Searched for: subject%3A%22Cyber%255C%2BSecurity%255C%2B%2526%255C%2BResilience%22
(1 - 20 of 28)
Pages
- 1
- 2
- document
-
TNO, (author)Cyberspace is na land, zee, lucht en de ruimte het vijfde operationele domein van de krijgsmacht. Ook hier treedt Defensie op om de veiligheid van Nederland te beschermen. Daarvoor ontwikkelt Defensie operationele cybercapaciteiten. Deze kunnen desgewenst ook worden ingezet als nichecapaciteit bij bondgenootschappelijk optreden. De huidige...other 2020
- document
- Fransen, F. (author), Neef, R.M. (author), Zielstra, A. (author) report 2019
- document
-
Everts, M.H. (author), Muller, F. (author)Smart contracts are believed to be the next step in inter-party automation; traditional trusted third parties are to be replaced by small pieces of code running on a distributed system that written by fallible humans. However, at the end of the day, these smart contracts controlling high-value assets are pieces of code written by fallible humans...other 2018
- document
-
de Boer, M.H.T. (author), Bouma, H. (author), Kruithof, M.C. (author), ter Haar, F.B. (author), Fischer, N.M. (author), Hagendoorn, L.K. (author), Joosten, B. (author), Raaijmakers, S. (author)The information available on-line and off-line, from open as well as from private sources, is growing at an exponential rate and places an increasing demand on the limited resources of Law Enforcement Agencies (LEAs). The absence of appropriate tools and techniques to collect, process, and analyze the volumes of complex and heterogeneous data...conference paper 2017
- document
-
Počta, P. (author), Beerends, J.G. (author)This paper deals with the intelligibility of speech coded by the STANAG 4591 standard codec, including packet loss, using synthesized speech input. Both subjective and objective assessments are used. It is shown that this codec significantly degrades intelligibility when compared to a standard narrowband filtered version of the synthesized...article 2017
- document
-
Zielstra, A. (author)Digitale bedrijvigheid zorgde de afgelopen 25 jaar voor ruim een derde van alle economische groei. Meer dan 5 procent van ons bnp verdienen we met ICT. Nederland heeft een toppositie in de wereld als het gaat om de digitale economie. Maar het is niet vanzelfsprekend dat we die behouden. Volgens Harvard Business Review behoort Nederland zelfs tot...other 2017
- document
-
Ruijven, T. (author), Keijser, B. (author)Dit whitepaper biedt achtergrondinformatie, good practices en een stappenplan voor het vergroten van cyber-ketenweerbaarheid en is bedoeld voor organisaties die onderdeel zijn van een keten en cybersecurity willen versterken. Cyber-ketenweerbaarheid betreft het vermogen van ketens om zich te beschermen tegen cyberdreigingen, te herstellen van...other 2017
- document
- Vos, T.J.C. (author) book 2016
- document
-
Duijnhoven, H.L. (author), Neef, R.M. (author)This chapter discusses the complex challenge of dealing with diverging threats in our contemporary hyper-connected society. In recent decades, resilience has become a key notion that has been adopted by policy-makers and academia to embrace the changing risk our society faces. Yet the traditional, modernist rational logic that dominates...bookPart 2016
- document
-
Schmidt, R.D.O. (author), Sadre, R. (author), Sperotto, A. (author), van den Berg, H. (author), Pras, A. (author)Link dimensioning is used by network operators to properly provision the capacity of their network links. Proposed methods for link dimensioning often require statistics, such as traffic variance, that need to be calculated from packet-level measurements. In practice, due to increasing traffic volume, operators deploy packet sampling techniques...article 2015
- document
-
Luiijf, H.A.M. (author), Theocharidou, M. (author), Rome, E. (author)CIPedia© http://www.cipedia.eu is a Wiki-based body of common knowledge for the wide international community of critical infrastructure (CI) protection and resilience stakeholders such as policy makers, researchers, governmental agencies, emergency management organizations, CI operators, and even the public.article 2015
- document
-
Zielstra, A. (author), Luiijf, H.A.M. (author), Duijnhoven, H.L. (author)All stakeholders in cyber security and resilience have obligations; it is time to end the period of loose, non-binding collaborations, say Annemarie Zielstra, Eric Luiijf and Hanneke Duijnhoven, in this call for nations to work more closely togetherarticle 2015
- document
-
Luiijf, H.A.M. (author), Klaver, M.H.A. (author)With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases critical services offered by key Internet Service Providers (ISP). This paper debates whether nations, their policy-makers, legislation and regulation...article 2015
- document
-
Veugen, P.J.M. (author)In the field of signal processing in the encrypted domain, linear operations are usually easy to perform, whereas multiplications, and bitwise operations like comparison, are more costly in terms of computation and communication. These bitwise operations frequently require a decomposition of the secret value into bits. To minimize the...article 2015
- document
-
Kooij-Janic, M. (author), Verweij, E.D.N. (author)Alle bedrijven lopen risico’s, waardoor er een kans bestaat dat bedrijven hun verplichtingen naar hun stakeholders - zoals klanten of aandeelhouders - niet meer kunnen nakomen en daardoor zelf schade leiden. Het is dus van vitaal belang dat bedrijven de relevante risico’s identificeren en vervolgens managen. De stap in het risicomanagementproces...article 2015
- document
-
Bortolameotti, R. (author), Peter, A. (author), Everts, M.H. (author), Bolzoni, D. (author)Internet applications use SSL to provide data confidentiality to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious SSL connections, which is based on the...bookPart 2015
- document
-
Siljee, B.I.J. (author)This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid software developers with the realization of privacy by...conference paper 2015
- document
-
Luiijf, H.A.M. (author)Ter ondersteuning van de internationale cyber security gemeenschap ontwikkelde TNO drie producten voor de vierde Global Conference on Cyber Space: From Awareness to action: bridging the gaps in 10 steps, Sharing Cyber Security Information en Cyber Security of Industrial Control Systems (ICS).article 2015
- document
-
Fransen, F. (author), Smulders, A.C.M. (author), Kerkdijk, H. (author)The last couple of years we have seen an increase in interests and initiatives in establishing threat intelligence sharing communities, and on the development of standards and platforms for automated cyber security information sharing. These initiatives are focused on helping organisations to increase their resilience to new attacks and threats....article 2015
- document
-
Luiijf, H.A.M. (author)Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures (CI), their products and services. Many of the CI services as well as other organizations use Industrial Control Systems (ICS) to monitor and control their mission-critical processes. Therefore, it is crucial that the functioning of ICS is...bookPart 2015
Searched for: subject%3A%22Cyber%255C%2BSecurity%255C%2B%2526%255C%2BResilience%22
(1 - 20 of 28)
Pages
- 1
- 2