Searched for: subject%3A%22Security%22
(1 - 20 of 1,655)

Pages

document
Villani, M.L. (author), de Nicola, A. (author), Bouma, H. (author), van Rooijen, A. (author), Räsänen, P. (author), Peltola, J. (author), Toivonen, S. (author), Guarneri, M. (author), Stifini, C. (author), de Dominicis, L. (author)
Preventing terrorist attacks at soft targets has become a priority for our society. The realiza tion of sensor systems for automatic threat detection in crowded spaces, such as airports and metro stations, is challenged by the limited sensing coverage capability of the devices in place due to the variety of dangerous materials, to the scanning...
article 2023
document
van de Kleij, R. (author), van't Hoff—De Goede, S. (author), van de Weijer, S. (author), Leukfeldt, R. (author)
People tend to disclose personal identifiable information (PII) that could be used by cybercriminals against them. Often persuasion techniques are used by cybercriminals to trick people to disclose PII. This research investigates whether people can be made less susceptible to persuasion by reciprocation (i.e., making people feel obligated to...
article 2023
document
Dimitrovski, T. (author), Bergman, T. (author), Zuraniewski, P. (author)
The use of Machine Learning in many control and management processes is rising fast. This is especially true for the management of cloud native applications and for anomaly detection in cyber-security mechanisms. However, it has been shown that ML is an attack surface on its own, especially when the attack is performed by another ML system....
conference paper 2023
document
van der Kleij, R. (author), Schraagen, J.M. (author), Cadet, B. (author), Young, H. (author)
Cybersecurity threat and incident managers in large organizations, especially in the financial sector, are confronted more and more with an increase in volume and complexity of threats and incidents. At the same time, these managers have to deal with many internal processes and criteria, in addition to requirements from external parties, such as...
article 2022
document
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)
Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...
conference paper 2022
document
Bearfield, G. (author), van Gulijk, C. (author), Parkinson, S. (author), Thomas, R.J. (author)
In the past decade rapid digitalisation of railway assets - including signalling and rolling stock - has occurred in parallel with a rising cyber security threat to critical national infrastructure. Rail safety requirements remain stringent and legacy standards for delivering safe, high integrity, complex digital systems exist. Security...
conference paper 2022
document
Misstanden kunnen in iedere organisatie voorkoman. Het is belangrijk dat we goed met misstanden omgaan. Zodat we ervan leren en verbeteren. In de 'Regeling bij een vermoeden van een misstand TNO' lees je wat je kunt doen bij het (vermoeden van) een misstand. Deze infographic vat de regeling samen.
other 2022
document
other 2022
document
van der Kleij, R. (author)
Mensen spelen een belangrijke rol bij het ontstaan van cybersecurity-incidenten. Sommigen beweren zelfs dat de mens de primaire aanvalsvector is voor cybercriminelen. De medewerker vormt dan ook een groot risico voor organisaties. Oplossingen zijn veelal gericht op het voorkomen van ongewenste voorvallen door het implementeren van...
public lecture 2022
document
van Gulijk, C. (author), Bearfield, G. (author), Thomas, R. (author)
public lecture 2022
document
Spini, G. (author), Mancini, E. (author), Attema, T. (author), Abspoel, M. (author), de Gier, J. (author), Fehr, S. (author), Veugen, T. (author), van Heesch, M. (author), Worm, D. (author), de Luca, A. (author), Cramer, R. (author), Sloot, P.M.A. (author)
BackgroundHIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments based on clinical trials and expert knowledge. The usability of some CDSSs for HIV treatment would be significantly improved by using the...
article 2022
document
van Gulijk, C. (author), van der Beek, D. (author), Zoomer, T. (author), Kwantes, J.H. (author)
public lecture 2022
document
Garufo, A. (author), Carluccio, G. (author)
Analytical formulations of the active admittance and impedance of connected arrays based on dipole and slot antennas, respectively, when elements are arranged in a hexagonal lattice, are presented. Different canonical dielectric layers stratifications are considered. The formulations is based on multi-layer Green’s function spectral...
conference paper 2022
document
Bergstra, A.D. (author), Trijssenaar-Buhre, I.J.M. (author), de Bekker-Grob, E.W. (author), Burdorf, A. (author)
The release of hazardous materials due to transport accidents can have major health consequences for bystanders. The number of casualties will partly be determined by their protective behaviour. This study describes a three-step approach to predict health consequences of protective behaviour (for example, hiding or escaping) of bystanders in the...
article 2022
document
Werkhoven, P. (author), Bouwman, J. (author), van Diggelen, J. (author), Dijk, J. (author), van der Meulen, M. (author), Neerincx, M. (author), Raaijmakers, S. (author), van Veenstra, A.F. (author)
TNO has lived up to its motto ‘Innovation for life’ by playing a significant part in this digital revolution, with major breakthroughs in computer simulation, network transactions, wireless communication, cyber security, optical satellite communication and quantum computing.
report 2022
document
Bearfield, G. (author), van Gulijk, C. (author), Thomas, R. (author)
Safety critical functions of the engineered railway need to perform at levels of integrity that are so high that an acceptable failure rate cannot be demonstrated through testing alone. Where such functions need to be implemented in complex programmable electronic systems certain design, build and test requirements are defined in technical...
article 2022
document
de Boer, M.H.T. (author), Vethman, S. (author), Bakker, R.M. (author), Adhikari, A. (author), Marcus, M.J.H. (author), de Greeff, J. (author), van der Waa1, J. (author), Schoonderwoerd, T.A.J. (author), Tolios, I. (author), van Zoelen, E.M. (author), Hillerström, F.H.J. (author), Kamphorst, B.J. (author)
conference paper 2022
document
Kamphorst, B. (author), Rooijakkers, T. (author), Veugen, T. (author), Cellamare, M. (author), Knoors, D. (author)
article 2022
document
Kumaresan, A. (author), Kandasamy, N.K. (author), Kooij, R.E. (author)
The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has resulted in the necessity for smart controllers on such DERs. Inverters...
article 2022
document
van Schie, T.C.C. (author), Kamphuis, Y.N. (author), Rademaker, M. (author), Faesen, L. (author), Verdaasdonk, W.C.R. (author), van Berlo, M.P.W. (author)
report 2022
Searched for: subject%3A%22Security%22
(1 - 20 of 1,655)

Pages