Review Research 2021

Computer Science

DACS



Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015

2020

Article (contribution to journal)


Bayhan, S., Estefanía Coronado, Roberto Riggio, & Anatolij Zubow (2020). User-AP Association Management in Software-Defined WLANs. IEEE transactions on network and service management, 17(3), 1838-1852. [9115672]. https://doi.org/10.1109/TNSM.2020.3001869


Choi, K. N., Kolamunna, H., Uyanwatta, A., Thilakarathna, K., Seneviratne, S. , Holz, R., Hassan, M., & Zomaya, A. (2020). LoRadar: LoRa Sensor Network Monitoring through Passive Packet Sniffing. Computer communication review, 50(4). https://doi.org/10.1145/3431832.3431835


Hesselman, C., Grosso, P. , Holz, R., Kuipers, F., Xue, J. H. , Jonker, M., de Ruiter, J. , Sperotto, A. , van Rijswijk-Deij, R., Moura, G. C. M. , Pras, A., & de Laat, C. (2020). A Responsible Internet to Increase Trust in the Digital World. Journal of network and systems management, 28(4), 882-922. https://doi.org/10.1007/s10922-020-09564-7

Hesselman, C., Kaeo, M., Chapin, L., Claffy, K., Seiden, M., McPherson, D., Piscitello, D., McConachie, A., April, T., Latour, J., & Rasmussen, R. (2020). The DNS in IoT: Opportunities, Risks, and Challenges. IEEE internet computing, 24(4), 23-32. [9133283]. https://doi.org/10.1109/MIC.2020.3005388

Holz, R., Hiller, J., Amann, J., Razaghpanah, A., Jost, T., Vallina-Rodriguez, N., & Hohlfeld, O. (2020). Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization. Computer communication review, 50(3), 3-11. https://doi.org/10.1145/3411740.3411742

Macnish, K. , & van der Ham, J. (2020). Ethics in cybersecurity research and practice. Technology in society, 63, [101382]. https://doi.org/10.1016/j.techsoc.2020.101382


Narayanan, A., Sousa de Sena, A., Gutierrez-Rojas, D., Carrillo Melgarejo, D., Hussain, H. M., Ullah, M. , Bayhan, S., & Nardelli, P. H. J. (2020). Key Advances in Pervasive Edge Computing for Industrial Internet of Things in 5G and Beyond. IEEE Access, 8, 206734-206754. https://doi.org/10.1109/ACCESS.2020.3037717


van Dam, T. J., Neumann, N. M. P., Phillipson, F. , & van den Berg, H. (2020). Hybrid Helmholtz machines: a gate-based quantum circuit implementation. Quantum Information Processing, 19(6), [174]. https://doi.org/10.1007/s11128-020-02660-2

van der Toorn, O. I. , & Sperotto, A. (2020). Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats. Digital Threats: Research and Practice, 1(1), [4]. https://doi.org/10.1145/3373639

Conference contribution


Abeywardena, K., Zhao, J., Brent, L., Seneviratne, S. , & Holz, R-G. (2020). Triplet Mining-based Phishing Webpage Detection. In Local Computer Networks IEEE.

Ceron, J. M., Scholten, C. , Pras, A. , & Santanna, J. (2020). MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification. In Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence [9110336] (2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110336

Chandramohan, A. , & Heijenk, G. (2020). Modelling V2V message generation rates in a highway environment. In 2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) [9253392] IEEE. https://doi.org/10.1109/WiMob50308.2020.9253392

Daniel Happ , & Bayhan, S. (2020). On the Impact of Clustering for IoT Analytics and Message Broker Placement across Cloud and Edge. In EdgeSys '20: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking (pp. 43-48). ACM Publishing. https://doi.org/10.1145/3378679.3394538

Dietz, C., Dreo, G. , Sperotto, A. , & Pras, A. (2020). Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence [9110332] (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110332

Estefanía Coronado, Abin Thomas , Bayhan, S., & Roberto Riggio (2020). aiOS: An Intelligence Layer for SD-WLANs. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020): Management in the Age of Softwarization and Artificial Intelligence [9110260] (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110260


Gawlowicz, P., Zubow, A. , & Bayhan, S. (2020). Demo Abstract: Cross-technology communication between LTE-U/LAA and WiFi. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2020 (pp. 1272-1273). [9162587] IEEE. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162587

Gawlowicz, P., Zubow, A. , Bayhan, S., & Wolisz, A. (2020). Punched Cards over the Air: Cross-Technology Communication Between LTE-U/LAA and WiFi. In 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) IEEE. https://doi.org/10.1109/WoWMoM49955.2020.00058

Holz, R., Perino, D., Varvello, M., Amann, J. , Continella, A., Evans, N., Leontiadis, I., Natoli, C., & Scheitle, Q. (2020). A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA) IEEE.

Jonker, M. , Sperotto, A. , & Pras, A. (2020). DDoS Mitigation: A Measurement-Based Approach. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020) (pp. 1-6). (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110320

Lastdrager, E. , Hesselman, C., Jansen, J., & Davids, M. (2020). Protecting Home Networks from Insecure IoT Devices. In Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020 [9110419] IEEE. https://doi.org/10.1109/NOMS47738.2020.9110419

Lee, H., Gireesh, A. , van Rijswijk - Deij, R., Kwon, T., & Chung, T. (2020). A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email. In Proceedings of the 29th USENIX Security Symposium (pp. 613-630). (Proceedings of the 29th USENIX Security Symposium). USENIX. https://www.usenix.org/conference/usenixsecurity20/presentation/lee-hyeonmin

Meijerink, B. , & Heijenk, G. (2020). Infrastructure Support for Contention-Based Forwarding. In D. Cabric, O. Altintas, T. Leinmueller, H. Zhang, & T. Higuchi (Eds.), 2019 IEEE Vehicular Networking Conference, VNC 2019 [9062795] (IEEE Vehicular Networking Conference, VNC; Vol. 2019-December). IEEE Computer Society Press. https://doi.org/10.1109/VNC48660.2019.9062795

Mohan, N., Corneo, L., Zavodovski , A. , Bayhan, S., Wong, W., & Kangasharju, J. (2020). Pruning Edge Research with Latency Shears. In B. Zhao, & H. Zheng (Eds.), HotNets'20: The 19th ACM Workshop on Hot Topics in Networks (pp. 182-189). ACM Publishing. https://dl.acm.org/doi/10.1145/3422604.3425943

Moura, G. C. M. , Hesselman, C., Schaapman, G., Boerman, N., & De Weerdt, O. (2020). Into the DDoS maelstrom: A longitudinal study of a scrubbing service. In 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 (pp. 550-558). [9229733] IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00081

Müller, M., Toorop, W., Chung, T., Jansen, J. , & van Rijswijk-Deij, R. (2020). The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle. In IMC '20: Proceedings of the 20th ACM Internet Measurement Conference (pp. 295-308). ACM Publishing. https://doi.org/10.1145/3419394.3423638

Rodday, N. M., van Baaren, R. , Hendriks, L. , van Rijswijk - Deij, R. M. , Pras, A., & Dreo Rodosek, G. (2020). Evaluating RPKI ROV Identification Methodologies in Automatically Generated Mininet Topologies. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '20) (pp. 530-531). ACM SIGCOMM. https://doi.org/10.1145/3386367.3431669

Sommese, R. , Bertholdo, L. M., Akiwate, G. , Jonker, M. , van Rijswijk - Deij, R. M., Dainotti, A., Claffy, K. , & Sperotto, A. (2020). MAnycast2 - Using Anycast to Measure Anycast: Challenges and Opportunities. In IMC '20: Proceedings of the 20th ACM Internet Measurement Conference (pp. 456-463). ACM Publishing. https://doi.org/10.1145/3419394.3423646

Sommese, R. , Jonker, M. , van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C. , & Sperotto, A. (2020). The Forgotten Side of DNS: Orphan and Abandoned Records. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 538-543). [9229781] (Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020). IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00079

Sommese, R., Moura, G. C. M. , Jonker, M. , van Rijswijk-Deij, R., Dainotti, A., Claffy, K. C. , & Sperotto, A. (2020). When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. In A. Sperotto, A. Dainotti, & B. Stiller (Eds.), Passive and Active Measurement: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020. Proceedings (pp. 175-189). (Lecture Notes in Computer Science; Vol. 12048). Springer Heidelberg. https://doi.org/10.1007/978-3-030-44081-7_11

