- document
-
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...conference paper 2022
- document
-
Peysakhovich, V. (author), Ledegang, W. (author), Houben, M. (author), Groen, E. (author)Eye movements analysis has great potential for understanding operator behaviour in many safety-critical domains, including aviation. In addition to traditional eye-tracking measures on pilots’ visual behavior, it seems promising to incorporate machine learning approaches to classify pilots’ visual scanning patterns. However, given the multitude...conference paper 2022
- document
-
van Battum, C.H.H. (author), Wiegmans, B. (author), Atasoy, B. (author), van Wingerden, E. (author), de Waal, A. (author), Tavasszy, L.A. (author)Container terminal capacity is often limited by (in)efciency bottlenecks. This paper provides the design and proof of concept for the bottleneck mitigation cycle (BMC), consisting of three steps: bottleneck classifcation, detection and alleviation. While, often, the literature only focuses on alleviation of a single bottleneck and ignores...article 2022
- document
-
Shahmohammadi, M.S. (author), Parker, L.A. (author), Henke, S. (author), Urbanus, J.H. (author)Microplastics are a growing environmental and toxicological concern, having been found in the remotest locations of the earth and within multiple organs of the human body. However, the scale of the problem is not yet fully known as the smallest micro- and nanoplastics (MNPs) cannot accurately be measured due to limitations in measurement and...article 2022
- document
-
Luo, J. (author), Moncada, J. (author), Ramirez, A. (author)Incorporating (operational) flexibility into process design has been a key approach to cope with uncertainties. The increasing penetration of renewables and the need for developing new low-carbon technologies will increase the demand for flexibility in chemical processes. This paper presents a state-of the-art review focusing on the origin,...article 2022
- document
- de Bruin, G.J. (author), Pereira Barata, A. (author), van den Herik, H.J. (author), Takes, F.W. (author), Veenman, C.J. (author) article 2022
- document
-
Eslami-Mossallam, B. (author), Klein, M. (author), Smagt, C.V.D. (author), Sanden, K.V.D. (author), Jones Jr, S.K. (author), Hawkins, J.A. (author), Finkelstein, I.J. (author), Depken, M. (author)The S. pyogenes (Sp) Cas9 endonuclease is an important gene-editing tool. SpCas9 is directed to target sites based on complementarity to a complexed single-guide RNA (sgRNA). However, SpCas9-sgRNA also binds and cleaves genomic off-targets with only partial complementarity. To date, we lack the ability to predict cleavage and binding activity...article 2022
- document
- Neumann, N.M.P. (author) conference paper 2021
- document
-
de Boer, M.H.T. (author), Hillerström, F.H.J. (author)In Hybrid AI, machine learning and knowledge engineering are combined to have the best of both worlds. Insights obtained from data are combined with complementary expert knowledge, which can be represented in a graph structure. Graph networks are a recently new development in machine learning and cover methods that learn on graph structured data...conference paper 2021
- document
-
den Hollander, R.J.M. (author), van Rooij, S.B. (author), van den Broek, S.P. (author), Dijk, J. (author)An important surveillance task during naval military operations is early risk assessment of vessels. The potential risk that a vessel poses will depend on the vessel type, and vessel classification is therefore a basic technique in risk assessment. Although automatic identification by AIS is widely available, the AIS transponders can potentially...conference paper 2021
- document
- Madhuanand, L. (author), Sadavarte, P. (author), Visschedijk, A.J.H. (author), Denier van der Gon, H.A.C. (author), Aben, I. (author), Osei, F.B. (author) article 2021
- document
-
Phillipson, F. (author), Wezeman, R.S. (author), Chiscop, I. (author)Communication networks are managed more and more by using artificial intelligence. Anomaly detection, network monitoring and user behaviour are areas where machine learning offers advantages over more traditional methods. However, computer power is increasingly becoming a limiting factor in machine learning tasks. The rise of quantum computers...article 2021
- document
-
de Boer, H. (author), Muller, R.W.D. (author), Wong, S. (author), Voogt, V. (author)A key obstacle within the design of cognitive radios has always been the spectrum sensing component that implements the function automatic modulation classification (AMC). With the transition to software-defined radios (SDRs) followed by the introduction of field-programmable gate arrays (FPGAs) and deep learning (DL), it becomes possible to...conference paper 2021
- document
-
Kooiman, K. (author), Phillipson, F. (author), Sangers, A. (author)In this paper Time-stamp Stochastic Assignment Problems are studied. These problems occur in places where an incoming request or task has to be connected to a resource immediately. A definition and framework for these problems is given, in which the different Time-stamp Stochastic Assignment Problems can be categorised. An explicit notation is...conference paper 2020
- document
-
Gross, D. (author), Jansen, N. (author), Perez, G.A. (author), Raaijmakers, S. (author)We give a formal verification procedure that decides whether a classifier ensemble is robust against arbitrary randomized attacks. Such attacks consist of a set of deterministic attacks and a distribution over this set. The robustness-checking problem consists of assessing, given a set of classifiers and a labelled data set, whether there exists...conference paper 2020
- document
- van de Guchte, L. (author) book 2020
- document
-
Phillipson, F. (author), Wezeman, R.S. (author), Chiscop, I. (author)There is a growing trend in using machine learning techniques for detecting environmental context in communication networks. Machine learning is one of the promising candidate areas where quantum computing can show a quantum advantage over their classical algorithmic counterpart on near term Noisy Intermediate-Scale Quantum (NISQ) devices. The...conference paper 2020
- document
-
de Wit, J.J.M. (author), Gusland, D. (author), Trommel, R.P. (author)The use of drones grows rapidly, recreational and commercial use, as well as malicious use. Following the trend of increasing use, there is an increasing need for radar systems to detect, track and characterize drones. Drone characterization, i.e., extracting information about the payload and intent of a drone, is crucial for the effective...conference paper 2020
- document
-
de Jong, R.J. (author), Heiligers, M.J.C. (author), de Wit, J.J.M. (author), Uysal, F. (author)Camera systems are widely used for surveillance in the security and defense domains. The main advantages of camera systems are their high resolution, their ease of use, and the fact that optical imagery is easy to interpret for human operators. However, particularly when considering application in the defense domain, cameras have some...conference paper 2019
- document
-
Premel-Cabic, G. (author), de Wit, J.J.M. (author), Cuenca, M. Caro (author)The ALFA project aims at timely detection, tracking, classification, and intent assessment of LSS targets. The system relies on a heterogeneous sensor suite, including radar. The objective of the radar component is sector surveillance including target classification. Since the revisit time needs to be short, classification must be done with very...conference paper 2019