in Ionospheric Cross Modulation (2018)Radio Science, 53(5), 640-655. de Boer, P. T. & Vester, M.https://doi.org/10.1002/2017RS006525Analyzing information availability in ICN under link failures (2018)In 32nd International Conference on Information Networking, ICOIN 2018 (pp. 199-204) (International Conference on Information Networking (ICOIN); Vol. 2018). IEEE. Rietberg, E., D'Acunto, L., Kooij, R. & van den Berg, H.https://doi.org/10.1109/ICOIN.2018.8343110
2017
Flow termination signaling in the centralized pre-congestion notification architecture (2017)Computer networks, 127, 233-242. Wetzels, F., van den Berg, H., Bosman, J. & van der Mei, R.https://doi.org/10.1016/j.comnet.2017.08.010Optimal battery charging in smart grids with price forecasts (2017)In 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Article 8086070 (IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT); Vol. 2017). IEEE. van der Kooij, S., Kempker, P., van den Berg, H. & Bhulai, S.https://doi.org/10.1109/ISGT.2017.8086070Application of Peltier thermal diodes in a magnetocaloric heat pump (2017)Applied thermal engineering, 111, 377-386. de Vries, W. & van der Meer, T. H.https://doi.org/10.1016/j.applthermaleng.2016.09.103Recursives in the wild: engineering authoritative DNS servers (2017)In IMC '17: Proceedings of the 2017 Internet Measurement Conference (pp. 489-495). Association for Computing Machinery. Müller, M., Moura, G. G. M., de O. Schmidt, R. & Heidemann, J.https://doi.org/10.1145/3131365.3131366
2016
Preface (2016)In Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings (pp. V-VI) (Lecture notes in computer science; Vol. 9701). Springer. Badonnel, R., Koch, R., Drašar, M. & Pras, A.
2015
The internet of names: Big data analysis for DNS (2015)In SIGCOMM ’15 August 17-21, 2015, London, United Kingdom (pp. 91-92). ACM Publishing. van Rijswijk - Deij, R. M., Jonker, M., Sperotto, A. & Pras, A.https://doi.org/10.1145/2785956.2789996
2014
Models and Guidelines for Dimensioning Private Clouds (2014)In 2013 IEEE Sixth International Conference on Cloud Computing (pp. 880-886) (IEEE International Conference on Cloud Computing, CLOUD). IEEE. Brandwacht, L., Meeuwissen, E., Van Den Berg, H. & Živković, M.https://doi.org/10.1109/CLOUD.2013.96The effectiveness of throughput sampling for capacity management: A queueing approach (2014)In 2014 IEEE International Conference on Communications, ICC 2014 (pp. 1197-1203). Article 6883484 (IEEE International Conference on Communications (ICC); Vol. 2014). IEEE. Ellens, W., Mandjes, M., Worm, D. & van den Berg, H.https://doi.org/10.1109/ICC.2014.6883484
2013
Revenue optimization of service compositions using conditional request retries (2013)International Journal of Web Services Research (IJWSR), 10(2), 1-22. Živković, M. & van den Berg, H.https://doi.org/10.4018/jwsr.2013040101
2010
Performance analysis of differentiated resource-sharing in a wireless ad-hoc network (2010)Performance evaluation, 67(7), 528-547. Roijers, F., van den Berg, H. & Mandjes, M.https://doi.org/10.1016/j.peva.2010.01.005
2007
Fluid-flow modeling of a relay node in an IEEE 802.11 wireless ad-hoc network (2007)In Managing Traffic Performance in Converged Networks: 20th International Teletraffic Congress, ITC20 2007, Ottawa, Canada, June 17-21, 2007. Proceedings (pp. 321-324) (Lecture Notes in Computer Science; Vol. 4516). Springer. Roijers, F., van den Berg, H. & Mandjes, M.https://doi.org/10.1007/978-3-540-72990-7_31
2006
2003
Performance analysis of wireless LANs: an integrated packet/flow level approach (2003)In Providing Quality of Service in Heterogeneous Environments: Proceedings of the 18th International Teletraffic Congress - ITC-18, 31 August-5 September 2003, Berlin, Germany (pp. 931-940) (Teletraffic Science and Engineering; Vol. 5). Elsevier. Litjens, R., Roijers, F., van den Berg, J. L., Boucherie, R. J. & Fleuren, M. J.