Research Output 1989 2019

Filter
Paper
2019

Architecture and prototype implementation for process-aware intrusion detection in electrical grids

Flosbach, R., Chromik, J. J. & Remke, A. K. I., May 2019, (Accepted/In press).

Research output: Contribution to conferencePaperAcademicpeer-review

Intrusion detection
SCADA systems
Electric power distribution
Scalability
Processing
2018
4 Downloads (Pure)

Botnet detection and prevention in anonymous networks

Kuhnert, K., Steinberger, J. & Baier, H., Jul 2018. 5 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Computer networks
Internet
Botnet
1 Citation (Scopus)
503 Downloads (Pure)

DDoS Defense using MTD and SDN

Steinberger, J., Kuhnert, B., Dietz, C., Ball, L., Sperotto, A., Baier, H., Pras, A. & Dreo Rodosek, G., 2018. 9 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
3 Citations (Scopus)
204 Downloads (Pure)

Intrusion Detection for sequence-based attacks with reduced traffic models

Ferling, B., Chromik, J. J., Caselli, M. & Remke, A. K. I., 2018.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
Intrusion detection
Gases
2017
11 Citations (Scopus)

Challenges with Reproducibility

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J., Sperotto, A. & Trammell, B., 2017, p. 1-4. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Computer science

Context-aware local Intrusion Detection in SCADA systems: a testbed and two showcases

Chromik, J. J., Haverkort, B. R. H. M., Remke, A. K. I., Pilch, C., Brackmann, P., Duhme, C., Everinghoff, F., Giberlein, A., Teodorowicz, T. & Wieland, J., 2017. 6 p.

Research output: Contribution to conferencePaperAcademicpeer-review

SCADA systems
Intrusion detection
Testbeds
Electric power distribution
13 Citations (Scopus)
2 Downloads (Pure)

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

Jonker, M., King, A., Krupp, J., Rossow, C., Sperotto, A. & Dainotti, A., 3 Nov 2017, p. 100-113.

Research output: Contribution to conferencePaperAcademicpeer-review

The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover

van Rijswijk-Deij, R., Chung, T., Choffnes, D., Mislove, A. & Toorop, W., 22 Aug 2017, p. 63-64.

Research output: Contribution to conferencePaperAcademicpeer-review

Internet
Monitoring
Network protocols
Electronic document identification systems
Security systems
1 Citation (Scopus)

TIDE – Threat Identification using Active DNS Measurements

Sperotto, A., van der Toorn, O. & van Rijswijk, R., 22 Aug 2017, p. 65-67. 3 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Health
Internet
Denial-of-service attack
1 Citation (Scopus)

Using a linear gain to accelerate average consensus over unreliable networks

Acciani, F., Frasca, P., Heijenk, G. & Stoorvogel, A. A., 12 Dec 2017, p. 3569 - 3574. 6 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Packet loss
Wireless networks
2016
26 Downloads (Pure)

Analysis of a state-independent change of measure for the $G|G|1$ tandem queue

Buijsrogge, A., de Boer, P-T. & Scheinhardt, W. R. W., 18 Jul 2016, p. 48-48. 1 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
63 Downloads (Pure)

Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

Moreira Moura, G., de Oliveira Schmidt, R., Heidemann, J., de Vries, W. B., Müller, M., Wei, L. & Hesselman, C. E. W., Nov 2016, p. 255-270. 16 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
143 Downloads (Pure)

Assessing the quality of flow measurements from OpenFlow devices

Hendriks, L., de Oliveira Schmidt, R., Sadre, R., Bezerra, J. & Pras, A., Apr 2016, p. 1-8. 8 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
1 Citation (Scopus)
24 Downloads (Pure)

Fitting a code-red virus spread model: An account of putting theory into practice

Kolesnichenko, A. V., Haverkort, B. R. H. M., Remke, A. K. I. & de Boer, P-T., Mar 2016, p. 39-46. 8 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
6 Citations (Scopus)
12 Downloads (Pure)

On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC

van Rijswijk, R. M., Jonker, M. & Sperotto, A., Nov 2016, p. 258-262. 5 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2014
43 Downloads (Pure)

Automated Rare Event Simulation for Stochastic Petri Nets

Reijsbergen, D. P., de Boer, P-T. & Scheinhardt, W. R. W., Aug 2014, p. 80-81. 2 p.

