Searched for: subject:"Cyber%5C+security"
(1 - 20 of 104)

Pages

document
Wolthuis, R. (author), Phillipson, F. (author), Jongsma, H.J. (author), Langenkamp, P.N. (author)
In recent years we see that an increasing amount of information becomes available that can be beneficial to the security risk process. Traditionally, security risk management is an asset-based, qualitative process based on expert opinion and information at hand; periodically a group of experts assesses applicable risks and determines correct...
article 2021
document
Aliman, N.M. (author), Kester, L. (author)
In this paper, we introduce “scientific and empirical adversarial AI attacks” (SEA AI attacks) as umbrella term for not yet prevalent but technically feasible deliberate malicious acts of specifically crafting AI-generated samples to achieve an epistemic distortion in (applied) science or engineering contexts. In view of possible socio-psycho...
conference paper 2021
document
TNO (author)
Cyberspace is na land, zee, lucht en de ruimte het vijfde operationele domein van de krijgsmacht. Ook hier treedt Defensie op om de veiligheid van Nederland te beschermen. Daarvoor ontwikkelt Defensie operationele cybercapaciteiten. Deze kunnen desgewenst ook worden ingezet als nichecapaciteit bij bondgenootschappelijk optreden. De huidige...
other 2020
document
van der Kleij, R. (author), Leukfeldt, R. (author)
Cybercrime is on the rise. With the ongoing digitization of our society, it is expected that, sooner or later, all organizations have to deal with cyberattacks; hence organizations need to be more cyber resilient. This paper presents a novel framework of cyber resilience, integrating models from resilience engineering and human behavior. Based...
conference paper 2020
document
Maathuis, C. (author)
doctoral thesis 2020
document
Aliman, N.M. (author), Elands, P.J.M. (author), Hürst, W. (author), Kester, L.J.H.M. (author), Thérrison, K.R. (author), Werkhoven, P.J. (author), Yampolskiy, R. (author), Ziesche, S. (author)
The complex socio-technological debate underlying safetycritical and ethically relevant issues pertaining to AI development and deployment extends across heterogeneous research subfields and involves in part conflicting positions. In this context, it seems expedient to generate a minimalistic joint transdisciplinary basis disambiguating the...
conference paper 2020
document
van der Ham, J. (author), Groot, S. (author), Wilson, S. (author), Bernstein, D.J. (author), Krezmien, J. (author), van Laethem, B. (author), Jansen, R. (author), Boeke, S. (author), Planqué, S. (author), van Lom, M. (author), Niemantsverdrie, J. (author), Cornelisse, R. (author), Bijlenga, N. (author), Fransen, F. (author), Kerkdijk, R. (author), Seepers, R.M. (author), Ingenhoes, G. (author), Speelman, F. (author), Schaffner, C. (author), Alexander, P. (author), van Aarsen, J. (author), Helder, J. (author), van Os, R. (author), Richdale, K. (author), Huttner, B. (author), Kooning, L. (author), Doer, C. (author), Pontier, M. (author), Mak, M. (author), Cappers, B. (author), Mengerink, J. (author), van de Pasch, J. (author), Oosterwijk, S. (author), Blokker, J. (author)
2018 is a difficult year to summarize for Infosec. After the initial flurry of activity around Spectre and Meltdown in the beginning of January, we ended the year with global supply chain concerns brought about by the Super Micro story. Throughout the year we saw the geopolitical dilemmas of 2018 manifest in cyber security issues. Technology...
other 2019
document
Quantumfysica is voor gewone stervelingen een ongrijpbaar fenomeen. Toch weten knappe koppen het te vertalen naar quantumtechnologie die de belofte van concrete ‘gamechanging’ toepassingen in zich heeft. Het Delftse onderzoeksinstituut QuTech ontwikkelt er demonstrators voor. Zo heeft de toekomstige quantumcomputer een ongelooflijke...
article 2019
document
Fransen, F. (author), Neef, R.M. (author), Zielstra, A. (author)
report 2019
document
Maathuis, C.E. (author), Wolters, P. (author), van den Berg, J. (author)
Due to the advancement of technology and continuing emergence of international conflict situations, wars are now also conducted into the official new battlefield: cyberspace. Although several incidents have been characterized in terms of cyber operations, there is an important gap in the existing body of knowledge concerning the definition of...
article 2018
document
Sluis, H.J.D. (author), Tejada, R. (author)
This article provides a brief introduction to the Cooperative, Connected and Automated Mobility strategy define by the European Commission in 2016. Its main challenges are then summarized, with and emphasis in vehicle communication technology for automated driving. Finally, an overview of several recent European projects that aim to meet these...
article 2018
document
Young, H.J. (author), van Vliet, A.J. (author), van de Ven, J.G.S. (author), Jol, S.C. (author), Broekman, C.C.M.T. (author)
The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing entities’ behavior to inhibit undesirable behavior...
conference paper 2018
document
Everts, M.H. (author), Muller, F. (author)
Smart contracts are believed to be the next step in inter-party automation; traditional trusted third parties are to be replaced by small pieces of code running on a distributed system that written by fallible humans. However, at the end of the day, these smart contracts controlling high-value assets are pieces of code written by fallible humans...
other 2018
document
Veugen, P.J.M. (author)
other 2018
document
Gehrke, O. (author), Smith, P. (author), Wolthuis, R. (author)
ACM Special Interest Group on Embedded Systems (SIGBED); IEEE CS; IEEE Signal Processing Society
article 2017
document
Attema, T. (author), Kosgodagan Acharige, A. (author), Morales-Napoles, O. (author), Maljaars, J. (author)
A probabilistic model is developed to investigate the crack growth development in welded details of
article 2017
document
Zuraniewski, P.W. (author), van Adrichem, N.L.M. (author), Ravesteijn, D. (author), IJntema, W. (author), Papadopoulos, C. (author), Fan, C. (author)
Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network...
conference paper 2017
document
de Kievit, S. (author), Smulders, A.C.M. (author)
article 2017
document
Phillipson, F. (author), de Hoog, S. (author), van Essen, T. (author)
article 2017
document
Zielstra, A. (author)
Digitale bedrijvigheid zorgde de afgelopen 25 jaar voor ruim een derde van alle economische groei. Meer dan 5 procent van ons bnp verdienen we met ICT. Nederland heeft een toppositie in de wereld als het gaat om de digitale economie. Maar het is niet vanzelfsprekend dat we die behouden. Volgens Harvard Business Review behoort Nederland zelfs tot...
other 2017
Searched for: subject:"Cyber%5C+security"
(1 - 20 of 104)

Pages