Searched for: subject%3A%22CSR%255C%2B%255C-%255C%2BCyber%255C%2BSecurity%255C%2B%2526%255C%2BRobustness%22
(1 - 20 of 55)
- document
- Veugen, P.J.M. (author) other 2018
- document
-
Everts, M.H. (author), Muller, F. (author)Smart contracts are believed to be the next step in inter-party automation; traditional trusted third parties are to be replaced by small pieces of code running on a distributed system that written by fallible humans. However, at the end of the day, these smart contracts controlling high-value assets are pieces of code written by fallible humans...other 2018
- document
-
Gehrke, O. (author), Smith, P. (author), Wolthuis, R. (author)ACM Special Interest Group on Embedded Systems (SIGBED); IEEE CS; IEEE Signal Processing Societyarticle 2017
- document
-
Zuraniewski, P.W. (author), van Adrichem, N.L.M. (author), Ravesteijn, D. (author), IJntema, W. (author), Papadopoulos, C. (author), Fan, C. (author)Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network...conference paper 2017
- document
- de Kievit, S. (author), Smulders, A.C.M. (author) article 2017
- document
- Phillipson, F. (author), de Hoog, S. (author), van Essen, T. (author) article 2017
- document
- Vos, T.J.C. (author), Phillipson, F. (author) conference paper 2017
- document
- Global Forum on Cyber Expertise (GFCE) (author) conference paper 2017
- document
-
Zhao, Z. (author), Karimzadeh, M. (author), Braun, T. (author), Pras, A. (author), van den Berg, J.L. (author)Network Function Virtualization involves implementing network functions (e.g., virtualized LTE component) in software that can run on a range of industry standard server hardware, and can be migrated or instantiated on demand. A prediction service hosted on cloud infrastructures enables consumers to request the prediction information on-demand...conference paper 2017
- document
-
de Juncker, M.A.M. (author), Huizing, D. (author), del Vecchyo, M.R.O. (author), Phillipson, F. (author), Sangers, A. (author)Problem statements and solution methods in mathematical synchromodal transportation problems depend greatly on a set of model choices for which no rule of thumb exists. In this paper, a framework is introduced with which the model choices in synchromodal transportation problems can be classified, based on literature. This framework should help...conference paper 2017
- document
-
Bortolameotti, R. (author), van Ede, T. (author), Caselli, M. (author), Everts, M.H. (author), Hartel, P. (author), Hofstede, R. (author), Jonker, W. (author), Peter, A. (author)We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints extracted from a host's network traffic. We evaluate a prototype...conference paper 2017
- document
- Phillipson, F. (author) conference paper 2017
- document
-
Počta, P. (author), Beerends, J.G. (author)This paper deals with the intelligibility of speech coded by the STANAG 4591 standard codec, including packet loss, using synthesized speech input. Both subjective and objective assessments are used. It is shown that this codec significantly degrades intelligibility when compared to a standard narrowband filtered version of the synthesized...article 2017
- document
-
Frank Phillipson, F. (author), Ortega del Vecchyo, M. (author), van Ginkel, B. (author), Huizing, S. (author), Sangers, A. (author)In logistic delivery chains time windows are common. An arrival has to be in a certain time interval, at the expense of waiting time or penalties if the time limits are exceeded. This paper looks at the optimal placement of those time intervals in a specific case of a barge visiting two ports in sequence. For the second port a possible delay or...conference paper 2017
- document
-
de Huncker, M.A.M. (author), Huizing, D. (author), Ortega del Vecchyo, M.R. (author), Phillipson, F. (author), Sangers, A. (author)Problem statements and solution methods in mathematical synchromodal transportation problems depend greatly on a set of model choices for which no rule of thumb exists. In this paper, a framework is introduced with which the model choices in synchromodal transportation problems can be classified, based on literature. This framework help...conference paper 2017
- document
-
Uguru, J.O. (author), Beerends, J.G. (author), Ebem, D. (author)This study examines the level of speech recognition of English and Igbo utterances by 70 grade four children. The children, whose mother tongue is Igbo and aged between 8 and 10 years, had English monosyllabic words as well as Igbo monosyllabic and disyllabic words dictated to them in noisy and quiet classrooms. The results show that in noise,...article 2017
- document
- Rossebø, J.E.Y. (author), Wolthuis, R. (author), Fransen, F. (author), Björkman, G. (author), Medeiros, N. (author) article 2017
- document
-
Gallardo, L.F. (author), Möller, S. (author), Beerends, J. (author)The performance of automatic speech recognition based on coded-decoded speech heavily depends on the quality of the transmitted signals, determined by channel impairments. This paper examines relationships between speech recognition performance and measurements of speech quality and intelligibility over transmission channels. Different to...conference paper 2017
- document
- Phillipson, F. (author) public lecture 2017
- document
- Neumann, N. (author), Phillipson, F. (author) conference paper 2017
Searched for: subject%3A%22CSR%255C%2B%255C-%255C%2BCyber%255C%2BSecurity%255C%2B%2526%255C%2BRobustness%22
(1 - 20 of 55)