Soro, F., Allegretta, M. , Drago, I., Mellia, M. , & Bertholdo, L. M. (2020). Sensing the Noise: Uncovering Communities in Darknet Traffic. In 2020 Mediterranean Communication and Computer Networking Conference (MedComNet) IEEE. https://doi.org/10.1109/MedComNet49392.2020.9191555

Sperotto, A. , Steinberger, J., Baier, H. , & Pras, A. (2020). Distributed DDoS Defense: A collaborative Approach at Internet Scale. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020) (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110300

Toro-Betancur, V. , Bayhan, S., Gawlowicz, P., & Di Francesco, M. (2020). CTC-CEM: Low-Latency Cross-Technology Channel Establishment with Multiple Nodes. In 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) https://doi.org/10.1109/WoWMoM49955.2020.00032

Wabeke, T., Moura, G. C. M., Franken, N. , & Hesselman, C. (2020). Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD. In A. Sperotto, A. Dainotti, & B. Stiller (Eds.), Passive and Active Measurement - 21st International Conference, PAM 2020, Proceedings (pp. 158-174). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12048 LNCS). Springer Singapore. https://doi.org/10.1007/978-3-030-44081-7_10

Wan, G., Izhikevich, L., Adrian, D., Yoshioka, K. , Holz, R., Rossow, C., & Durumeric, Z. (2020). On the origin of scanning: the impact of location on Internet-wide scans. In IMC '20: Proceedings of the ACM Internet Measurement Conference (pp. 661-679). ACM SIGCOMM. https://doi.org/10.1145/3419394.3424214

Yazdani, R. , van der Toorn, O. , & Sperotto, A. (2020). A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS & PW) (pp. 559-564). IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00082

Zubow, A. , Bayhan, S., Gawlowicz, P., & Dressler, F. (2020). DeepTxFinder: Multiple Transmitter Localization by Deep Learning in Crowdsourced Spectrum Sensing. In 2020 29th International Conference on Computer Communications and Networks (ICCCN) https://doi.org/10.1109/ICCCN49398.2020.9209727

de Vries, W. B., Aljammaz, S. , & van Rijswijk - Deij, R. M. (2020). Global-Scale Anycast Network Management with Verfploeter. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020) [9110449] (IEEE/IFIP Network Operations and Management Symposium (NOMS); Vol. 2020). IEEE. https://doi.org/10.1109/NOMS47738.2020.9110449

van der Toorn, O. , van Rijswijk-Deij, R., Fiebig, T., Lindorfer, M. , & Sperotto, A. (2020). TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) [9229819] IEEE. https://doi.org/10.1109/EuroSPW51379.2020.00080

Editorial


Holz, R., Mellia, M., Bonaventure, O., Haddadi, H., Caesar, M., Gorinsky, S., Antichi, G., Camp, J., Claffy, K., Raman, B. , Sperotto, A., Vianna, A., & Uhlig, S. (2020). Update on ACM SIGCOMM CCR reviewing process: Towards a more open review process. Computer communication review, 50(3), 55-56. https://doi.org/10.1145/3411740.3411748

Misa, C., Guse, D., Hohlfeld, O., Durairajan, R. , Sperotto, A., Dainotti, A., & Rejaie, R. (2020). Lessons learned organizing the PAM 2020 virtual conference. Computer communication review, 50(3), 46-54. https://doi.org/10.1145/3411740.3411747

Paper


Akiwate, G. , Jonker, M. , Sommese, R., Foster, I., Voelker, G. M., Savage, S., & Claffy, K. (2020). Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. 281-294. Paper presented at ACM Internet Measurement Conference, IMC 2020, . https://doi.org/10.1145/3419394.3423623

Bertholdo, L. M. , Ceron, J. M., Granville, L. Z., Moura, G. C. M. , Hesselman, C. , & van Rijswijk-Deij, R. (2020). BGP Anycast Tuner: Intuitive Route Management for Anycast Services. Paper presented at 16th International Conference on Network and Service Management, Izmir, Turkey.

Choi, K. N., Kolamunna, H., Thilakarathna, K., Seneviratne, S. , Holz, R., Hassan, M., & Zomaya, A. (2020). Passive Packet Sniffing Tools for Enabling Wireless Situational Awareness. Paper presented at Cyber Defence Next Generation Technology & Science Conference 2020 (Postponed), Brisbane, Australia.

Working paper

2019

Article (contribution to journal)



Bajpai, V., Kellerer, W., Smaragdakis, G., Brunstrom, A. , Pras, A., Wählisch, M., Feldmann, A., Schulzrinne, H., & Wehrle, K. (2019). The dagstuhl beginners guide to reproducibility for experimental networking research. Computer communication review, 49(1), 24-30. https://doi.org/10.1145/3314212.3314217


Ceron, J. M., Steding-Jessen, K., Hoepers, C., Granville, L. Z., & Margi, C. B. (2019). Improving IoT Botnet Investigation Using an Adaptive Network Layer. Sensors (Switzerland), 19(3), [727]. https://doi.org/10.3390/s19030727

Lutscher, P. M., Weidmann, N. B., Roberts, M. E. , Jonker, M., King, A., & Dainotti, A. (2019). At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes. Journal of Conflict Resolution, 64(2-3), 373-401. https://doi.org/10.1177/0022002719861676


Miano, S., Doriguzzi-Corin, R., Risso, F., Siracusa, D. , & Sommese, R. (2019). Introducing smartnics in server-based data plane processing: The ddos mitigation use case. IEEE Access, 7, 107161-107170. [8789414]. https://doi.org/10.1109/ACCESS.2019.2933491

Müller, M., Chung, T., Mislove, A. , & van Rijswijk-Deij, R. (2019). Rolling with Confidence: Managing the Complexity of DNSSEC Operations. IEEE transactions on network and service management, 16(3), 1199-1211. https://doi.org/10.1109/TNSM.2019.2916176


Unlu, B. , Ozceylan, B., & Baykal, B. (2019). DIVVY: An Efficient Shared Cell Scheduling Method and Algorithm for 6TiSCH-Based IoT Networks. IEEE Transactions on Green Communications and Networking, 3(1), 170-179. [8527560]. https://doi.org/10.1109/TGCN.2018.2879873


Conference contribution



Chromik, J. J. , Remke, A. K. I. , Haverkort, B. R. H. M., & Geist, G. (2019). A Parser for Deep Packet Inspection of IEC-104: A Practical Solution for Industrial Applications. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track IEEE. https://doi.org/10.1109/DSN-Industry.2019.00008

Chung, T., Aben, E., Bruijnzeels, T., Chandrasekaran, B., Choffnes, D., Levin, D., Maggs, B., Mislove, A. , van Rijswijk - Deij, R. M., Rula, J., & Sullivan, N. (2019). RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. In IMC '19: ACM Internet Measurement Conference, Amsterdam Netherlands, October, 2019 (pp. 406-419). Association for Computing Machinery (ACM). https://doi.org/10.1145/3355369.3355596

Dietz, C., Castro, R. L. , Steinberger, J., Wilczak, C., Antzek, M. , Sperotto, A. , & Pras, A. (2019). IoT-Botnet Detection and Isolation by Access Routers. In F. Idzikowski, A. Kliks, M. Rodziewicz, D. Tuncer, & P. Chemouil (Eds.), 2018 9th International Conference on the Network of the Future, NOF 2018 (pp. 88-95). [8598138] IEEE. https://doi.org/10.1109/NOF.2018.8598138

Müller, M., Thomas, M., Wessels, D., Hardaker, W., Chung, T., Toorop, W. , & Rijswijk-Deij, R. V. (2019). Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. In IMC '19: Proceedings of the Internet Measurement Conference (pp. 1-14). Association for Computing Machinery (ACM). https://doi.org/10.1145/3355369.3355570

Ozceylan, B. , Haverkort, B. R. H. M. , de Graaf, M. , & Gerards, M. E. T. (2019). A Generic Processor Temperature Estimation Method. In M. Rencz, L. Codecasa, & A. Poppe (Eds.), 2019 25th International Workshop on Thermal Investigations of ICs and Systems (THERMINIC) IEEE. https://doi.org/10.1109/THERMINIC.2019.8923636

Roddav, N., Streit, K., Rodosek, G. D. , & Pras, A. (2019). On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6. In 2019 International Symposium on Networks, Computers and Communications, ISNCC 2019 [8909187] IEEE. https://doi.org/10.1109/ISNCC.2019.8909187

