- document
-
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, H.B. (author), Moustafa, N. (author), den Hartor, F.T.H. (author)The Internet of Things (IoT) is reshaping our connected world due to the proliferation of the availability of small devices connected to the Internet and their communication technologies. Therefore, the study and research towards intrusion detection in the IoT domain has a lot of significance. Network intrusion datasets are fundamental for this...article 2021
- document
-
Seepers, R.M. (author), Smulders, A.C.M. (author), Meeuwissen, H.B. (author)Zero trust’ is een term die steeds meer draagvlak krijgt binnen de cybersecuritygemeenschap. Centraal achter het zero trust-gedachtegoed is dat er fundamenteel anders moet worden omgegaan met de beveiligingsarchitectuur van een organisatie en haar (IT) infrastructuur: van ‘trust, but verify’ naar ‘don’t trust, verify!’ [1]. In een zero trust...article 2020
- document
-
Trichias, K. (author), Pijpers, R.J.M. (author), Meeuwissen, H.B. (author)Structural Health Monitoring (SHM) systems help to monitor critical infrastructures (bridges, tunnels, etc.) remotely and provide up-to-date information about their physical condition. In addition, it helps to predict the structure’s life and required maintenance in a cost-efficient way. Typically, inspection data gives insight in the structural...conference paper 2014
- document
-
Ellens, W. (author), Zuraniewski, P.W. (author), Sperotto, A. (author), Schotanus, H.A. (author), Mandjes, M. (author), Meeuwissen, H.B. (author)DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique,...bookPart 2013
- document
-
Živković, M. (author), Bosman, J.W. (author), van den Berg, H. (author), van der Mei, R. (author), Meeuwissen, H.B. (author), Núñez-Queija, R. (author)We investigate dynamic decision mechanisms for composite web services maximizing the expected revenue for the providers of composite services. A composite web service is represented by a (sequential) workflow, and for each task within this workflow, a number of service alternatives may be available. These alternatives offer the same...conference paper 2012
- document
-
Zivkovic, M. (author), Bosman, J.W. (author), van den Berg, J.L. (author), van der Mei, R.D. (author), Meeuwissen, H.B. (author), Nunez-Queija, R. (author)In this paper we investigate sequential decision mechanisms for composite web services. After executing each sub-service within a sequential workflow, decisions are made whether to terminate or continue the execution of the workflow. These decisions are based on observed response times, expected rewards, and typical Service Level Agreement...conference paper 2011
- document
-
Bastiaansen, H.J.M. (author), Joosten, H.J.M. (author), Meeuwissen, H.B. (author), Roijers, F. (author)ICT-ketens worden enerzijds steeds complexer en anderzijds van steed vitaler belang voor de maatschappij en voor organisaties. Daarbij neemt ook het belang van robuustheid van ICT-ketens en de beheersing daarvan toe. De auteurs beschrijven een nieuwe methodiek waarmee de mate van beheersing van de robuustheid van ICT-ketens kan worden vastgesteld.article 2011
- document
-
Meulenhoff, P.J. (author), Ostendorf, D.R. (author), Živković, M. (author), Meeuwissen, H.B. (author), Gijsen, B.M.M. (author), TNO Informatie- en Communicatietechnologie (author)In this paper, we analyze overload control for composite web services in service oriented architectures by an orchestrating broker, and propose two practical access control rules which effectively mitigate the effects of severe overloads at some web services in the composite service. These two rules aim to keep overall web service performance ...conference paper 2009