Research Output 1989 2019

2017
93 Downloads (Pure)

Analysis of hybrid Petri nets with random discrete events

Ghasemieh, H., 3 Feb 2017, Enschede: University of Twente. 196 p.

Research output: ThesisPhD Thesis - Research UT, graduation UTAcademic

File
Petri nets
Critical infrastructures
Intelligent buildings
Sewage treatment
Electric power distribution
2 Citations (Scopus)
120 Downloads (Pure)

Automated performance evaluation of service-oriented systems

van den Berg, F. G. B., 14 Jun 2017, Enschede: University of Twente. 266 p.

Research output: ThesisPhD Thesis - Research UT, graduation UTAcademic

Open Access
File
Computer systems
Embedded systems
Model checking
Gain measurement
Biomedical equipment
2 Citations (Scopus)

Battery Aging, Battery Charging and the Kinetic Battery Model: A First Exploration

Jongerden, M. R. & Haverkort, B. R., 11 Aug 2017, Quantitative Evaluation of Systems: 14th International Conference, QEST 2017, Berlin, Germany, September 5-7, 2017, Proceedings. Bertrand, N. & Bortolussi, L. (eds.). Cham: Springer, p. 88-103 16 p. (Lecture Notes in Computer Science; vol. 10503).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Charging (batteries)
Aging of materials
Kinetics
Degradation
Secondary batteries
3 Citations (Scopus)

Booter blacklist: Unveiling DDoS-for-hire websites

Santanna, J. J., Schmidt, R. D. O., Tuncer, D., De Vries, J., Granville, L. Z. & Pras, A., 13 Jan 2017, 2016 12th International Conference on Network and Service Management, CNSM 2016 and Workshops, 3rd International Workshop on Management of SDN and NFV, ManSDN/NFV 2016, and International Workshop on Green ICT and Smart Networking, GISN 2016. Keith-Marsoun, S., dos Santos, C. R. P., Limam, N., Cheriet, M., Zhani, M. F. & Festor, O. (eds.). IEEE, p. 144-152 9 p. 7818410

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Websites
Internet
Monitoring
Methodology
Denial
3 Citations (Scopus)

Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire?

Douglas, D., Santanna, J. J., de Oliveira Schmidt, R., Granville, L. Z. & Pras, A., 1 Jan 2017, In : Journal of information, communication and ethics in society. 15, 1, p. 90-104 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

civil disobedience
website
Websites
Internet
Testing
284 Downloads (Pure)

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A., 28 Jun 2017, ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
2 Citations (Scopus)

Broad and load-aware anycast mapping with Verfploeter

De Vries, W. B., de Oliveira Schmidt, R., Hardaker, W., Heidemann, J., de Boer, P-T. & Pras, A., 1 Nov 2017, IMC '17: Proceedings of the 2017 Internet Measurement Conference. Association for Computing Machinery (ACM), p. 477-488 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Catchments
Testbeds
Internet
10 Citations (Scopus)

Challenges with Reproducibility

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J., Sperotto, A. & Trammell, B., 2017, p. 1-4. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Computer science
1 Citation (Scopus)

Cloudified Mobility and Bandwidth Prediction in Virtualized LTE Networks

Zhao, Z., Karimzadeh Motallebi Azar, M., Braun, T., Pras, A. & van den Berg, H. L., Jul 2017, IFIP/IEEE International Symposium on Integrated Network Management (IM 2017). IEEE, 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Bandwidth
Network components
Cloud computing
Computer hardware
Telecommunication links

Context-aware local Intrusion Detection in SCADA systems: a testbed and two showcases

Chromik, J. J., Haverkort, B. R. H. M., Remke, A. K. I., Pilch, C., Brackmann, P., Duhme, C., Everinghoff, F., Giberlein, A., Teodorowicz, T. & Wieland, J., 2017. 6 p.

Research output: Contribution to conferencePaperAcademicpeer-review

SCADA systems
Intrusion detection
Testbeds
Electric power distribution
737 Downloads (Pure)

DDoS-as-a-Service: Investigating Booter Websites

Cardoso de Santanna, J. J., 17 Nov 2017, Enschede: University of Twente. 183 p.

Research output: ThesisPhD Thesis - Research UT, graduation UTAcademic

Open Access
File
Websites
Industry
Internet
Telephone
Denial-of-service attack
4 Citations (Scopus)
1 Downloads (Pure)

Double-NAT Based Mobility Management for Future LTE Networks

Karimzadeh Motallebi Azar, M., Valtulina, L., Pras, A., Liebsch, M. & Taleb, T., 19 Mar 2017, IEEE Wireless Communications and Networking Conference (WCNC 2017). IEEE, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Anchors
Internet
55 Downloads (Pure)

Energy-efficient medium access control for transmit reference modulation

Morshed, S., 2 Nov 2017, Enschede: University of Twente. 199 p.