Soro, F. , Drago, I., Trevisan, M., Mellia, M. , Ceron, J. , & Santanna, J. J. (2019). Are darknets all the same? On darknet visibility for security monitoring. In 25th IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019 [8847113] (IEEE Workshop on Local and Metropolitan Area Networks; Vol. 2019-July). IEEE Computer Society Press. https://doi.org/10.1109/LANMAN.2019.8847113

de Vries, W. B., Scheitle, Q. , Müller, M., Toorop, W., Dolmans, R. , & van Rijswijk-Deij, R. (2019). A First Look at QNAME Minimization in the Domain Name System. In D. Choffnes, & M. Barcellos (Eds.), Passive and Active Measurement: 20th International Conference, PAM 2019, Proceedings (pp. 147-160). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11419 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-15986-3_10

van Rijswijk - Deij, R., Rijnders, G. , Bomhoff, M., & Allodi, L. (2019). Privacy-Conscious Threat Intelligence Using DNSBloom. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019 (pp. 98-106). [8717908] IEEE. https://ieeexplore.ieee.org/document/8717908

Poster


Abhishta, A. , Joosten, R. , Jonker, M., Kamerman, W. , & Nieuwenhuis, L. J. M. (2019). Collecting Contextual Information About a DDoS Attack Event Using Google Alerts. Poster session presented at 40th IEEE Symposium on Security and Privacy 2019, San Francisco, United States. https://www.ieee-security.org/TC/SP2019/posters/hotcrp_sp19posters-final32.pdf

2018

Article (contribution to journal)




Badonnel, R., Koch, R., Drasar, M. , Pras, A., Eiseler, V., Stiemert, L., Seeber, S., Tuncer, D., Charalambides, M., & Rodosek, G. D. (2018). Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity. Journal of network and systems management, 26(4), 1101-1109. https://doi.org/10.1007/s10922-018-9460-5


Hofstede, R. , Pras, A. , Sperotto, A., & Dreo Rodosek, G. (2018). Flow-Based Compromise Detection: Lessons Learned. IEEE security & privacy, 16(1), 82-89. [8283485]. https://doi.org/10.1109/MSP.2018.1331021

Hooft, J. V. D., Claeys, M., Bouten, N., Wauters, T., Schönwälder, J. , Pras, A., Stiller, B., Charalambides, M., Badonnel, R., Serrat, J., Santos, C. R. P. D., & Turck, F. D. (2018). Updated Taxonomy for the Network and Service Management Research Field. Journal of network and systems management, 26(3), 790-808. https://doi.org/10.1007/s10922-017-9443-y

Nies, G., Stenger, M., Krčál, J. , Hermanns, H., Bisgaard, M., Gerhardt, D. , Haverkort, B. , Jongerden, M. , Larsen, K. G., & Wognsen, E. R. (2018). Mastering operational limitations of LEO satellites – The GOMX-3 approach. Acta astronautica, 151, 726-735. https://doi.org/10.1016/j.actaastro.2018.04.040



Scheitle, Q., Chung, T., Hiller, J., Gasser, O., Naab, J. , van Rijswijk - Deij, R. M., Hohlfeld, O. , Holz, R., Choffnes, D., Mislove, A., & Carle, G. (2018). A First Look at Certification Authority Authorization (CAA). Computer communication review, 48(2), 11-23. https://doi.org/10.1145/3213232.3213235


Conference contribution




Chilipirea, C., Dobre, C. , Baratchi, M. , & van Steen, M. R. (2018). Identifying movements in noisy crowd analytics data. In 19th International Conference on Mobile Data Management (MDM) (pp. 161-166). IEEE. https://doi.org/10.1109/MDM.2018.00033

Chromik, J. J. , Haverkort, B. R. H. M. , Remke, A. K. I., Pilch, C., Brackmann, P., Duhme, C., Everinghoff, F., Giberlein, A., Teodorowicz, T., & Wieland, J. (2018). Context-aware local Intrusion Detection in SCADA systems: a testbed and two showcases. In 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm) IEEE. https://doi.org/10.1109/SmartGridComm.2017.8340672

Chromik, J. J. , Remke, A. , & Haverkort, B. R. (2018). Bro in SCADA: dynamic intrusion detection policies based on a system model. In 5th International Symposium for ICS&SCADA Cyber Security Research (ICS-CSR 2018) (pp. 112-121). BCS Learning & Development Ltd..

De Vries, W. B., Van Rijswijk-Deij, R. , De Boer, P. T. , & Pras, A. (2018). Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. In 2018 Network Traffic Measurement and Analysis Conference (TMA) [8506536] IEEE. https://doi.org/10.23919/TMA.2018.8506536

Ferling, B. , Chromik, J. J. , Caselli, M. , & Remke, A. K. I. (2018). Intrusion Detection for sequence-based attacks with reduced traffic models. In R. German, K-S. Hielscher, & U. R. Krieger (Eds.), Measurement, Modelling and Evaluation of Computing Systems: 19th International GI/ITG Conference, MMB 2018, Erlangen, Germany, February 26-28, 2018, Proceedings (pp. 53-67). Springer. https://doi.org/10.1007/978-3-319-74947-1_4

Gasser, O., Lone, Q., Scheitle, Q., Korczyński, M., Foremski, P., Strowes, S. D. , Hendriks, L., & Carle, G. (2018). Clusters in the expanse: Understanding and unbiasing IPv6 Hitlists. In IMC 2018 - Proceedings of the Internet Measurement Conference (pp. 364-378). Association for Computing Machinery (ACM). https://doi.org/10.1145/3278532.3278564

Hinze, N., Nawrocki, M. , Jonker, M., Dainotti, A., Schmidt, T. C., & Waehlisch, M. (2018). On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP. In SIGCOMM '18 Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos (pp. 57-59) https://doi.org/10.1145/3234200.3234209

Jonker, M. , Pras, A., Dainotti, A. , & Sperotto, A. (2018). A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. In Proceedings of the ACM Internet Measurement Conference 2018 (pp. 457-463) https://doi.org/10.1145/3278532.3278571

Kerkers, M. , Chromik, J. J. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2018). A Tool for Generating Automata of IEC60870-5-104 Implementations. In R. German, K-S. Hielscher, & U. R. Krieger (Eds.), Measurement, Modelling and Evaluation of Computing Systems: 19th International GI/ITG Conference, MMB 2018, Erlangen, Germany, February 26-28, 2018, Proceedings (pp. 307-311). (Lecture notes in computer science; Vol. 10740). https://doi.org/10.1007/978-3-319-74947-1_23

Meijerink, B. J. , & Heijenk, G. (2018). Implementation and Evaluation of Distributed Geographical Routing. In K. R. Chowdhury, M. Di Felice, I. Matta, & B. Sheng (Eds.), Wired/Wireless Internet Communications: 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedings (pp. 121-133). (Lecture notes in computer science; Vol. 10866). https://doi.org/10.1007/978-3-030-02931-9_10

Ojanperä, T. , van den Berg, H., IJntema, W. , de Souza Schwartz, R., & Djurica, M. (2018). Application Synchronization among Multiple MEC Servers in Connected Vehicle Scenarios. In 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018: Proceedings [8691039] (IEEE Vehicular Technology Conference; Vol. 2018). IEEE. https://doi.org/10.1109/VTCFall.2018.8691039

Postema, B. F., Van Damme, T., De Persis, C., Tesi, P. , & Haverkort, B. R. H. M. (2018). Combining Energy Saving Techniques in Data Centres using Model-Based Analysis. In ICPE'18. Companion of the 2018 ACM/SPEC International Conference on Performance Engineering (pp. 67-72). ACM Press. https://doi.org/10.1145/3185768.3186310

Rietberg, E., D'Acunto, L., Kooij, R. , & van den Berg, H. (2018). Analyzing information availability in ICN under link failures. In 32nd International Conference on Information Networking, ICOIN 2018 (pp. 199-204). (International Conference on Information Networking (ICOIN); Vol. 2018). IEEE Computer Society Press. https://doi.org/10.1109/ICOIN.2018.8343110


Van Den Berg, F., Garousi, V., Tekinerdogan, B. , & Haverkort, B. R. (2018). Designing cyber-physical systems with aDSL: A domain-specific language and tool support. In 2018 13th System of Systems Engineering Conference, SoSE 2018 (pp. 225-232). [8428770] IEEE. https://doi.org/10.1109/SYSOSE.2018.8428770

van den Berg, F. G. B., Hooman, J. , & Haverkort, B. R. H. M. (2018). A Domain-Specific Language and Toolchain for Performance Evaluation Based on Measurements. In R. German, K-S. Hielscher, & U. R. Krieger (Eds.), Measurement, Modelling and Evaluation of Computing Systems: 19th International GI/ITG Conference, MMB 2018, Erlangen, Germany, February 26-28, 2018, Proceedings (pp. 295-301). (Lecture Notes in Computer Science; Vol. 10740). Springer. https://doi.org/10.1007/978-3-319-74947-1_21

van der Toorn, O. I. , van Rijswijk, R. M., Geesink, B. , & Sperotto, A. (2018). Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains. In IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018 (pp. 1-9). IEEE. https://doi.org/10.1109/NOMS.2018.8406222

Paper


Kuhnert, K. , Steinberger, J., & Baier, H. (2018). Botnet detection and prevention in anonymous networks. Paper presented at 12th International Conference on Autonomous Infrastructure, Management and Security 2018, Munich, Germany.

