Research Output

Filter
Paper
2019

Architecture and prototype implementation for process-aware intrusion detection in electrical grids

Flosbach, R., Chromik, J. J. & Remke, A. K. I., May 2019, (Accepted/In press).

Research output: Contribution to conferencePaper

2018

Botnet detection and prevention in anonymous networks

Kuhnert, K., Steinberger, J. & Baier, H., Jul 2018. 5 p.

Research output: Contribution to conferencePaper

4 Downloads (Pure)

DDoS Defense using MTD and SDN

Steinberger, J., Kuhnert, B., Dietz, C., Ball, L., Sperotto, A., Baier, H., Pras, A. & Dreo Rodosek, G., 2018. 9 p.

Research output: Contribution to conferencePaper

Open Access
File
10 Citations (Scopus)
635 Downloads (Pure)

Intrusion Detection for sequence-based attacks with reduced traffic models

Ferling, B., Chromik, J. J., Caselli, M. & Remke, A. K. I., 2018.

Research output: Contribution to conferencePaper

Open Access
File
3 Citations (Scopus)
244 Downloads (Pure)
2017

Challenges with Reproducibility

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J., Sperotto, A. & Trammell, B., 2017, p. 1-4. 4 p.

Research output: Contribution to conferencePaper

11 Citations (Scopus)

Context-aware local Intrusion Detection in SCADA systems: a testbed and two showcases

Chromik, J. J., Haverkort, B. R. H. M., Remke, A. K. I., Pilch, C., Brackmann, P., Duhme, C., Everinghoff, F., Giberlein, A., Teodorowicz, T. & Wieland, J., 2017. 6 p.

Research output: Contribution to conferencePaper

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

Jonker, M., King, A., Krupp, J., Rossow, C., Sperotto, A. & Dainotti, A., 3 Nov 2017, p. 100-113.

Research output: Contribution to conferencePaper

21 Citations (Scopus)
2 Downloads (Pure)

The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover

van Rijswijk-Deij, R., Chung, T., Choffnes, D., Mislove, A. & Toorop, W., 22 Aug 2017, p. 63-64.

Research output: Contribution to conferencePaper

1 Citation (Scopus)

TIDE – Threat Identification using Active DNS Measurements

Sperotto, A., van der Toorn, O. & van Rijswijk, R., 22 Aug 2017, p. 65-67. 3 p.

Research output: Contribution to conferencePaper

1 Citation (Scopus)

Using a linear gain to accelerate average consensus over unreliable networks

Acciani, F., Frasca, P., Heijenk, G. & Stoorvogel, A. A., 12 Dec 2017, p. 3569 - 3574. 6 p.

Research output: Contribution to conferencePaper

1 Citation (Scopus)
2016

Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

Moura, G. M., de O. Schmidt, R., Heidemann, J., de Vries, W. B., Müller, M., Wei, L. & Hesselman, C., Nov 2016, p. 255-270. 16 p.

Research output: Contribution to conferencePaper

69 Downloads (Pure)

Assessing the quality of flow measurements from OpenFlow devices

Hendriks, L., de Oliveira Schmidt, R., Sadre, R., Bezerra, J. & Pras, A., Apr 2016, p. 1-8. 8 p.

Research output: Contribution to conferencePaper

File
149 Downloads (Pure)

Fitting a code-red virus spread model: An account of putting theory into practice

Kolesnichenko, A. V., Haverkort, B. R. H. M., Remke, A. K. I. & de Boer, P-T., Mar 2016, p. 39-46. 8 p.

Research output: Contribution to conferencePaper

File
2 Citations (Scopus)
28 Downloads (Pure)

On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC

van Rijswijk, R. M., Jonker, M. & Sperotto, A., Nov 2016, p. 258-262. 5 p.

Research output: Contribution to conferencePaper

File
7 Citations (Scopus)
19 Downloads (Pure)
2014

Automated Rare Event Simulation for Stochastic Petri Nets

Reijsbergen, D. P., de Boer, P-T. & Scheinhardt, W. R. W., Aug 2014, p. 80-81. 2 p.

Research output: Contribution to conferencePaper

File
57 Downloads (Pure)

Hybrid Petri nets with multiple stochastic transition firings

Ghasemieh, H., Remke, A. K. I. & Haverkort, B. R. H. M., 9 Dec 2014, p. 217-224. 8 p.

Research output: Contribution to conferencePaper

File
7 Citations (Scopus)
140 Downloads (Pure)
2013

Mobility 2.0: Co-Operative ITS Systems for Enhanced Personal Electromobility

Solar, A., Bolovinou, A., Heijenk, G., Lasgouttes, J-M. & Giménez, R., Nov 2013. 10 p.

