- document
-
Ojanpera, T. (author), Scholliers, J. (author), Sukuvaara, T. (author), Yastrebova, A. (author), Miekkala, T. (author), Pyykonen, P. (author), Maenpaa, K. (author), Salkari, I. (author), Laakso, J. (author), Huuskonen, O. (author), Zhang, H. (author), Kinawi, H. (author), Nyrhinen, H. (author), Eloranta, P. (author)Recent advancements in wireless communication, distributed computing, and sensing technologies, as well as in cybersecurity are enabling new digital services and solutions for vehicles and other road users. Digital road safety services can help to improve road safety and optimize road maintenance, and to enable automated vehicles in road traffic...conference paper 2023
- document
-
Bearfield, G. (author), van Gulijk, C. (author), Parkinson, S. (author), Thomas, R.J. (author)In the past decade rapid digitalisation of railway assets - including signalling and rolling stock - has occurred in parallel with a rising cyber security threat to critical national infrastructure. Rail safety requirements remain stringent and legacy standards for delivering safe, high integrity, complex digital systems exist. Security...conference paper 2022
- document
-
Werkhoven, P. (author), Bouwman, J. (author), van Diggelen, J. (author), Dijk, J. (author), van der Meulen, M. (author), Neerincx, M. (author), Raaijmakers, S. (author), van Veenstra, A.F. (author)TNO has lived up to its motto ‘Innovation for life’ by playing a significant part in this digital revolution, with major breakthroughs in computer simulation, network transactions, wireless communication, cyber security, optical satellite communication and quantum computing.report 2022
- document
-
Bearfield, G. (author), van Gulijk, C. (author), Thomas, R. (author)Safety critical functions of the engineered railway need to perform at levels of integrity that are so high that an acceptable failure rate cannot be demonstrated through testing alone. Where such functions need to be implemented in complex programmable electronic systems certain design, build and test requirements are defined in technical...article 2022
- document
-
Kumaresan, A. (author), Kandasamy, N.K. (author), Kooij, R.E. (author)The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has resulted in the necessity for smart controllers on such DERs. Inverters...article 2022
- document
-
Aliman, N.M. (author), Kester, L.J.H.M. (author)In recent years, technological advancements in the AI and VR fields have increasingly often been paired with considerations on ethics and safety aimed at mitigating unintentional design failures. However, cybersecurity-oriented AI and VR safety research has emphasized the need to additionally appraise instantiations of intentional malice...conference paper 2022
- document
-
Aliman, N.M. (author), Kester, L. (author)In this paper, we introduce “scientific and empirical adversarial AI attacks” (SEA AI attacks) as umbrella term for not yet prevalent but technically feasible deliberate malicious acts of specifically crafting AI-generated samples to achieve an epistemic distortion in (applied) science or engineering contexts. In view of possible socio-psycho...conference paper 2021
- document
-
Wolthuis, R. (author), Phillipson, F. (author), Jongsma, H.J. (author), Langenkamp, P.N. (author)In recent years we see that an increasing amount of information becomes available that can be beneficial to the security risk process. Traditionally, security risk management is an asset-based, qualitative process based on expert opinion and information at hand; periodically a group of experts assesses applicable risks and determines correct...article 2021
- document
-
Gijsen, B. (author), Montalto, R. (author), Panneman, J. (author), Falconieri, F. (author), Wiper, P. (author), Zuraniewski, P. (author)autonomic computing long since holds the promise to achieve properties including self-healing IT. The self-healing property provides a new perspective in the continuous battle between cyber attackers and defenders. Emerging containerization technology, and accompanying monitoring and deployment tools, can boost the state-of-the-art regarding...conference paper 2021
- document
-