Steinberger, J., Kuhnert, B. , Dietz, C., Ball, L. , Sperotto, A., Baier, H. , Pras, A., & Dreo Rodosek, G. (2018). DDoS Defense using MTD and SDN. Paper presented at 16th IEEE/IFIP Network Operations and Management Symposium 2018, Taipei, Taiwan, Province of China. https://doi.org/10.1109/NOMS.2018.8406221

Report


Habraken, M. M. P., Ahsmann, B., van den Akker , E., van Baars , G., Baartmans, R., Blankendaal, J., Bossert, R., Burghardt, P., Duisterwinkel, A., van Eijk , D., van den Eijnde , W., Endhoven, W., Gijsbers, G., Ten Have, K. , Haverkort, B. R. H. M., van der Horst, T., Jayawardhana, B., Jansson, M., Karelse, F., ... Thuis, B. (2018). Smart Industry roadmap: Onderzoeksagenda voor HTSM en ICT en routekaart voor de NWA. Smart Industry. https://www.smartindustry.nl/smart-industry-roadmap/

Special issue


Santanna, J. J., de Vries, J. , de O. Schmidt, R., Tuncer, D., Z. Granville, L. , & Pras, A. (2018). Booter list generation: The basis for investigating DDoS-for-hire websites. International journal of network management, 28(1), [e2008]. https://doi.org/10.1002/nem.2008

2017

Article (contribution to journal)




Haverkort, B. R., & Zimmermann, A. (2017). Smart Industry: How ICT Will Change the Game! IEEE internet computing, 21(1), 8-10. https://doi.org/10.1109/MIC.2017.22

Hofstede, R. , Jonker, M. , Sperotto, A. , & Pras, A. (2017). Flow-Based Web Application Brute-Force Attack and Compromise Detection. Journal of network and systems management, 25(4), 735-758. https://doi.org/10.1007/s10922-017-9421-4



Schönwälder, J., Friedman, T. , & Pras, A. (2017). Using networks to teach about networks (report on dagstuhl seminar #17112). Computer communication review, 47(3), 40-44. https://doi.org/10.1145/3138808.3138814




van der Ham, J. , & van Rijswijk, R. M. (2017). Ethics and Internet Measurements. Journal of Cyber Security and Mobility, 5(4), 287-308. [3]. https://doi.org/10.13052/jcsm2245-1439.543

Chapter


van den Berg, F. G. B. , Haverkort, B. R. H. M., & Hooman, J. (2017). iDSL: Automated Performance Evaluation of Service-Oriented Systems. In R. Langerak, & A. Rensink (Eds.), ModelEd, TestEd, TrustEd: Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday (Lecture Notes in Computer Science; Vol. 10500). Springer. https://doi.org/10.1007/978-3-319-68270-9_11

Conference contribution


Acciani, F. , Heijenk, G. , & Frasca, P. (2017). Achieving robust average consensus over wireless networks. In 2016 European Control Conference, ECC 2016 (pp. 555-560). [7810343] IEEE. https://doi.org/10.1109/ECC.2016.7810343

Baratchi, M. , Heijenk, G. , & van Steen, M. R. (2017). Spaceprint: a Mobility-based Fingerprinting Scheme for Spaces. In SIGSPATIAL '17: Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems [102] Association for Computing Machinery (ACM). https://doi.org/10.1145/3139958.3140009

Brugman, T. , Baratchi, M. , Heijenk, G. , & van Steen, M. (2017). Inferring the social-connectedness of locations from mobility data. In G. L. Ciampaglia, A. Mashhadi, & T. Yasseri (Eds.), Social Informatics: 9th International Conference, SocInfo 2017, Oxford, UK, September 13-15, 2017 (pp. 443-457). (Lecture Notes in Computer Science; Vol. 10540). Springer. https://doi.org/10.1007/978-3-319-67256-4_35

Chung, T. , van Rijswijk, R. M., Choffnes, D., Levin, D., Maggs, B., Mislove, A., & Wilson, C. (2017). Understanding the Role of Registrars in DNSSEC Deployment. In IMC '17: Proceedings of the 2017 Internet Measurement Conference (pp. 369-383). Association for Computing Machinery (ACM). https://doi.org/10.1145/3131365.3131373

Chung, T. , van Rijswijk-Deij, R., Chandrasekaran, B., Choffnes, D., Levin, D., Maggs, B., Mislove, A., & Wilson, C. (2017). A Longitudinal, End-to-End View of the DNSSEC Ecosystem. In Proceedings of the 26th USENIX Security Symposium: August 16–18, 2017 • Vancouver, BC, Canada (pp. 1307-1322). USENIX. https://www.usenix.org/node/203653

De Vries, W. B. , de Oliveira Schmidt, R., Hardaker, W., Heidemann, J. , de Boer, P-T. , & Pras, A. (2017). Broad and load-aware anycast mapping with Verfploeter. In IMC '17: Proceedings of the 2017 Internet Measurement Conference (pp. 477-488). Association for Computing Machinery (ACM). https://doi.org/10.1145/3131365.3131371

Gholibeigi, M., Sarrionandia, N. , Karimzadeh Motallebi Azar, M. , Baratchi, M. , van den Berg, H. L. , & Heijenk, G. (2017). Reliable vehicular broadcast using 5G device-to-device communication. In WMNC 2017: 10th IFIP Wireless and Mobile Networking Conference, 25-27 September 2017, Valencia (Spain) IEEE. https://doi.org/10.1109/WMNC.2017.8248846

Hendriks, L., Velan, P. , de O. Schmidt, R. , de Boer, P-T. , & Pras, A. (2017). Flow-based detection of IPv6-specific network layer attacks. In D. Tuncer, R. Koch, R. Badonne, & B. Stiller (Eds.), Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Proceedings (pp. 137-142). (Lecture Notes in Computer Science; Vol. 10356), (Lecture Notes in Computer Communication Networks and Telecommunications). Springer. https://doi.org/10.1007/978-3-319-60774-0_11


Hendriks, L. , de Boer, P-T. , & Pras, A. (2017). IPv6-specific misconfigurations in the DNS. In 2017 13th International Conference on Network and Service Management (CNSM) (International Conference on Network and Service Management Proceedings). IEEE. https://doi.org/10.23919/CNSM.2017.8256036

Hendriks, L. , de Oliveira Schmidt, R., van Rijswijk-Deij, R. , & Pras, A. (2017). On the potential of IPv6 open resolvers for DDoS attacks. In M. A. Kaafar, S. Uhlig, & J. Amann (Eds.), Passive and Active Measurement: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings (pp. 17-29). (Lecture Notes in Computer Science; Vol. 10176), (Lecture Notes in Computer Communication Networks and Telecommunications). Springer. https://doi.org/10.1007/978-3-319-54328-4_2

Jongerden, M. R. , & Haverkort, B. R. (2017). Battery Aging, Battery Charging and the Kinetic Battery Model: A First Exploration. In N. Bertrand, & L. Bortolussi (Eds.), Quantitative Evaluation of Systems: 14th International Conference, QEST 2017, Berlin, Germany, September 5-7, 2017, Proceedings (pp. 88-103). (Lecture Notes in Computer Science; Vol. 10503). Springer. https://doi.org/10.1007/978-3-319-66335-7_6

Jonker, M. , & Sperotto, A. (2017). Measuring exposure in DDoS protection services. In 2017 13th International Conference on Network and Service Management (CNSM) IEEE. https://doi.org/10.23919/CNSM.2017.8255991

