Pages
- 1
- 2
- document
-
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...conference paper 2022
- document
- Müller, M. (author), de Jong, J. (author), van Heesch, M.P.P. (author), Overeinder, B. (author), van Rijswijk-Deij, R. (author) article 2020
- document
-
Suri, N. (author), Fronteddu, R. (author), Cramer, E.R. (author), Breedy, M. (author), Marcus, K. (author), Velt, R.I.T. (author), Nilsson, J. (author), Mantovani, M. (author), Campioni, L. (author), Poltronieri, F. (author), Benincasa, G. (author), Ordway, B. (author), Peuhkuri, M. (author), Rautenberg, M. (author)Network-centric warfare depends on the timely dissemination of battlefield information for Situation Awareness (SA) and Command and Control (C2). A significant percentage of SA and C2 data is sent to multiple recipients at the same time, which naturally calls for group communication protocols for efficient dissemination. Several variations of...conference paper 2019
- document
-
Dahlberg, A. (author), Skrzypczyk, M. (author), Coopmans, T. (author), Wubben, L. (author), Rozpedek, F. (author), Pompili, M. (author), Stolk, A. (author), Pawełczak, P. (author), Knegjens, R.J. (author), de Oliveira Filho, J.A. (author), Hanson, R. (author), Wehner, S. (author)Quantum communication brings radically new capabilities that are provably impossible to attain in any classical network. Here, we take the first step from a physics experiment to a fully fledged quantum internet system. We propose a functional allocation of a quantum network stack and construct the first physical and link layer protocols that...conference paper 2019
- document
-
van der Sluis, F. (author), van den Broek, E.L. (author), van Drunen, A. (author), Beerends, J.G. (author)Bandwidth is still a limiting factor for the Quality of Service (QoS) of mobile communication applications. In particular, for Voice over IP the QoS is not yet as good as for common, well-engineered, public-switched telephone networks. Multisensory communication has been identified as a possibility to moderate this limitation. One of the...article 2018
- document
- Nooren, P.A. (author), van Adrichem, N.L.M. (author), D'Acunto, L. (author) conference paper 2018
- document
-
Zuraniewski, P.W. (author), van Adrichem, N.L.M. (author), Ravesteijn, D. (author), IJntema, W. (author), Papadopoulos, C. (author), Fan, C. (author)Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network...conference paper 2017
- document
-
van Adrichem, N.L.M. (author), Wissingh, B.F. (author), Ravesteijn, D. (author), d' Acunto, L. (author)?e end-to-end connection paradigm of TCP/IP does not work well in situations characterized by intermi?ent (or no) global internet connectivity, as o?en is the case in o?shore Wireless Sensor Networks (WSNs), military networks, rural/remote areas and maritime transport. Delay/Disruption Tolerant Networking (DTN) investigates to address these use...conference paper 2017
- document
-
van Adrichem, N.L.M. (author), Wissingh, B. (author), Ravesteijn, D. (author), d' Acunto, L. (author)the end-to-end connection paradigm of TCP/IP does not work well in situations characterized by intermi?ent (or no) global internet connectivity, as o?en is the case in o?shore Wireless Sensor Networks (WSNs), military networks, rural/remote areas and maritime transport. Delay/Disruption Tolerant Networking (DTN) investigates to address these use...conference paper 2017
- document
- Karimzadeh, M. (author), Valtulina, L. (author), van den Berg, H. (author), Pras, A. (author), Liebsch, M. (author), Taleb, T. (author) conference paper 2017
- document
-
Zuraniewski, P. (author), van Adrichem, N. (author), Ravesteijn, D. (author), IJntema, W. (author), Papadopoulos, C. (author), Fan, C. (author)Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network...conference paper 2017
- document
-
Ferrús, R. (author), Sallent, O. (author), Verkoelen, C. (author), Fransen, F. (author), Saijonmaa, J. (author), Olivieri, C. (author), Duits, M. (author), Galin, A. (author), Pangallo, F. (author), Modi, D.P. (author)The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery and security against crime. Nevertheless,...conference paper 2015
- document
-
Myny, K. (author), Tripathi, A.K. (author), van der Steen, J.L. (author), Cobb, B. (author)Thin-film transistor technologies have great potential to become the key technology for leafnode Internet of Things by utilizing the NFC protocol as a communication medium. The main requirements are manufacturability on flexible substrates at a low cost while maintaining good device performance characteristics, necessary to be compatible with...article 2015
- document
-
Hofman, W.J. (author)Interoperability in logistics is a prerequisite for realizing data pipelines and the Physical Internet. Forecasting data, real time data, and actual positions of shipments, containers, and transport means shared via events have to be harmonized and are expected to improve all types of processes, support synchromodal planning, and improve risk...conference paper 2015
- document
-
Zhang, N. (author), Millane, R. (author), Hunter, A.J. (author), Enevoldson, E. (author), Murray, J.E. (author)The problem of estimating wind velocities from limited flight data recordings is considered, with application to sailplane flights in high-altitude mountain waves. Sailplane flight recorders routinely measure only GPS position and, infrequently, also airspeed and the problem is underdetermined. Maximum likelihood and maximum a posteriori...conference paper 2011
- document
-
Kooij, R.E. (author), van der Mei, R.D. (author), Yang, R. (author), TNO Informatie- en Communicatietechnologie (author)Performance modeling of the transport control protocol (TCP) has received a lot of attention over the past few years. The most commonly quoted results are approximate formulas for TCP throughput (Padhye et al. (2000) [1]) and document download times (Cardwell et al. (2000) [2]) which are used for dimensioning of IP networks. However, the...article 2010
- document
-
Duarte, F. (author), Wong, S. (author)In this paper, we present a new architecture of the cache-based memory copy hardware accelerator in a multicore system supporting message passing. The accelerator is able to accelerate memory data movements, in particular memory copies. We perform an analytical analysis based on open-queuing theory to study the utilization of our accelerator in...article 2010
- document
-
Chmielewski, Ł. (author), Hoepman, J.H. (author), van Rossum, P. (author), TNO Informatie- en Communicatietechnologie (author)Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the password. These protocols can be easily adapted to...conference paper 2009
- document
-
Lu, Y. (author), Kuipers, F. (author), Janic, M. (author), van Mieghem, P. (author), TNO Informatie- en Communicatietechnologie (author)Increased Internet speeds together with new possibilities for tailor-made television services have spurred the interest in providing television via the Internet. Several television services are readily available and both IP-layer and application-layer (P2P) technologies are used. When disregarding commercial influences, customers will choose for...bookPart 2008
- document
-
Cremers, A.H.M. (author), de Jong, J.G.M. (author), van Balken, J.S. (author), TNO Defensie en Veiligheid (author)One of the major challenges in current user interface research and development is the accommodation of diversity in users and contexts of use in order to improve the self-efficacy of citizens. A common banking service, which should be designed for diversity, is the Automated Teller Machine (ATM). This paper describes the various user-centered...conference paper 2008
Pages
- 1
- 2