van der Kleij, R. (author), Leukfeldt, R. (author)Cybercrime is on the rise. With the ongoing digitization of our society, it is expected that, sooner or later, all organizations have to deal with cyberattacks; hence organizations need to be more cyber resilient. This paper presents a novel framework of cyber resilience, integrating models from resilience engineering and human behavior. Based...conference paper 2020
- document
-
Aliman, N.M. (author), Elands, P.J.M. (author), Hürst, W. (author), Kester, L.J.H.M. (author), Thérrison, K.R. (author), Werkhoven, P.J. (author), Yampolskiy, R. (author), Ziesche, S. (author)The complex socio-technological debate underlying safetycritical and ethically relevant issues pertaining to AI development and deployment extends across heterogeneous research subfields and involves in part conflicting positions. In this context, it seems expedient to generate a minimalistic joint transdisciplinary basis disambiguating the...conference paper 2020
- document
-
TNO, (author)Cyberspace is na land, zee, lucht en de ruimte het vijfde operationele domein van de krijgsmacht. Ook hier treedt Defensie op om de veiligheid van Nederland te beschermen. Daarvoor ontwikkelt Defensie operationele cybercapaciteiten. Deze kunnen desgewenst ook worden ingezet als nichecapaciteit bij bondgenootschappelijk optreden. De huidige...other 2020
- document
- Maathuis, C. (author) doctoral thesis 2020
- document
-
Quantumfysica is voor gewone stervelingen een ongrijpbaar fenomeen. Toch weten knappe koppen het te vertalen naar quantumtechnologie die de belofte van concrete ‘gamechanging’ toepassingen in zich heeft. Het Delftse onderzoeksinstituut QuTech ontwikkelt er demonstrators voor. Zo heeft de toekomstige quantumcomputer een ongelooflijke...article 2019
- document
-
van der Ham, J. (author), Groot, S. (author), Wilson, S. (author), Bernstein, D.J. (author), Krezmien, J. (author), van Laethem, B. (author), Jansen, R. (author), Boeke, S. (author), Planqué, S. (author), van Lom, M. (author), Niemantsverdrie, J. (author), Cornelisse, R. (author), Bijlenga, N. (author), Fransen, F. (author), Kerkdijk, R. (author), Seepers, R.M. (author), Ingenhoes, G. (author), Speelman, F. (author), Schaffner, C. (author), Alexander, P. (author), van Aarsen, J. (author), Helder, J. (author), van Os, R. (author), Richdale, K. (author), Huttner, B. (author), Kooning, L. (author), Doer, C. (author), Pontier, M. (author), Mak, M. (author), Cappers, B. (author), Mengerink, J. (author), van de Pasch, J. (author), Oosterwijk, S. (author), Blokker, J. (author)2018 is a difficult year to summarize for Infosec. After the initial flurry of activity around Spectre and Meltdown in the beginning of January, we ended the year with global supply chain concerns brought about by the Super Micro story. Throughout the year we saw the geopolitical dilemmas of 2018 manifest in cyber security issues. Technology...other 2019
- document
- Fransen, F. (author), Neef, R.M. (author), Zielstra, A. (author) report 2019
- document
-
Maathuis, C.E. (author), Wolters, P. (author), van den Berg, J. (author)Due to the advancement of technology and continuing emergence of international conflict situations, wars are now also conducted into the official new battlefield: cyberspace. Although several incidents have been characterized in terms of cyber operations, there is an important gap in the existing body of knowledge concerning the definition of...article 2018
- document
-
Sluis, H.J.D. (author), Tejada, R. (author)This article provides a brief introduction to the Cooperative, Connected and Automated Mobility strategy define by the European Commission in 2016. Its main challenges are then summarized, with and emphasis in vehicle communication technology for automated driving. Finally, an overview of several recent European projects that aim to meet these...article 2018
- document
-
Young, H.J. (author), van Vliet, A.J. (author), van de Ven, J.G.S. (author), Jol, S.C. (author), Broekman, C.C.M.T. (author)The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing entities’ behavior to inhibit undesirable behavior...conference paper 2018
- document
- Veugen, P.J.M. (author) other 2018