Karimzadeh Motallebi Azar, M., Valtulina, L. , Pras, A., Liebsch, M., & Taleb, T. (2017). Double-NAT Based Mobility Management for Future LTE Networks. In IEEE Wireless Communications and Networking Conference (WCNC 2017) IEEE. https://doi.org/10.1109/WCNC.2017.7925948


Karimzadeh, M., Valtulina, L. , Berg, H. V. D. , Pras, A., Ortiz, P. G., & Sadre, R. (2017). MultiPath TCP to support user's mobility in future LTE network. In 10th IFIP Wireless and Mobile Networking Conference, WMNC 2017, Valencia, Spain, September 25-27, 2017 IEEE. https://doi.org/10.1109/WMNC.2017.8248845

Kuhnert, B. , Steinberger, J., Baier, H. , Sperotto, A. , & Pras, A. (2017). Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape. In P. Lorenz, & J. Trienekens (Eds.), ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services (pp. 37). IARIA/Thinkmind. http://thinkmind.org/index.php?view=article&articleid=accse_2017_3_30_80028

Meijerink, B. J. , Baratchi, M. , & Heijenk, G. (2017). Evaluation of geocast routing trees on random and actual networks. In Y. Koucheryavy, L. Mamatas, I. Matta, A. Ometov, & P. Papadimitriou (Eds.), Wired/Wireless Internet Communications: 15th IFIP WG 6.2 International Conference, WWIC 2017, Proceedings (pp. 127-142). (Lecture Notes in Computer Science; Vol. 10372). Springer. https://doi.org/10.1007/978-3-319-61382-6_11

Müller, M. , Moura, G. G. M. , de O. Schmidt, R., & Heidemann, J. (2017). Recursives in the wild: engineering authoritative DNS servers. In IMC '17: Proceedings of the 2017 Internet Measurement Conference (pp. 489-495). Association for Computing Machinery (ACM). https://doi.org/10.1145/3131365.3131366

Postema, B. F. , & Haverkort, B. R. (2017). Specification of data centre power management strategies. In Proceedings of the 8th International Conference on Future Energy Systems, e-Energy 2017 (pp. 284-289). Association for Computing Machinery (ACM). https://doi.org/10.1145/3077839.3084025

Ruijters, E. J. J. , Reijsbergen, D. P. , de Boer, P-T. , & Stoelinga, M. I. A. (2017). Rare Event Simulation for Dynamic Fault Trees. In S. Tonetta, E. Schoitsch, & F. Bitsch (Eds.), Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings (pp. 20-35). (Lecture Notes in Computer Science; Vol. 10488). Springer. https://doi.org/10.1007/978-3-319-66266-4_2

Santanna, J. J. , Schmidt, R. D. O., Tuncer, D., De Vries, J., Granville, L. Z. , & Pras, A. (2017). Booter blacklist: Unveiling DDoS-for-hire websites. In S. Keith-Marsoun, C. R. P. dos Santos, N. Limam, M. Cheriet, M. F. Zhani, & O. Festor (Eds.), 2016 12th International Conference on Network and Service Management, CNSM 2016 and Workshops, 3rd International Workshop on Management of SDN and NFV, ManSDN/NFV 2016, and International Workshop on Green ICT and Smart Networking, GISN 2016 (pp. 144-152). [7818410] IEEE. https://doi.org/10.1109/CNSM.2016.7818410

Zhao, Z. , Karimzadeh Motallebi Azar, M., Braun, T. , Pras, A. , & van den Berg, H. L. (2017). Cloudified Mobility and Bandwidth Prediction in Virtualized LTE Networks. In IFIP/IEEE International Symposium on Integrated Network Management (IM 2017) IEEE. https://doi.org/10.23919/INM.2017.7987321

van der Kooij, S., Kempker, P. , van den Berg, H., & Bhulai, S. (2017). Optimal battery charging in smart grids with price forecasts. In 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017 [8086070] (IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT); Vol. 2017). IEEE. https://doi.org/10.1109/ISGT.2017.8086070

Paper


Acciani, F. , Frasca, P. , Heijenk, G. , & Stoorvogel, A. A. (2017). Using a linear gain to accelerate average consensus over unreliable networks. 3569 - 3574. Paper presented at 56th IEEE Conference on Decision and Control, CDC 2017, Melbourne, Australia. https://doi.org/10.1109/CDC.2017.8264183

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J. , Sperotto, A., & Trammell, B. (2017). Challenges with Reproducibility. 1-4. Paper presented at Reproducibility Workshop, Reproducibility 2017, Los Angeles, United States. https://doi.org/10.1145/3097766.3097767

Jonker, M., King, A., Krupp, J., Rossow, C. , Sperotto, A., & Dainotti, A. (2017). Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. 100-113. Paper presented at 2017 ACM Internet Measurement Conference, IMC 2017, London, United Kingdom. https://doi.org/10.1145/3131365.3131383

Sperotto, A. , van der Toorn, O. , & van Rijswijk, R. (2017). TIDE – Threat Identification using Active DNS Measurements. 65-67. Paper presented at Annual Conference of the ACM Special Interest Group on Data Communication, ACM SIGCOMM 2017, Los Angeles, United States. https://doi.org/10.1145/3123878.3131988

van Rijswijk-Deij, R., Chung, T., Choffnes, D., Mislove, A., & Toorop, W. (2017). The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover. 63-64. Paper presented at Annual Conference of the ACM Special Interest Group on Data Communication, ACM SIGCOMM 2017, Los Angeles, United States. https://doi.org/10.1145/3123878.3131987

PhD Thesis - Research external, graduation UT

2016

Abstract


Buijsrogge, A. , de Boer, P-T. , & Scheinhardt, W. R. W. (2016). Analysis of a state-independent change of measure for the G|G|1 tandem queue. 48-48. Abstract from European Conference on Queueing Theory 2016, Toulouse, France.

Steinberger, J. (Ed.), Kuhnert, B., Alavi, S. , Cardoso de Santanna, J. J. , Sperotto, A., Baier, H. , & Pras, A. (2016). Whom do we trust - Booters and SSL/TLS certificates. 14-14. Abstract from 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016), . http://www.gi-fg-sidar.de/spring/SIDAR-Reports/SIDAR-Report-SR-2016-01.pdf

Article (contribution to journal)


Attema, T. , van den Berg, H. L., Kempker, P. C., Worm, D., & van der Vliet-Hameeteman, C. (2016). Models for QoS-Aware Capacity Management in Cable Access Networks. Broadband (Cramlington), 38(2), 54-58. https://www.thescte.eu/broadband/vol38_no2_FHQE/files/assets/basic-html/page56.html









Raniery Paula dos Santos, C., Famaey, J., Schönwälder, J., Zambenedetti Granville, L. , Pras, A., & De Turck, F. (2016). Taxonomy for the Network and Service Management Research Field. Journal of network and systems management, 24(3), 764-787. https://doi.org/10.1007/s10922-015-9363-7



Chapter


Kolesnichenko, A. V. , Remke, A. K. I. , de Boer, P-T. , & Haverkort, B. R. H. M. (2016). Model checking two layers of mean-field models. In L. Fiondella, & A. Puliafito (Eds.), Principles of Performance and Reliability Modeling and Evaluation - Essays in Honor of Kishor Trivedi on his 70th Birthday (pp. 341-369). (Springer series in reliability engineering). Springer. https://doi.org/10.1007/978-3-319-30599-8_13

Reijsbergen, D. P. , de Boer, P-T. , & Scheinhardt, W. R. W. (2016). Hypothesis testing for rare-event simulation: limitations and possibilities. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10–14, 2016, Proceedings, Part I (pp. 16-26). (Lecture Notes in Computer Science; Vol. 9952). Springer. https://doi.org/10.1007/978-3-319-47166-2_2

Conference contribution


Ahmad, W. , Jongerden, M. R. , Stoelinga, M. I. A. , & van de Pol, J. C. (2016). Model checking and evaluating QoS of batteries in MPSoC dataflow applications via hybrid automata. In Proceedings of the 16th International Conference on Application of Concurrency to System Design, ACSD 2016 (pp. 114-123). IEEE Computer Society. https://doi.org/10.1109/ACSD.2016.18

Baratchi, M., Laarhuis, J. H., Teunissen, L., Ebben, P. , Teeuw, W. B. , & van Steen, M. R. (2016). Towards Decisive Garments for Heat Stress Risk Detection. In UbiComp '16 : Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (pp. 1095-1100). ACM Press. https://doi.org/10.1145/2968219.2972714

Buijsrogge, A. , de Boer, P-T. , & Scheinhardt, W. R. W. (2016). Analysis of a state-independent change of measure for the G|G|1 tandem queue. In 11th International Workshop on Rare Event Simulation, RESIM 2016 (pp. 1-3). EURANDOM.