Research output: Contribution to conferencePaper

File
29 Downloads (Pure)

Peak-to-average power reduction by rotation of the time-frequency representation

Korevaar, C. W., de Boer, P-T., Kokkeler, A. B. J. & Smit, G. J. M., Dec 2013, p. 3722-3727. 6 p.

Research output: Contribution to conferencePaper

8 Citations (Scopus)

Recent advances in importance sampling for statistical model checking

Reijsbergen, D. P., de Boer, P-T., Scheinhardt, W. R. W. & Haverkort, B. R. H. M., 23 Sep 2013, p. -. 4 p.

Research output: Contribution to conferencePaper

File
11 Downloads (Pure)

Reliable sequential testing for statistical model checking

Reijsbergen, D. P., de Boer, P-T., Scheinhardt, W. R. W. & Haverkort, B. R. H. M., 23 Sep 2013, p. -. 4 p.

Research output: Contribution to conferencePaper

Open Access
File
8 Downloads (Pure)
2012

Estimating Bandwidth Requirements using Flow-level Measurements

Bruyère, P. (ed.), de Oliveira Schmidt, R., Sperotto, A., Sadre, R. & Pras, A., May 2012. 1 p.

Research output: Contribution to conferencePaper

File
60 Downloads (Pure)

Lifetime Improvement by Battery Scheduling

Jongerden, M. R., Schmitt, J. B. (ed.) & Haverkort, B. R. H. M., Mar 2012, p. 106-120. 15 p.

Research output: Contribution to conferencePaper

File
55 Downloads (Pure)

Noise based transmitted reference modulation for wireless sensor networks

Mahboob, M., Meijerink, A., Morshed, S., Heijenk, G. & Bentum, M. J., 11 Apr 2012. 2 p.

Research output: Contribution to conferencePaper

File
25 Downloads (Pure)

Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

Hofstede, R. J. & Pras, A., May 2012, p. 22. 1 p.

Research output: Contribution to conferencePaper

File
64 Downloads (Pure)
2011

Tiqr: a novel take on two-factor authentication

van Rijswijk, R. M. & van Dijk, J., 4 Dec 2011, p. 81-97. 17 p.

Research output: Contribution to conferencePaper

File
65 Downloads (Pure)
2009

Dependability and Survivability Evaluation of a Water Distribution Process with Arcade

Roolvink, S., Remke, A. & Stoelinga, M., 17 Sep 2009, p. 4-7. 4 p.

Research output: Contribution to conferencePaper

Open Access
File
9 Downloads (Pure)

Intelligent Overload Control for Composite Web Services

Meulenhoff, P. J., Ostendorf, D. R., Zivkovic, M., Meeuwissen, H. B. & Gijsen, B. M. M., Nov 2009, p. 34-49. 16 p.

Research output: Contribution to conferencePaper

9 Citations (Scopus)
5 Downloads (Pure)

Time-It's time for a change

Haverkort, B. R. H. M., 2009, p. 569-569. 1 p.

Research output: Contribution to conferencePaper

File
1 Citation (Scopus)
8 Downloads (Pure)
2007

Advances in emergency networking

de Graaf, M., van den Berg, H. L., Boucherie, R. J., Elfrink, H., Heemstra de Groot, S. M., de Haan, R., te Marvelde, A., van Ommeren, J. C. W., Roijers, F., Stemerdink, J. & Tromp, E., 2007, p. 1-6. 6 p.

Research output: Contribution to conferencePaper

File
26 Downloads (Pure)
2006

Can we quantitatively assess security?

Haverkort, B. R. H. M., Jun 2006, p. 125-128. 4 p.

Research output: Contribution to conferencePaper

File
12 Downloads (Pure)
2005

Beyond Model-Checking CSL for QBDs: Resets, Batches and Rewards

Remke, A. & Haverkort, B. R., 23 Sep 2005, p. 23-26. 4 p.

Research output: Contribution to conferencePaper

Open Access
File
11 Downloads (Pure)

Duplexing methods for PON systems using multimode fiber with multicarrier transmission

Taniman, R. O. & van Bochove, A. C., Dec 2005, p. 149-152. 4 p.

Research output: Contribution to conferencePaper

File
24 Downloads (Pure)

Hyperbolic PDE's for CSRL Model Checking: A Deja Vu

Cloth, L. & Haverkort, B. R. H. M., 23 Sep 2005, p. 19-22. 4 p.