Research output: Contribution to conferencePaperAcademic

File
7 Citations (Scopus)
119 Downloads (Pure)

Hybrid Petri nets with multiple stochastic transition firings

Ghasemieh, H., Remke, A. K. I. & Haverkort, B. R. H. M., 9 Dec 2014, p. 217-224. 8 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2013
22 Downloads (Pure)

Mobility 2.0: Co-Operative ITS Systems for Enhanced Personal Electromobility

Solar, A., Bolovinou, A., Heijenk, G., Lasgouttes, J-M. & Giménez, R., Nov 2013. 10 p.

Research output: Contribution to conferencePaperAcademic

File
6 Citations (Scopus)

Peak-to-average power reduction by rotation of the time-frequency representation

Korevaar, C. W., de Boer, P-T., Kokkeler, A. B. J. & Smit, G. J. M., Dec 2013, p. 3722-3727. 6 p.

Research output: Contribution to conferencePaperAcademicpeer-review

8 Downloads (Pure)

Recent advances in importance sampling for statistical model checking

Reijsbergen, D. P., de Boer, P-T., Scheinhardt, W. R. W. & Haverkort, B. R. H. M., 23 Sep 2013, p. -. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
Importance sampling
Model checking
Markov processes
Statistical Models
5 Downloads (Pure)

Reliable sequential testing for statistical model checking

Reijsbergen, D. P., de Boer, P-T., Scheinhardt, W. R. W. & Haverkort, B. R. H. M., 23 Sep 2013, p. -. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
Model checking
Testing
Statistical Models
2012
45 Downloads (Pure)

Estimating Bandwidth Requirements using Flow-level Measurements

Bruyère, P. (ed.), de Oliveira Schmidt, R., Sperotto, A., Sadre, R. & Pras, A., May 2012. 1 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
37 Downloads (Pure)

Lifetime Improvement by Battery Scheduling

Jongerden, M. R., Schmitt, J. B. (ed.) & Haverkort, B. R. H. M., Mar 2012, p. 106-120. 15 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
Scheduling
Mobile devices
Recovery
Kinetics
23 Downloads (Pure)

Noise based transmitted reference modulation for wireless sensor networks

Mahboob, M., Meijerink, A., Morshed, S., Heijenk, G. & Bentum, M. J., 11 Apr 2012. 2 p.

Research output: Contribution to conferencePaperAcademic

File
47 Downloads (Pure)

Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

Hofstede, R. J. & Pras, A., May 2012, p. 22. 1 p.

Research output: Contribution to conferencePaperAcademic

File
2011
55 Downloads (Pure)

Tiqr: a novel take on two-factor authentication

van Rijswijk, R. M. & van Dijk, J., 4 Dec 2011, p. 81-97. 17 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2009
6 Downloads (Pure)

Dependability and Survivability Evaluation of a Water Distribution Process with Arcade

Roolvink, S., Remke, A. & Stoelinga, M., 17 Sep 2009, p. 4-7. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
Water
Critical infrastructures
Water treatment
Potable water
Disasters
9 Citations (Scopus)
5 Downloads (Pure)

Intelligent Overload Control for Composite Web Services

Meulenhoff, P. J., Ostendorf, D. R., Zivkovic, M., Meeuwissen, H. B. & Gijsen, B. M. M., Nov 2009, p. 34-49. 16 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Intelligent control
Web services
Access control
Composite materials
Availability
1 Citation (Scopus)
4 Downloads (Pure)

Time-It's time for a change

Haverkort, B. R. H. M., 2009, p. 569-569. 1 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2007
24 Downloads (Pure)

Advances in emergency networking

de Graaf, M., van den Berg, H. L., Boucherie, R. J., Elfrink, H., Heemstra de Groot, S. M., de Haan, R., te Marvelde, A., van Ommeren, J. C. W., Roijers, F., Stemerdink, J. & Tromp, E., 2007, p. 1-6. 6 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2006
10 Downloads (Pure)

Can we quantitatively assess security?

Haverkort, B. R. H. M., Jun 2006, p. 125-128. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2005
20 Downloads (Pure)

A secure and lightweight ad-hoc routing algorithm for personal networks

Jehangir, A. & Heemstra de Groot, S. M., 22 Sep 2005. 5 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
7 Downloads (Pure)

Beyond Model-Checking CSL for QBDs: Resets, Batches and Rewards

Remke, A. & Haverkort, B. R., 23 Sep 2005, p. 23-26. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
Model checking
19 Downloads (Pure)

Duplexing methods for PON systems using multimode fiber with multicarrier transmission

Taniman, R. O. & van Bochove, A. C., Dec 2005, p. 149-152. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File

Hyperbolic PDE's for CSRL Model Checking: A Deja Vu

Cloth, L. & Haverkort, B. R. H. M., 23 Sep 2005, p. 19-22. 4 p.