Chromik, J. J. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2016). Improving SCADA security of a local process with a power grid model. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research, ICS-CSR 2016 (pp. 114-123). (Electronic Workshops in Computing). BCS Learning & Development Ltd.. https://doi.org/10.14236/ewic/ICS2016.13

Chromik, J. J. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2016). What's under the hood? Improving SCADA security with process awareness. In Proceedings of the Joint Workshop on Cyber-physical Security and Resilience in Smart Grids (CPSR-SG 2016) (pp. -). IEEE. https://doi.org/10.1109/CPSRSG.2016.7684100

Dietz, C. , Sperotto, A., Dreo, G. , & Pras, A. (2016). How to Achieve Early Botnet Detection at the Provider Level? In Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016 (pp. 142-146). (Lecture Notes in Computer Science; Vol. 9701). Springer. https://doi.org/10.1007/978-3-319-39814-3_15

Dietz, C. , Sperotto, A., Dreo, G. , & Pras, A. (2016). Monitoring the DNS Infrastructure for Proactive Botnet Detection. In Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016) (pp. 3-4). (SIDAR reports; Vol. SR-2016-01). Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI). http://www.gi-fg-sidar.de/spring/SIDAR-Reports/SIDAR-Report-SR-2016-01.pdf

Gholibeigi, M. , & Heijenk, G. (2016). Analysis of Multi-Hop Broadcast in Vehicular Ad Hoc Networks: a Reliability Perspective. In Proceedings of the Eight IEEE/IFIP International Wireless Days Conference, WD 2016 (pp. -). IEEE Communications Society. https://doi.org/10.1109/WD.2016.7461489

Gholibeigi, M. , Baratchi, M. , van den Berg, H. L. , & Heijenk, G. (2016). Towards Reliable Multi-Hop Broadcast in VANETs: An Analytical Approach. In Proceedings of the Eight IEEE International Vehicular networking Conference, VNC 2016 (pp. 166-173). IEEE Communications Society. https://doi.org/10.1109/VNC.2016.7835959

Gündogan, C., Passarelli, S., Hillmann, P. , Dietz, C., & Stiemert, L. (2016). A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic. In Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016) (pp. 9-10). (SIDAR reports; Vol. SR-2016-01). Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI). http://www.gi-fg-sidar.de/spring/SIDAR-Reports/SIDAR-Report-SR-2016-01.pdf

Hoogesteger, M. , de Oliveira Schmidt, R. , & Pras, A. (2016). ITSA: Internet Traffic Statistics Archive. In IEEE/IFIP Network Operations and Management Symposium (IEEE NOMS 2016) (pp. 995-996). IEEE Communications Society. https://doi.org/10.1109/NOMS.2016.7502940

Jongerden, M. R., Hüls, J. , Haverkort, B. R. H. M. , & Remke, A. K. I. (2016). Assessing the Cost of Energy Independence. In Proceedings of the IEEE International Energy Conference, ENERGYCON 2016 (pp. 1-6). IEEE Power & Energy Society. https://doi.org/10.1109/ENERGYCON.2016.7514139

Jonker, M. , Sperotto, A. , van Rijswijk, R. M. , Sadre, R. , & Pras, A. (2016). Measuring the Adoption of DDoS Protection Services. In Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016 (pp. 279-285). Association for Computing Machinery (ACM). https://doi.org/10.1145/2987443.2987487

Meijerink, B. J. , Baratchi, M. , & Heijenk, G. (2016). An Efficient Geographical Addressing Scheme for the Internet. In Proceedings of the 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016 (pp. 78-90). (Lecture Notes in Computer Science; Vol. 9674). Springer. https://doi.org/10.1007/978-3-319-33936-8_7


Morshed, S. , Baratchi, M. , Mandal, P. K. , & Heijenk, G. (2016). A Multi-channel Multiple Access Scheme Using Frequency Offsets - Modelling and Analysis. In Proceedings of the 12th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016 (pp. -). IEEE Computer Society. https://doi.org/10.1109/WiMOB.2016.7763230

Moscoviter, D. , Gholibeigi, M. , Meijerink, B. J., Kooijman, R., Krijger, P. , & Heijenk, G. (2016). Improving Spatial Indexing and Searching for Location-Based DNS Queries. In Proceedings of the 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016 (pp. 187-198). (Lecture Notes in Computer Science; Vol. 9674). Springer. https://doi.org/10.1007/978-3-319-33936-8_15

Nies, G., Stenger, M., Krčál, J. , Hermanns, H., Bisgaard, M., Gerhardt, D. , Haverkort, B. R. H. M. , Jongerden, M. R. , Larsen, K. G., & Wognsen, E. R. (2016). Mastering Operational Limitations of LEO Satellites - The GOMX-3 Approach. In Proceedings of the 23rd IAA Symposium on Small Missions at the 67th International Astronotical Congress, IAC 16/B4 (pp. 1-15). International Astronautical Federation. https://iafastro.directory/iac/archive/browse/IAC-16/B4/3/35160/

Piotrowski, K., Casaca, A. , Gerards, M. E. T. , Jongerden, M. R., Melo, F., Garrido, D., Geers, M., & Peralta, J. (2016). A hierarchical architecture for an energy management system. In The 10th Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion, MedPower 2016 (pp. 109). IET Digital Library. https://doi.org/10.1049/cp.2016.1098

Pras, A. , Cardoso de Santanna, J. J. , Steinberger, J. , & Sperotto, A. (2016). DDoS 3.0 - How Terrorists Bring Down the Internet. In A. K. I. Remke, & B. R. H. M. Haverkort (Eds.), Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016 (pp. 1-4). (Lecture Notes in Computer Science; Vol. 9629). Springer. https://doi.org/10.1007/978-3-319-31559-1_1

Rodday, N. M. , de Oliveira Schmidt, R. , & Pras, A. (2016). Exploring Security Vulnerabilities of Unmanned Aerial Vehicles. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (IEEE NOMS 2016) (pp. 993-994). IEEE Communications Society. https://doi.org/10.1109/NOMS.2016.7502939

Schot, N. J., Velthuis, P. J. E. , & Postema, B. F. (2016). Capabilities of Raspberry Pi 2 for Big Data and Video Streaming Applications in Data Centres. In A. K. I. Remke, A. K. I. Remke, B. R. H. M. Haverkort, & B. R. H. M. Haverkort (Eds.), Proceedings of the 18th International GI/ITG Conference on Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems (MMB & DFT 2016) (pp. 183-198). (Lecture Notes in Computer Science; Vol. 9629). Springer. https://doi.org/10.1007/978-3-319-31559-1_15

Sousa, B., Zhao, Z. , Karimzadeh Motallebi Azar, M., Palma, D., Fonseca, V., Simoes, P., Braun, T. , van den Berg, H. L. , Pras, A., & Cordeiro, L. (2016). Enabling a Mobility Prediction-aware Follow-Me Cloud Model. In Proceedings of the 41st IEEE Conference on Local Computer Networks (LNC 2016) (pp. 486-494). IEEE Computer Society. https://doi.org/10.1109/LCN.2016.77

Steinberger, J. , Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U. , Sperotto, A., Baier, H. , & Pras, A. (2016). "LUDO" - Kids playing Distributed Denial of Service. In J. Bergström, G. Hórvath, & B. Schofield (Eds.), Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016) (pp. 3). (European Journal of Higher Education IT; Vol. 2016-02). EUNIS Research and Analysis Initiative. http://www.eunis.org/download/TNC2016/03-paper-TNC2016-2.pdf

Steinberger, J., Kuhnert, B. , Sperotto, A., Baier, H. , & Pras, A. (2016). Collaborative DDoS Defense using Flow-based Security Event Information. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016 (pp. 516-552). IEEE Communications Society. https://doi.org/10.1109/NOMS.2016.7502852

Steinberger, J., Kuhnert, B. , Sperotto, A., Baier, H. , & Pras, A. (2016). In Whom Do We Trust - Sharing Security Events. In Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016) (pp. 111-124). (Lecture Notes in Computer Science; Vol. 9701). Springer. https://doi.org/10.1007/978-3-319-39814-3_11

de Vries, W. B. , de Oliveira Schmidt, R. , & Pras, A. (2016). Anycast and its potential for DDoS mitigation. In Management and Security in the Age of Hyperconnectivity. Proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016 (pp. 147-151). (Lecture Notes in Computer Science; Vol. 9701). Springer. https://doi.org/10.1007/978-3-319-39814-3_16

van den Berg, F. , Postema, B. F. , & Haverkort, B. R. H. M. (2016). Evaluating Load Balancing Policies for Performance and Energy-Efficiency. In Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2016 (pp. 98-117). (Electronic Proceedings in Theoretical Computer Science; Vol. 227). Open Publishing Association. https://doi.org/10.4204/EPTCS.227.7


Foreword/postscript


Badonnel, R., Koch, R., Drašar, M. , & Pras, A. (2016). Preface. In R. Badonnel, R. Koch, A. Pras, M. Drasar, & B. Stiller (Eds.), Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings (Vol. 9701, pp. V-VI). (Lecture notes in computer science; Vol. 9701). Springer.