Research output: Contribution to conferencePaper

Proceedings of the 3rd IEEE/IFIP Workshop on End-to-End Monitoring Technques and Services

Al-Shaer, E., Pras, A. (ed.) & Owezarski, P. (ed.), 15 May 2005, p. 1-2. 2 p.

Research output: Contribution to conferencePaper

File
27 Downloads (Pure)
2004

Efficient computation of time-bounded reachability probabilities in uniform continuous-time Markov decision processes

Jensen, K. (ed.), Baier, C., Haverkort, B. R. H. M., Podelski, A. (ed.), Hermanns, H. & Katoen, J. P., 2004, p. 61-76. 16 p.

Research output: Contribution to conferencePaper

File
6 Downloads (Pure)

On the standardisation of Web service management operations

van Sloten, J., Harju, J. (ed.), Pras, A., Moltchanov, D. (ed.), van Sinderen, M. J. & Silverajan, B. (ed.), 2004, p. 143-150. 8 p.

Research output: Contribution to conferencePaper

File
17 Downloads (Pure)
Open Access
File
27 Downloads (Pure)
2003

Characterizing CDMA downlink feasibility via effective interference

Endrayanto, A. I., van den Berg, H. L. & Boucherie, R. J., 21 Jul 2003, p. -. 11 p.

Research output: Contribution to conferencePaper

Efficient Simulation of Buffer Overflow in Queueing Networks

Nicola, V. F. & Juneja, S. K., 6 Jul 2003, p. -.

Research output: Contribution to conferencePaper

Fair & power-efficient channel-dependent scheduling for CDMA packet networks

Zan, L., Heijenk, G. & El Zarki, M., 2003, p. 315-321. 5 p.

Research output: Contribution to conferencePaper

Open Access
File
7 Downloads (Pure)

Performance analysis of wireless LANs: an integrated packet/flow level approach

Litjens, R., Roijers, F., van den Berg, H. L., Boucherie, R. J. & Fleuren, M., 2003, p. 1-18. 18 p.

Research output: Contribution to conferencePaper

File
49 Downloads (Pure)
2002

Model-checking performability properties

Haverkort, B. R. H. M., Cloth, L., Hermanns, H., Katoen, J. P. & Baier, C., 2002, p. 103-112. 10 p.

Research output: Contribution to conferencePaper

File
15 Downloads (Pure)

Simulation for continuous-time Markov chains

Brim, J. (ed.), Baier, C., Katoen, J. P., Jancar, P. (ed.), Hermanns, H., Kretnsk, M. (ed.), Haverkort, B. R. H. M. & Kucera, A. (ed.), 2002, p. 473-489. 15 p.

Research output: Contribution to conferencePaper

File
17 Citations (Scopus)
19 Downloads (Pure)
2001

Fitting World-Wide Web Request Traces with the EM-Algorithm

El Abdouni Khayari, R., Sadre, R. & Haverkort, B. R. H. M., 2001, p. 211-220. 10 p.

Research output: Contribution to conferencePaper

File
10 Citations (Scopus)
13 Downloads (Pure)

Using Max-Plus Algebra for the Evaluation of Stochastic Process Algebra Prefixes

Cloth, L., de Alfaro, L. (ed.), Gilmore, S. (ed.), Bohnenkamp, H. C. & Haverkort, B. R. H. M., 2001, p. 152-167. 16 p.

Research output: Contribution to conferencePaper

File
57 Downloads (Pure)
2000

Engineering Workflow: The Process in Product Data Technology

Bijwaard, D., Spee, J. B. R. M. & de Boer, P-T., May 2000, p. 215-222. 8 p.

Research output: Contribution to conferencePaper

File
1347 Downloads (Pure)

Model Checking Continuous-Time Markov Chains by Transient Analysis

Baier, C., Haverkort, B., Hermanns, H. & Katoen, J. P., 2000, p. 358-372. 15 p.

Research output: Contribution to conferencePaper

Open Access
File
97 Citations (Scopus)
56 Downloads (Pure)

On the Use of Model Checking Techniques for Quantitative Dependability Evaluation

Haverkort, B. R. H. M., Hermanns, H. & Katoen, J. P., 2000, p. 228-237. 10 p.

Research output: Contribution to conferencePaper

File
43 Downloads (Pure)
1999

Mobile IP

Heijenk, G., Sallent, S. (ed.) & Pras, A. (ed.), 1999, p. 207. 1 p.

Research output: Contribution to conferencePaper

File
49 Downloads (Pure)

On the Estimation of Rare Event Probabilities Involving IID Sums

de Boer, P-T., Nicola, V. F. & Srinivasan, R., Mar 1999, p. 133-138. 6 p.

Research output: Contribution to conferencePaper