Searched for: subject%3A%22CSR%255C%2B%255C-%255C%2BCyber%255C%2BSecurity%255C%2B%2526%255C%2BRobustness%22
(1 - 20 of 55)

Pages

document
Veugen, P.J.M. (author)
other 2018
document
Everts, M.H. (author), Muller, F. (author)
Smart contracts are believed to be the next step in inter-party automation; traditional trusted third parties are to be replaced by small pieces of code running on a distributed system that written by fallible humans. However, at the end of the day, these smart contracts controlling high-value assets are pieces of code written by fallible humans...
other 2018
document
Gehrke, O. (author), Smith, P. (author), Wolthuis, R. (author)
ACM Special Interest Group on Embedded Systems (SIGBED); IEEE CS; IEEE Signal Processing Society
article 2017
document
Zuraniewski, P.W. (author), van Adrichem, N.L.M. (author), Ravesteijn, D. (author), IJntema, W. (author), Papadopoulos, C. (author), Fan, C. (author)
Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network...
conference paper 2017
document
de Kievit, S. (author), Smulders, A.C.M. (author)
article 2017
document
Phillipson, F. (author), de Hoog, S. (author), van Essen, T. (author)
article 2017
document
Vos, T.J.C. (author), Phillipson, F. (author)
conference paper 2017
document
Global Forum on Cyber Expertise (GFCE) (author)
conference paper 2017
document
Zhao, Z. (author), Karimzadeh, M. (author), Braun, T. (author), Pras, A. (author), van den Berg, J.L. (author)
Network Function Virtualization involves implementing network functions (e.g., virtualized LTE component) in software that can run on a range of industry standard server hardware, and can be migrated or instantiated on demand. A prediction service hosted on cloud infrastructures enables consumers to request the prediction information on-demand...
conference paper 2017
document
de Juncker, M.A.M. (author), Huizing, D. (author), del Vecchyo, M.R.O. (author), Phillipson, F. (author), Sangers, A. (author)
Problem statements and solution methods in mathematical synchromodal transportation problems depend greatly on a set of model choices for which no rule of thumb exists. In this paper, a framework is introduced with which the model choices in synchromodal transportation problems can be classified, based on literature. This framework should help...
conference paper 2017
document
Bortolameotti, R. (author), van Ede, T. (author), Caselli, M. (author), Everts, M.H. (author), Hartel, P. (author), Hofstede, R. (author), Jonker, W. (author), Peter, A. (author)
We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints extracted from a host's network traffic. We evaluate a prototype...
conference paper 2017
document
Phillipson, F. (author)
conference paper 2017
document
Počta, P. (author), Beerends, J.G. (author)
This paper deals with the intelligibility of speech coded by the STANAG 4591 standard codec, including packet loss, using synthesized speech input. Both subjective and objective assessments are used. It is shown that this codec significantly degrades intelligibility when compared to a standard narrowband filtered version of the synthesized...
article 2017
document
Frank Phillipson, F. (author), Ortega del Vecchyo, M. (author), van Ginkel, B. (author), Huizing, S. (author), Sangers, A. (author)
In logistic delivery chains time windows are common. An arrival has to be in a certain time interval, at the expense of waiting time or penalties if the time limits are exceeded. This paper looks at the optimal placement of those time intervals in a specific case of a barge visiting two ports in sequence. For the second port a possible delay or...
conference paper 2017
document
de Huncker, M.A.M. (author), Huizing, D. (author), Ortega del Vecchyo, M.R. (author), Phillipson, F. (author), Sangers, A. (author)
Problem statements and solution methods in mathematical synchromodal transportation problems depend greatly on a set of model choices for which no rule of thumb exists. In this paper, a framework is introduced with which the model choices in synchromodal transportation problems can be classified, based on literature. This framework help...
conference paper 2017
document
Uguru, J.O. (author), Beerends, J.G. (author), Ebem, D. (author)
This study examines the level of speech recognition of English and Igbo utterances by 70 grade four children. The children, whose mother tongue is Igbo and aged between 8 and 10 years, had English monosyllabic words as well as Igbo monosyllabic and disyllabic words dictated to them in noisy and quiet classrooms. The results show that in noise,...
article 2017
document
Rossebø, J.E.Y. (author), Wolthuis, R. (author), Fransen, F. (author), Björkman, G. (author), Medeiros, N. (author)
article 2017
document
Gallardo, L.F. (author), Möller, S. (author), Beerends, J. (author)
The performance of automatic speech recognition based on coded-decoded speech heavily depends on the quality of the transmitted signals, determined by channel impairments. This paper examines relationships between speech recognition performance and measurements of speech quality and intelligibility over transmission channels. Different to...
conference paper 2017
document
Phillipson, F. (author)
public lecture 2017
document
Neumann, N. (author), Phillipson, F. (author)
conference paper 2017
Searched for: subject%3A%22CSR%255C%2B%255C-%255C%2BCyber%255C%2BSecurity%255C%2B%2526%255C%2BRobustness%22
(1 - 20 of 55)

Pages