Research output: ThesisPhD Thesis - Research UT, graduation UTAcademic

Open Access
File
Medium access control
Modulation
Network protocols
Energy efficiency
Wireless sensor networks
1 Citation (Scopus)
30 Downloads (Pure)

Ethics and Internet Measurements

van der Ham, J. & van Rijswijk, R. M., Oct 2017, In : Journal of Cyber Security and Mobility. 5, 4, p. 287-308 3.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Internet
Gages
1 Citation (Scopus)

Evaluation of geocast routing trees on random and actual networks

Meijerink, B. J., Baratchi, M. & Heijenk, G., 2017, Wired/Wireless Internet Communications: 15th IFIP WG 6.2 International Conference, WWIC 2017, Proceedings. Koucheryavy, Y., Mamatas, L., Matta, I., Ometov, A. & Papadimitriou, P. (eds.). Springer, p. 127-142 16 p. (Lecture Notes in Computer Science; vol. 10372).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Routing
Evaluation
Routing algorithms
Shortest Path Tree
Multicast Routing
2 Citations (Scopus)
20 Downloads (Pure)

Flow-based detection of IPv6-specific network layer attacks

Hendriks, L., Velan, P., de O. Schmidt, R., de Boer, P-T. & Pras, A., 2017, Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Proceedings. Tuncer, D., Koch, R., Badonne, R. & Stiller, B. (eds.). Cham: Springer, p. 137-142 6 p. (Lecture Notes in Computer Science; vol. 10356)(Lecture Notes in Computer Communication Networks and Telecommunications).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Network layers
Attack
Monitoring
Signature
Vulnerability
2 Citations (Scopus)
3 Downloads (Pure)

Flow-Based Web Application Brute-Force Attack and Compromise Detection

Hofstede, R., Jonker, M., Sperotto, A. & Pras, A., 2017, In : Journal of network and systems management. 25, 4, p. 735-758 24 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Intrusion detection
Information management
Servers
Network protocols
Monitoring

iDSL: Automated Performance Evaluation of Service-Oriented Systems

van den Berg, F. G. B., Haverkort, B. R. H. M. & Hooman, J., 27 Sep 2017, ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday. Langerak, R. & Rensink, A. (eds.). Springer, (Lecture Notes in Computer Science; vol. 10500).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Image processing
X rays
210 Downloads (Pure)

Improving DNS security: a measurement-based approach

van Rijswijk-Deij, R., 28 Jun 2017, Enschede: University of Twente. 227 p.

Research output: ThesisPhD Thesis - Research external, graduation UTAcademic

Open Access
File
Security systems
Cryptography
Internet
Amplification
1 Downloads (Pure)

Inferring the social-connectedness of locations from mobility data

Brugman, T., Baratchi, M., Heijenk, G. & van Steen, M., 2017, Social Informatics: 9th International Conference, SocInfo 2017, Oxford, UK, September 13-15, 2017. Ciampaglia, G. L., Mashhadi, A. & Yasseri, T. (eds.). Cham: Springer, p. 443-457 15 p. (Lecture Notes in Computer Science; vol. 10540).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Connectedness
Evaluate
Tie
Baseline
Sampling

IPv6-specific misconfigurations in the DNS

Hendriks, L., de Boer, P-T. & Pras, A., 2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 5 p. (International Conference on Network and Service Management Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Multiple zones
Pattern matching
Servers
Internet
3 Citations (Scopus)
4 Downloads (Pure)

Large deviations for the total queue size in non-Markovian tandem queues

Buijsrogge, A., de Boer, P-T., Rosen Esquivel, K. A. & Scheinhardt, W. R. W., 1 Apr 2017, In : Queueing systems. 85, 3-4, p. 305-312 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Tandem Queues
Large Deviations
Queue
Customers
Decay Rate

Measuring exposure in DDoS protection services

Jonker, M. & Sperotto, A., 30 Nov 2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Websites
Outsourcing
Telecommunication traffic
Denial-of-service attack
12 Citations (Scopus)
2 Downloads (Pure)

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

Jonker, M., King, A., Krupp, J., Rossow, C., Sperotto, A. & Dainotti, A., 3 Nov 2017, p. 100-113.

