Pages
- 1
- 2
- document
-
Dimitrovski, T. (author), Bergman, T. (author), Zuraniewski, P. (author)The use of Machine Learning in many control and management processes is rising fast. This is especially true for the management of cloud native applications and for anomaly detection in cyber-security mechanisms. However, it has been shown that ML is an attack surface on its own, especially when the attack is performed by another ML system....conference paper 2023
- document
-
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...conference paper 2022
- document
-
Kumaresan, A. (author), Kandasamy, N.K. (author), Kooij, R.E. (author)The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has resulted in the necessity for smart controllers on such DERs. Inverters...article 2022
- document
- Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, E. (author), Moustafa, N. (author), Hartog, F.T.H.D. (author) article 2022
- document
-
Aliman, N.M. (author), Kester, L. (author)In this paper, we introduce “scientific and empirical adversarial AI attacks” (SEA AI attacks) as umbrella term for not yet prevalent but technically feasible deliberate malicious acts of specifically crafting AI-generated samples to achieve an epistemic distortion in (applied) science or engineering contexts. In view of possible socio-psycho...conference paper 2021
- document
-
Abspoel, M. (author), Attema, T. (author), Rambaud, M. (author)We consider consensus protocols in the model that is most commonly considered for use in state machine replication, as initiated by Dwork-Lynch-Stockmeyer, then by Castro-Liskov in 1999 with “PBFT”. Such protocols guarantee, assuming n players out of which t < n/3 are maliciously corrupted, that the honest players output the same valid value...conference paper 2021
- document
-
Nair, V.V. (author), van Staalduinen, M. (author), Oosterman, D.T. (author)The rapid rise of the Dark Web and supportive technologies has served as the backbone facilitating online illegal activity worldwide. These illegal activities supported by anonymisation technologies such as Tor has made it increasingly elusive to law enforcement agencies. Despite several successful law enforcement operations, illegal activity on...conference paper 2021
- document
-
Lathouwers, S. (author), Everts, M.H. (author), Huisman, M. (author)String sanitizers are widely used functions for preventing injection attacks such as SQL injections and cross-site scripting (XSS). It is therefore crucial that the implementations of such string sanitizers are correct. We present a novel approach to reason about a sanitizer's correctness by automatically generating a model of the implementation...conference paper 2020
- document
- Müller, M. (author), de Jong, J. (author), van Heesch, M.P.P. (author), Overeinder, B. (author), van Rijswijk-Deij, R. (author) article 2020
- document
- den Hollander, R.J.M. (author), Adhikari, A. (author), Tolios, I. (author), van Bekkum, M. (author), Bal, A. (author), Hendriks, S. (author), Kruithof, M.C. (author), Gross, D. (author), Jansen, N. (author), Perez, G. (author), Buurman, K. (author), Raaijmakers, S.A. (author) conference paper 2020
- document
- Spini, G. (author), Zemor, G. (author) article 2020
- document
-
van den Hoogen, B. (author), Uijens, W. (author), den Hollander, R. (author), Huizinga, W. (author), Dijk, J. (author), Schutte, K. (author)Automatic detection and tracking of persons and vehicles can greatly increase situational awareness in many military applications. Various methods for detection and tracking have been proposed so far, both for rule-based and learning approaches. With the advent of deep learning, learning approaches generally outperform rule-based approaches. Pre...conference paper 2020
- document
-
mohajeri Parizi, M. (author), Sileno, G. (author), van Engers, T. (author)Computational agents based upon the belief-desire-intention (BDI) architecture generally use reactive rules to trigger the execution of plans. For various reasons, certain plans might be preferred over others at design time. Most BDI agents platforms use hard-coding these preferences in some form of the static ordering of the reactive rules, but...conference paper 2019
- document
-
Pruim, R.H.R. (author), van Opbroek, A. (author), Kruithof, M.C. (author), den Hollander, R.J.M. (author), Baan, J. (author), van den Broek, S.P. (author), van der Stap, N. (author), Dijk, J. (author)Automatic detection and tracking of maritime targets in imagery can greatly increase situation awareness on naval vessels. Various methods for detection and tracking have been proposed so far, both for reasoning as well as for learning approaches. Learning approaches have the promise to outperform reasoning approaches. They typically detect...conference paper 2019
- document
-
de Jong, R.J. (author), Heiligers, M.J.C. (author), de Wit, J.J.M. (author), Uysal, F. (author)Camera systems are widely used for surveillance in the security and defense domains. The main advantages of camera systems are their high resolution, their ease of use, and the fact that optical imagery is easy to interpret for human operators. However, particularly when considering application in the defense domain, cameras have some...conference paper 2019
- document
-
Hu, J. (author), Yang, G. (author), Ziras, C. (author), Kok, K. (author)The future renewable-based power system will have an increased need for balancing power. Prosumers, having both generation and consumption capabilities, are expected to provide balancing power to the grid, if their flexibility can be appropriately managed. Meanwhile, undesirable line congestions and voltage violations may arise in the...article 2019
- document
-
Koning, R. (author), Deljoo, A. (author), Meijer, L. (author), Laat, C.D. (author), Grosso, P. (author)Collaborative defences against, for example, Distributed Denial of Service attacks require trust between the collaborators. Even in a trusted alliance of collaborators, some members are more trusted than others with the execution of a specific task. This paper shows that trust can be used as a criterion in collaborative defences against attacks...conference paper 2019
- document
-
van de Kamp, T. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitoring of relations among multiple clients. Since both the clients’ data and the predicates are encrypted, our system is suitable for situations in...conference paper 2018
- document
-
Secure Real-Time Monitoring and Management of Smart Distribution Grid Using Shared Cellular NetworksNielsen, J.J. (author), Ganem, H. (author), Jorguseski, L. (author), Alic, K. (author), Smolnikar, M. (author), Zhu, Z. (author), Pratas, N.K. (author), Golinski, M. (author), Zhang, H. (author), Kuhar, U. (author), Fan, Z. (author), Svigelj, A. (author)Electricity production and distribution is facing two major changes. First, production is shifting from classical energy sources such as coal and nuclear power toward renewable resources such as solar and wind. Second, consumption in the low voltage grid is expected to grow significantly due to the expected introduction of electrical vehicles....article 2017
- document
- Koning, R. (author), Deljoo, A. (author), Trajanovski, S. (author), De Graaff, B. (author), Grosso, P. (author), Gommans, L. (author), van Engers, T. (author), Fransen, F. (author), Meijer, R.J. (author), Wilson, R. (author), De Laat, C. (author) conference paper 2017
Pages
- 1
- 2