Personal profile
External positions
Guest Researcher, National Cyber Security Centre (NCSC-NL)
1 Mar 2023 → 28 Feb 2025
Keywords
- QA76 Computer software
- vulnerability management
- vulnerability disclosure
- computer ethics
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue
van Hove, K., van der Ham, J. & van Rijswijk - Deij, R. M., 23 Feb 2026, (E-pub ahead of print/First online) In: Digital Threats.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile1 Downloads (Pure) -
90th Minute: A First Look to Collateral Damages and Efficacy of the Italian Piracy Shield
Sommese, R., Sperotto, A., Prado, A., van der Ham, J. & Affinito, A., 22 Dec 2025, 2025 21th International Conference on Network and Service Management (CNSM). Cerroni, W., Tortonesi, M., Borsatti, D., Schaeffer-Filho, A. E., Tuncer, D., Francois, J. & Husák, M. (eds.). IEEE, 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile1524 Downloads (Pure) -
Introduction to the Special Issue on Incident Response
Perl, S., Vos, J. V. D.H.-D. & Schreck, T., 31 Mar 2025, In: Digital Threats: Research and Practice. 6, 1, 3 p., 1.Research output: Contribution to journal › Editorial › Academic › peer-review
Open AccessFile25 Downloads (Pure) -
Vulnerability Disclosure or Notification? Best Practices for Reaching Stakeholders at Scale
Chen, T.-H. & Vos, J. V. D.H.-D., 20 Nov 2025, (E-pub ahead of print/First online) In: Digital Threats: Research and Practice.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile1 Downloads (Pure) -
A First Look at User-Installed Residential Proxies From a Network Operator's Perspective
Khan, E., Chiapponi, E., Verkleij, M., Sperotto, A., van Rijswijk - Deij, R. M. & van der Ham, J., 31 Dec 2024, 20th International Conference on Network and Service Management (CNSM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile2 Link opens in a new tab Citations (Scopus)158 Downloads (Pure)
Prizes
-
Best Paper Award CNSM 2025
Sommese, R. (Recipient), Sperotto, A. (Recipient), Prado, A. (Recipient), van der Ham - de Vos, J. (Recipient) & Affinito, A. (Recipient), 31 Oct 2025
Prize
-
Runner-Up Dutch Cybersecurity Research Paper Award
Reidsma, D. (Recipient), van der Ham - de Vos, J. (Recipient) & Continella, A. (Recipient), 22 Jan 2026
Prize
Activities
- 2 Editorial work
-
Digital Threats (Journal)
van der Ham, J. (Editor)
Mar 2020Activity: Publication peer-review and editorial work › Editorial work
-
Digital Threats (Journal)
van der Ham, J. (Editor)
1 Mar 2018 → …Activity: Publication peer-review and editorial work › Editorial work
Press/Media
-
ICT-organisatie van justitie niet één, maar twee keer gehackt
14/03/26
1 Media contribution
Press/Media: Expert Comment
-
Programmeur gluurt per ongeluk bij duizenden huizen naar binnen via slecht beveiligde robotstofzuigers
25/02/26
1 Media contribution
Press/Media: Expert Comment
-
Politie liet ondanks waarschuwing deur open voor Russische hackers
23/01/26
1 Media contribution
Press/Media: Public Engagement Activities
-
Thuiswerksoftware van overheid zo lek als een mandje.
17/01/26
1 Media contribution
Press/Media: Public Engagement Activities
-
Computerstoring leidt wereldwijd tot problemen
19/07/24
1 Media contribution
Press/Media: Public Engagement Activities