Research output: Contribution to conferencePaperAcademic

19 Downloads (Pure)

Proceedings of the 3rd IEEE/IFIP Workshop on End-to-End Monitoring Technques and Services

Al-Shaer, E., Pras, A. (ed.) & Owezarski, P. (ed.), 15 May 2005, p. 1-2. 2 p.

Research output: Contribution to conferencePaperAcademic

File
2004
5 Downloads (Pure)

Efficient computation of time-bounded reachability probabilities in uniform continuous-time Markov decision processes

Jensen, K. (ed.), Baier, C., Haverkort, B. R. H. M., Podelski, A. (ed.), Hermanns, H. & Katoen, J. P., 2004, p. 61-76. 16 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
12 Downloads (Pure)

On the standardisation of Web service management operations

van Sloten, J., Harju, J. (ed.), Pras, A., Moltchanov, D. (ed.), van Sinderen, M. J. & Silverajan, B. (ed.), 2004, p. 143-150. 8 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
13 Downloads (Pure)
Open Access
File
entropy
simulation
mathematical analysis
method
sampling
2003

Characterizing CDMA downlink feasibility via effective interference

Endrayanto, A. I., van den Berg, H. L. & Boucherie, R. J., 21 Jul 2003, p. -. 11 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Efficient Simulation of Buffer Overflow in Queueing Networks

Nicola, V. F. & Juneja, S. K., 6 Jul 2003, p. -.

Research output: Contribution to conferencePaperAcademicpeer-review

6 Downloads (Pure)

Fair & power-efficient channel-dependent scheduling for CDMA packet networks

Zan, L., Heijenk, G. & El Zarki, M., 2003, p. 315-321. 5 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
Packet networks
Scheduling algorithms
Code division multiple access
Scheduling
Mobile phones
29 Downloads (Pure)

Performance analysis of wireless LANs: an integrated packet/flow level approach

Litjens, R., Roijers, F., van den Berg, H. L., Boucherie, R. J. & Fleuren, M., 2003, p. 1-18. 18 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2002
13 Downloads (Pure)

Model-checking performability properties

Haverkort, B. R. H. M., Cloth, L., Hermanns, H., Katoen, J. P. & Baier, C., 2002, p. 103-112. 10 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
Model checking
Formal logic
Mobile computing
Computational complexity
17 Citations (Scopus)
14 Downloads (Pure)

Simulation for continuous-time Markov chains

Brim, J. (ed.), Baier, C., Katoen, J. P., Jancar, P. (ed.), Hermanns, H., Kretnsk, M. (ed.), Haverkort, B. R. H. M. & Kucera, A. (ed.), 2002, p. 473-489. 15 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2001
10 Citations (Scopus)
10 Downloads (Pure)

Fitting World-Wide Web Request Traces with the EM-Algorithm

El Abdouni Khayari, R., Sadre, R. & Haverkort, B. R. H. M., 2001, p. 211-220. 10 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
54 Downloads (Pure)

Using Max-Plus Algebra for the Evaluation of Stochastic Process Algebra Prefixes

Cloth, L., de Alfaro, L. (ed.), Gilmore, S. (ed.), Bohnenkamp, H. C. & Haverkort, B. R. H. M., 2001, p. 152-167. 16 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
2000
869 Downloads (Pure)

Engineering Workflow: The Process in Product Data Technology

Bijwaard, D., Spee, J. B. R. M. & de Boer, P-T., May 2000, p. 215-222. 8 p.

Research output: Contribution to conferencePaperAcademic

File
96 Citations (Scopus)
39 Downloads (Pure)

Model Checking Continuous-Time Markov Chains by Transient Analysis

Baier, C., Haverkort, B., Hermanns, H. & Katoen, J. P., 2000, p. 358-372. 15 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
Model checking
Transient analysis
Markov processes
Specifications
Temporal logic
35 Downloads (Pure)

On the Use of Model Checking Techniques for Quantitative Dependability Evaluation

Haverkort, B. R. H. M., Hermanns, H. & Katoen, J. P., 2000, p. 228-237. 10 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File