Research output: Contribution to conferencePaperAcademicpeer-review

53 Downloads (Pure)

Modeling the impact of interference on wireless ad hoc network performance

Coenen, T. J. M., 9 Jun 2017, Enschede: University of Twente. 133 p.

Research output: ThesisPhD Thesis - Research UT, graduation UTAcademic

Open Access
File
Wireless ad hoc networks
Network performance
Throughput
Ad hoc networks
Quality of service
1 Citation (Scopus)

MultiPath TCP to support user's mobility in future LTE network

Karimzadeh, M., Valtulina, L., Berg, H. V. D., Pras, A., Ortiz, P. G. & Sadre, R., 2017, 10th IFIP Wireless and Mobile Networking Conference, WMNC 2017, Valencia, Spain, September 25-27, 2017. IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Wireless networks
Anchors
Network architecture
Bandwidth
Network protocols
2 Citations (Scopus)

On the potential of IPv6 open resolvers for DDoS attacks

Hendriks, L., de Oliveira Schmidt, R., van Rijswijk-Deij, R. & Pras, A., 2017, Passive and Active Measurement: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings. Kaafar, M. A., Uhlig, S. & Amann, J. (eds.). Cham: Springer, p. 17-29 13 p. (Lecture Notes in Computer Science; vol. 10176)(Lecture Notes in Computer Communication Networks and Telecommunications).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Internet
Amplification
Servers
Scanning
Denial-of-service attack
1 Citation (Scopus)
34 Downloads (Pure)

Quantitative comparison of the efficiency and scalability of the current and future LTE network architectures

Karimzadeh, M., Van Den Berg, H., Schmidt, R. D. O. & Pras, A., 1 Jan 2017, In : Wireless Communications and Mobile Computing. 2017, 20 p., 3938545.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Network architecture
Scalability
Routers
Costs
Numerical analysis
1 Citation (Scopus)

Quiet dogs can bite: Which Booters should we go after, and what are our mitigation options?

Santanna, J. J., De Schmidt, R. O., Tuncer, D., Sperotto, A., Granville, L. Z. & Pras, A., 1 Jul 2017, In : IEEE communications magazine. 55, 7, p. 50-56 7 p., 7981523.

Research output: Contribution to journalArticleAcademicpeer-review

Network security
Websites
Marketing
Radar
Internet
3 Citations (Scopus)
40 Downloads (Pure)

Rare event simulation for dynamic fault trees

Ruijters, E. J. J., Reijsbergen, D. P., de Boer, P-T. & Stoelinga, M. I. A., 10 Mar 2017, Enschede: Centre for Telematics and Information Technology (CTIT). 14 p. (CTIT technical report series; no. TR-CTIT-17-02)

Research output: Book/ReportReportOther research output

File
67 Downloads (Pure)

Rare Event Simulation for Dynamic Fault Trees

Ruijters, E. J. J., Reijsbergen, D. P., de Boer, P-T. & Stoelinga, M. I. A., 17 Aug 2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Tonetta, S., Schoitsch, E. & Bitsch, F. (eds.). Springer, p. 20-35 15 p. (Lecture Notes in Computer Science; vol. 10488).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Importance sampling
Repair
Availability
Monte Carlo simulation

Reliable vehicular broadcast using 5G device-to-device communication

Gholibeigi, M., Sarrionandia, N., Karimzadeh Motallebi Azar, M., Baratchi, M., van den Berg, H. L. & Heijenk, G., 2017, WMNC 2017: 10th IFIP Wireless and Mobile Networking Conference, 25-27 September 2017, Valencia (Spain). IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Communication
Broadcasting
Resource allocation
Topology
10 Citations (Scopus)

Smart Industry: How ICT Will Change the Game!

Haverkort, B. R. & Zimmermann, A., 2017, In : IEEE internet computing. 21, 1, p. 8-10

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)

Software Defined Networking to support IP address mobility in future LTE network

Karimzadeh Motallebi Azar, M., Valtulina, L., van den Berg, H. L., Pras, A., Liebsch, M. & Taleb, T., 29 Mar 2017, 2017 Wireless Days. IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Packet loss
Anchors
Network architecture
Wireless networks
Chemical analysis
33 Downloads (Pure)

Spaceprint: a Mobility-based Fingerprinting Scheme for Public Spaces

Baratchi, M., Heijenk, G. & van Steen, M., 29 Mar 2017, arXiv.org, 9 p.