Paper


Hendriks, L. , de Oliveira Schmidt, R. , Sadre, R., Bezerra, J. , & Pras, A. (2016). Assessing the quality of flow measurements from OpenFlow devices. 1-8. Paper presented at 8th International Workshop on Traffic Monitoring and Analysis, TMA 2016, . http://tma.ifip.org/2016/papers/tma2016-final34.pdf

Kolesnichenko, A. V. , Haverkort, B. R. H. M. , Remke, A. K. I. , & de Boer, P-T. (2016). Fitting a code-red virus spread model: An account of putting theory into practice. 39-46. Paper presented at 12th International Conference on the Design of Reliable Communication Networks (DRCN 2016), . https://doi.org/10.1109/DRCN.2016.7470833

Moura, G. M. , de O. Schmidt, R., Heidemann, J. , de Vries, W. B., Müller, M., Wei, L. , & Hesselman, C. (2016). Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. 255-270. Paper presented at 2016 ACM on Internet Measurement Conference, IMC 2016, . https://doi.org/10.1145/2987443.2987446

van Rijswijk, R. M. , Jonker, M. , & Sperotto, A. (2016). On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC. 258-262. Paper presented at 12th international Conference on Network and Service Management, CNSM 2016, Montreal, Canada. https://doi.org/10.1109/CNSM.2016.7818428

Poster



Steinberger, J. , Sperotto, A. , Pras, A., & Baier, H. (2016). Real-time DDoS Defense: A collaborative Approach at Internet Scale. Poster session presented at 6th PhD School on Traffic Monitoring and Analysis, TMA 2016, .

Report



Jongerden, M. R. , & Haverkort, B. R. H. M. (2016). Battery Aging and the Kinetic Battery Model. (CTIT technical report; No. TR-CTIT-2016-11). Centre for Telematics and Information Technology (CTIT).

Moura, G. C. M. , de O. Schmidt, R., Heidemann, J. , de Vries, W. B., Müller, M., Wei, L. , & Hesselman, C. (2016). Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. (Information Sciences Institute technical report; No. ISI-TR-2016-709b). University of Southern California.

de Oliveira Schmidt, R., Heidemann, J., & Kuipers, J. H. (2016). Anycast Latency: How Many Sites Are Enough? (Information Sciences Institute technical report; No. ISI-TR-2016-708). University of Southern California. https://ant.isi.edu/bib/Schmidt16a.html

2015

Article (contribution to journal)









Rossi, L., Badel, A., Bajko, M., Ballarino, A., Bottura, L. , Dhalle, M. M. J., Durante, M., Fazilleau, P., Fleiter, J., Goldacker, W., Haro, E., Kario, A., Kirby, G., Lorin, C. , van Nugteren, J., de Rijk, G. , Salmi, T., Senatore, C., Stenvall, A., ... Zangenberg, N. (2015). The EuCARD-2 Future Magnets European Collaboration for Accelerator-Quality HTS Magnets. IEEE transactions on applied superconductivity, 25(3), 4001007-. [4001007]. https://doi.org/10.1109/TASC.2014.2364215

Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P., & Celeda, P. (2015). Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014). Journal of network and systems management, 23(3), 794-802. https://doi.org/10.1007/s10922-015-9346-8

Sperotto, A. , Hofstede, R. J., Dainotti, A., Schmitt, C., & Dreo Rodosek, G. (2015). Editorial special issue on measure, detect and mitigate – challenges and trends in network security. International journal of network management, 25(5), 261-262. https://doi.org/10.1002/nem.1905




Chapter


Heijenk, G. , Klein Wolterink, W. , van den Berg, H. L. , & Karagiannis, G. (2015). Modeling and evaluation of location-based forwarding in vehicular networks. In W. Chen (Ed.), Vehicular communications and networks - Architectures, protocols, operation and deployment (pp. 151-169). Woodhead Publishing. https://doi.org/10.1016/B978-1-78242-211-2.00008-8

Conference contribution


Bosman, J. , van den Berg, H. L., & van der Mei, R. (2015). Real-Time QoS Control for Service Orchestration. In Proceedings of the 27th International Teletraffic Congress (ITC 2015) (pp. 152-158). IEEE Computer Society. https://doi.org/10.1109/ITC.2015.25

Bruintjes, T. , Kokkeler, A. B. J. , Karagiannis, G. , & Smit, G. J. M. (2015). Shaped pattern synthesis for equispaced linear arrays with non-isotropic antennas. In Proceedings of the 9th European Conference on Antennas and Propagation (EuCAP 2015) (pp. 26-30). IEEE Antennas & Propagation Society. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7228314

Cardoso de Santanna, J. J., Durban, R. , Sperotto, A. , & Pras, A. (2015). Inside Booters: an analysis on operational databases. In R. Badonnel, J. Xiao, S. Ata, F. De Turck, V. Groza, & C. R. P. dos Santos (Eds.), IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 432-440). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140320

Cardoso de Santanna, J. J. , van Rijswijk, R. M. , Hofstede, R. J. , Sperotto, A., Wierbosch, M., Zambenedetti Granville, L. , & Pras, A. (2015). Booters - an analysis of DDoS-as-a-Service attacks. In R. Badonnel, J. Xiao, S. Ata, F. De Turck, V. Groza, & C. R. P. dos Santos (Eds.), Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015 (pp. 243 -251). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140298

Chandra, K., Cao, Z. , Bruintjes, T., Prasad, R. V. , Karagiannis, G., Tangdiongga, E., van den Boom, H. P. A. , & Kokkeler, A. B. J. (2015). mCRAN: A radio access network architecture for 5G indoor ccommunications. In IEEE International Conference on Communications 2015 (pp. 306-311). IEEE Communications Society. http://eprints.eemcs.utwente.nl/secure2/26157/01/1570092085.pdf

Chromik, J. J. , Cardoso de Santanna, J. J. , Sperotto, A. , & Pras, A. (2015). Booter websites characterization: Towards a list of threats. In Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015 (pp. 445-458). Brazilian Computer Society (SBC). http://sbrc2015.ufes.br/wp-content/uploads/138741.1.pdf

Delamare, J., Bitachon, B., Peng, Z., Wang, Y. , Haverkort, B. R. H. M. , & Jongerden, M. R. (2015). Development of a Smart Grid Simulation Environment. In Proceedings of the 29th and 30th Annual UK Performance Engineering Workshops (UKPEW 2014) (pp. 19-29). (Electronic Notes in Theoretical Computer Science; Vol. 318). Elsevier. https://doi.org/10.1016/j.entcs.2015.10.017


Ellens, W., Kovács, P., Núñez-Queija, R. , & van den Berg, H. L. (2015). Routing policies for a partially observable two-server queueing system. In Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS 2015) (pp. 111-118). Association for Computing Machinery (ACM). https://doi.org/10.4108/eai.14-12-2015.2262697

Ghasemieh, H. , Haverkort, B. R. H. M. , Jongerden, M. R. , & Remke, A. K. I. (2015). Energy Resilience Modeling for Smart Houses. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015 (pp. 275-286). IEEE Computer Society. https://doi.org/10.1109/DSN.2015.31

Hendriks, L. , Sperotto, A. , & Pras, A. (2015). Characterizing the IPv6 Security Landscape by Large-Scale Measurements. In Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 (pp. 145-149). (Lecture Notes in Computer Science; Vol. 9122). Springer. https://doi.org/10.1007/978-3-319-20034-7_16


