Searched for: author%3A%22Chiscop%2C+I.%22
(1 - 16 of 16)
document
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)
Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...
conference paper 2022
document
Phillipson, F. (author), Chiscop, I. (author)
Matching electricity demand and supply by decentralised generators will be very important in the near future, where more and more electricity has to be produced sustainably. Optimisation problems that address this problem often have quadratic objective functions or constraints, due to the quadratic nature of energy loss. Where classical solvers...
conference paper 2022
document
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, E. (author), Moustafa, N. (author), Hartog, F.T.H.D. (author)
article 2022
document
Wezeman, R.S. (author), Chiscop, I. (author), Anitori, L. (author), van Rossum, W.L. (author)
Compressive sensing is a signal processing technique used to acquire and reconstruct sparse signals using significantly fewer measurement samples. Compressive sensing requires finding the most sparse solution to an underdetermined linear system, which is an NP-hard problem and as a consequence in practise is only solved approximately. In our...
conference paper 2022
document
Phillipson, F. (author), Bontekoe, T.H. (author), Chiscop, I. (author)
Energy storage systems and home energy management and control systems will play an important role in reaching the Paris Agreement on climate change. Underlying scheduling mechanisms will lead to a computational burden when the size of the systems and the size of the control space increase. One, upcoming alternative to overcome this computational...
conference paper 2021
document
Phillipson, F. (author), Chiscop, I. (author)
Quantum computing is developing fast. Real world applications are within reach in the coming years. One of the most promising areas is combinatorial optimisation, where the Quadratic Unconstrained Binary Optimisation (QUBO) problem formulation is used to get good approximate solutions. Both the universal quantum computer as well as the quantum...
conference paper 2021
document
Phillipson, F. (author), Chiscop, I. (author)
conference paper 2021
document
Phillipson, F. (author), Bontekoe, T. (author), Chiscop, I. (author)
Energy storage systems and home energy management and control systems will play an important role in reaching the Paris Agree ment on climate change. Underlying scheduling mechanisms will lead to a computational burden when the size of the systems and the size of the control space increase. One, upcoming alternative to overcome this...
conference paper 2021
document
Chiscop, I. (author), Gazdag, A. (author), Bosman, J. (author), Biczók, G. (author)
Multiple attacks have shown that in-vehicle networks have vulnerabilities which can be exploited. Securing the Controller Area Network (CAN) for modern vehicles has become a necessary task for car manufacturers. Some attacks inject potentially large amount of fake messages into the CAN network; however, such attacks are relatively easy to detect...
conference paper 2021
document
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, H.B. (author), Moustafa, N. (author), den Hartor, F.T.H. (author)
The Internet of Things (IoT) is reshaping our connected world due to the proliferation of the availability of small devices connected to the Internet and their communication technologies. Therefore, the study and research towards intrusion detection in the IoT domain has a lot of significance. Network intrusion datasets are fundamental for this...
article 2021
document
Phillipson, F. (author), Wezeman, R.S. (author), Chiscop, I. (author)
Communication networks are managed more and more by using artificial intelligence. Anomaly detection, network monitoring and user behaviour are areas where machine learning offers advantages over more traditional methods. However, computer power is increasingly becoming a limiting factor in machine learning tasks. The rise of quantum computers...
article 2021
document
de Koning, W.J. (author), Phillipson, F. (author), Chiscop, I. (author)
conference paper 2020
document
Chiscop, I. (author), Nauta, J.C. (author), Veerman, B. (author), Phillipson, F. (author)
The Multi-Service Location Set Covering Problem is an extension of the well-known Set Covering Problem. It arises in practical applications where a set of physical locations need to be equipped with services to satisfy demand within a certain area, while minimizing costs. In this paper we formulate the problem as a Quadratic Unconstrained Binary...
conference paper 2020
document
Neumann, N.M.P. (author), de Heer, P.B.U.L. (author), Chiscop, I. (author), Phillipson, F. (author)
With quantum computers still under heavy development, already numerous quantum machine learning algorithms have been proposed for both gate-based quantum computers and quantum annealers. Recently, a quantum annealing version of a reinforcement learning algorithm for grid-traversal using one agent was published. We extend this work based on...
conference paper 2020
document
van Houte, R. (author), Mulderij, J. (author), Attema, T. (author), Chiscop, I. (author), Phillipson, F. (author)
article 2020
document
Phillipson, F. (author), Wezeman, R.S. (author), Chiscop, I. (author)
There is a growing trend in using machine learning techniques for detecting environmental context in communication networks. Machine learning is one of the promising candidate areas where quantum computing can show a quantum advantage over their classical algorithmic counterpart on near term Noisy Intermediate-Scale Quantum (NISQ) devices. The...
conference paper 2020
Searched for: author%3A%22Chiscop%2C+I.%22
(1 - 16 of 16)