Research output: Working paperProfessional

Open Access
File
Semantics
Uncertainty

Spaceprint: a Mobility-based Fingerprinting Scheme for Spaces

Baratchi, M., Heijenk, G. & van Steen, M. R., 7 Nov 2017, SIGSPATIAL '17: Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. Association for Computing Machinery (ACM), 102

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Semantics
Uncertainty
3 Citations (Scopus)
1 Downloads (Pure)

Specification of data centre power management strategies

Postema, B. F. & Haverkort, B. R., 16 May 2017, Proceedings of the 8th International Conference on Future Energy Systems, e-Energy 2017. New York, NY, USA: Association for Computing Machinery (ACM), p. 284-289 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Power Management
Data Center
Specification
Specifications
Service Level Agreement
5 Citations (Scopus)
12 Downloads (Pure)

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation

van Rijswijk-Deij, R., Hageman, K., Sperotto, A. & Pras, A., Apr 2017, In : IEEE/ACM transactions on networking. 25, 2, p. 738-750

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Electronic document identification systems
Program processors
Computer systems
Switches

The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover

van Rijswijk-Deij, R., Chung, T., Choffnes, D., Mislove, A. & Toorop, W., 22 Aug 2017, p. 63-64.

Research output: Contribution to conferencePaperAcademicpeer-review

Internet
Monitoring
Network protocols
Electronic document identification systems
Security systems
1 Citation (Scopus)

Threats and surprises behind IPv6 extension headers

Hendriks, L., Velan, P., de Oliveira Schmidt, R., De Boer, P. T. & Pras, A., 4 Aug 2017, Network Traffic Measurement and Analysis Conference (TMA), 2017. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Internet
Monitoring
1 Citation (Scopus)

TIDE – Threat Identification using Active DNS Measurements

Sperotto, A., van der Toorn, O. & van Rijswijk, R., 22 Aug 2017, p. 65-67. 3 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Health
Internet
Denial-of-service attack
2 Citations (Scopus)

Understanding the Role of Registrars in DNSSEC Deployment

Chung, T., van Rijswijk, R. M., Choffnes, D., Levin, D., Maggs, B., Mislove, A. & Wilson, C., 1 Nov 2017, IMC '17: Proceedings of the 2017 Internet Measurement Conference. New York, NY: Association for Computing Machinery (ACM), p. 369-383

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Conveying
Security systems
1 Citation (Scopus)

Using a linear gain to accelerate average consensus over unreliable networks

Acciani, F., Frasca, P., Heijenk, G. & Stoorvogel, A. A., 12 Dec 2017, p. 3569 - 3574. 6 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Packet loss
Wireless networks
1 Citation (Scopus)

Using networks to teach about networks (report on dagstuhl seminar #17112)

Schönwälder, J., Friedman, T. & Pras, A., 1 Jul 2017, In : Computer communication review. 47, 3, p. 40-44 5 p.

Research output: Contribution to journalArticleAcademicpeer-review

Technical presentations
Teaching
58 Downloads (Pure)

Verkenning doelrealisatie communicatiemiddelen Caribisch Nederland

van der Molen, I., Berendsen, J., Gerardts, R., Haverkort, B. R. H. M., Meijerink, B. J., Misana-Ter Huurne, E. F. J., Rojer, G., Schoop, R. & Torenvlied, R., 2017, University of Twente. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
2016
84 Downloads (Pure)

A hierarchical architecture for an energy management system

Piotrowski, K., Casaca, A., Gerards, M. E. T., Jongerden, M. R., Melo, F., Garrido, D., Geers, M. & Peralta, J., Nov 2016, The 10th Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion, MedPower 2016. UK: IET Digital Library, p. 109 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
26 Citations (Scopus)

A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., Jun 2016, In : IEEE journal on selected areas in communications. 34, 6, p. 1877-1888 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

84 Downloads (Pure)

A Multi-channel Multiple Access Scheme Using Frequency Offsets - Modelling and Analysis

Morshed, S., Baratchi, M., Mandal, P. K. & Heijenk, G., 18 Oct 2016, Proceedings of the 12th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016. USA: IEEE Computer Society, p. - 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)

Analysis of a receiver-based reliable broadcast approach for vehicular networks

Gholibeigi, M., Heijenk, G., Moltchanov, D. & Koucheryavi, Y., Feb 2016, In : Ad hoc networks. 37, 1, p. 63-75 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

30 Downloads (Pure)

Analysis of a state-independent change of measure for the $G|G|1$ tandem queue

Buijsrogge, A., de Boer, P-T. & Scheinhardt, W. R. W., Mar 2016, 11th International Workshop on Rare Event Simulation, RESIM 2016. Eindhoven: EURANDOM, p. 1-3 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File