Hofstede, R. J. , & Hendriks, L. (2015). Unveiling SSHCure 3.0: Flow-based SSH Compromise Detection. In Proceedings of the International Conference on Networked Systems, NetSys 2015 (pp. -). Brandenburg University of Technology Cottbus-Senftenberg. https://www.netsys2015.com/wp-content/uploads/NetSys2015_Demo_Hofstede.pdf

Jonker, M. , & Sperotto, A. (2015). Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking. In S. Latré, M. Charalambides, J. François, C. Schmitt, & B. Stiller (Eds.), Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 (pp. 129-133). (Lecture Notes in Computer Science; Vol. 9122). Springer. https://doi.org/10.1007/978-3-319-20034-7_13

Jonker, M. , Hofstede, R. J. , Sperotto, A. , & Pras, A. (2015). Unveiling Flat Traffic on the Internet: An SSH Attack Case Study. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 270-278). IEEE Communications Society. https://doi.org/10.1109/INM.2015.7140301

Karimzadeh Motallebi Azar, M., Zhao, Z. , Hendriks, L. , de Oliveira Schmidt, R., la Fleur, S. , van den Berg, H. L. , Pras, A., Braun, T., & Julian Corici, M. (2015). Mobility and Bandwidth Prediction as a Service in Virtualized LTE Systems. In Proceedings of the 4th International Conference on Cloud Networking, CloudNet 2015 (pp. 132-138). IEEE. https://doi.org/10.1109/CloudNet.2015.7335295

Kempker, P. , van Dijk, N. M. , Scheinhardt, W. R. W. , van den Berg, H. L. , & Hurink, J. L. (2015). Optimization of charging strategies for electric vehicles in PowerMatcher-driven smart energy grids. In W. Knottenbelt, K. Wolter, A. Busic, M. Gribaudo, & P. Reinecke (Eds.), Proceedings 9th EAI International Conference on Performance Evaluation Methodologies and Tools, Valuetools 2015 (pp. 1-8). Association for Computing Machinery (ACM). https://doi.org/10.4108/eai.4-1-2016.151091

Meijerink, B. J. , & Heijenk, G. (2015). Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks. In Proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, Revised Selected Papers (pp. 341-354). (Lecture Notes in Computer Science; Vol. 9071). Springer. https://doi.org/10.1007/978-3-319-22572-2_25

Morshed, S. , & Heijenk, G. (2015). Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks. In Proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, Revised Selected Papers (pp. 396-410). (Lecture Notes in Computer Science; Vol. 9071). Springer. https://doi.org/10.1007/978-3-319-22572-2_29

Ossenbühl, S. , Steinberger, J., & Baier, H. (2015). Towards automated incident handling: how to select an appropriate response against a network-based attack? In Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics (IMF 2015) (pp. 51-67). IEEE Computer Society. https://doi.org/10.1109/IMF.2015.13

Postema, B. F. , & Haverkort, B. R. H. M. (2015). An AnyLogic simulation model for power and performance analysis of data centres. In M. Beltrán, W. Knottenbelt, & J. Bradley (Eds.), Proceedings of the 12th European Workshop on Computer Performance Engineering, EPEW 2015 (pp. 258-272). (Lecture Notes in Computer Science; Vol. 9272). Springer. https://doi.org/10.1007/978-3-319-23267-6_17

Steinberger, J. , Sperotto, A., Baier, H. , & Pras, A. (2015). Collaborative Attack Mitigation and Response: A survey. In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 910-913). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140407

Steinberger, J. , Sperotto, A., Baier, H. , & Pras, A. (2015). Exchanging security events of flow-based intrusion detection systems at internet scale. In Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015) (pp. 3). Internet Architecture Board Website. https://www.iab.org/wp-content/IAB-uploads/2015/04/CARIS_2015_submission_3.pdf

Steinberger, J. , Sperotto, A., Golling, M., & Baier, H. (2015). How to exchange security events? Overview and evaluation of formats and protocols. In IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 261-269). IEEE Computer Society. https://doi.org/10.1109/INM.2015.7140300

Wognsen, E. R. , Haverkort, B. R. H. M. , Jongerden, M. R., Hansen, R. R. , & Larsen, K. G. (2015). A Score Function for Optimizing the Cycle-Life of Battery-Powered Embedded Systems. In S. Sankaranarayanan, & E. Vicario (Eds.), Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2015 (pp. 305-320). (Lecture Notes in Computer Science; Vol. 9268). Springer. https://doi.org/10.1007/978-3-319-22975-1_20

Zhao, Z. , Karimzadeh Motallebi Azar, M., Braun, T. , Pras, A. , & van den Berg, H. L. (2015). A Demonstration of Mobility Prediction as a Service in Cloudified LTE Networks. In Proceedings of the 4th International Conference on Cloud Networking, CloudNet 2015 (pp. 78-80). IEEE. https://doi.org/10.1109/CloudNet.2015.7335285

de Boer, P-T. , Reijsbergen, D. P. , & Scheinhardt, W. R. W. (2015). Interactive comparison of hypothesis tests for statistical model checking. In 9th EAI International Conference on Performance Evaluation Methodologies and Tools, ValueTools 2015 (pp. -). Association for Computing Machinery (ACM). https://doi.org/10.4108/eai.14-12-2015.2262571

de Oliveira Schmidt, R. , van den Berg, H. L. , & Pras, A. (2015). Measurement-Based Network Link Dimensioning. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 1071-1077). IEEE. https://doi.org/10.1109/INM.2015.7140435

de Vries, W. B. , Cardoso de Santanna, J. J. , Sperotto, A. , & Pras, A. (2015). How asymmetric is the Internet? A Study to Support the use of Traceroute. In S. Latré, M. Charalambides, J. François, C. Schmitt, & B. Stiller (Eds.), Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 (pp. 113-125). (Lecture Notes in Computer Science; Vol. 9122). Springer. https://doi.org/10.1007/978-3-319-20034-7_12

van Rijswijk, R. M. , Jonker, M. , Sperotto, A. , & Pras, A. (2015). The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015 (pp. 91-92). Association for Computing Machinery (ACM). https://doi.org/10.1145/2785956.2789996

van den Berg, F. , Haverkort, B. R. H. M., & Hooman, J. (2015). Efficiently Computing Latency Distributions by combined Performance Evaluation Techniques. In W. Knottenbelt, K. Wolter, A. Busic, M. Gribaudo, & P. Reinecke (Eds.), Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2015 (pp. 158-163). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. https://doi.org/10.4108/eai.14-12-2015.2262725

van den Berg, F., Hooman, J. , Hartmanns, A. , Haverkort, B. R. H. M. , & Remke, A. K. I. (2015). Computing Response Time Distributions Using Iterative Probabilistic Model Checking. In M. Beltran, W. Knottenbelt, & J. Bradley (Eds.), Proceedings of the 12th European Workshop on Computer Performance Engineering (EPEW 2015) (pp. 208-224). (Lecture notes in computer science; Vol. 9272). Springer. https://doi.org/10.1007/978-3-319-23267-6_14

van den Berg, F. , Remke, A. K. I. , & Haverkort, B. R. H. M. (2015). iDSL: Automated Performance Prediction and Analysis of Medical Imaging Systems. In M. Beltran, W. Knottenbelt, & J. Bradley (Eds.), Proceedings of the 12th European Workshop on Computer Performance Engineering, EPEW 2015 (pp. 227-242). (Lecture Notes in Computer Science; Vol. 9272). Springer. https://doi.org/10.1007/978-3-319-23267-6_15

van der Steeg, D. , Hofstede, R. J. , Sperotto, A. , & Pras, A. (2015). Real-time DDoS attack detection for Cisco IOS using NetFlow. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 972-977). IEEE Communications Society. https://doi.org/10.1109/INM.2015.7140420

van der Toorn, O. I. , Hofstede, R. J. , Jonker, M. , & Sperotto, A. (2015). A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015) (pp. 862-865). IEEE Communications Society. https://doi.org/10.1109/INM.2015.7140395

Report


Buijsrogge, A. , de Boer, P-T. , & Scheinhardt, W. R. W. (2015). A note on a state-independent change of measure for the $G|G|1$ tandem queue. (Memorandum of the Department of Applied Mathematics; No. 2051). University of Twente, Department of Applied Mathematics.

Ramsgaard Wognsen, E. , Jongerden, M. R. , & Haverkort, B. R. H. M. (2015). A Score Function for State of Charge Profiles for Rechargeable Batteries. (CTIT Technical Report Series; No. 15-06). Centre for Telematics and Information Technology (CTIT).

This publication list has been generated from UT Research Information.