[go: up one dir, main page]

Follow
Jeroen van der Ham-de Vos
Jeroen van der Ham-de Vos
Associate Professor, University of Twente
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Ethics in cybersecurity research and practice
K Macnish, J Van der Ham
Technology in society 63, 101382, 2020
1292020
Using RDF to describe networks
JJ Van der Ham, F Dijkstra, F Travostino, HMA Andree, CTAM de Laat
Future Generation Computer Systems 22 (8), 862-867, 2006
932006
Using the network description language in optical networks
J van der Ham, P Grosso, R van der Pol, A Toonk, C de Laat
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
882007
Baywatch: Two approaches to measure the effects of blocking access to The Pirate Bay
J Poort, J Leenheer, J Van der Ham, C Dumitru
Telecommunications Policy 38 (4), 383-392, 2014
842014
A distributed topology information system for optical networks based on the semantic web
J Van Der Ham, F Dijkstra, P Grosso, R Van Der Pol, A Toonk, C De Laat
Optical Switching and Networking 5 (2-3), 85-93, 2008
782008
Toward a Better Understanding of “Cybersecurity”
J van der Ham
Digital Threats: Research and Practice 2 (3), 1-3, 2021
752021
A semantic-web approach for modeling computing infrastructures
M Ghijsen, J Van Der Ham, P Grosso, C Dumitru, H Zhu, Z Zhao, ...
Computers & Electrical Engineering 39 (8), 2553-2565, 2013
572013
Towards an infrastructure description language for modeling computing infrastructures
M Ghijsen, J Van Der Ham, P Grosso, C De Laat
2012 IEEE 10th International Symposium on Parallel and Distributed …, 2012
572012
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure
M Weulen Kranenbarg, TJ Holt, J van der Ham
Crime Science 7 (1), 1-9, 2018
532018
A multi-layer network model based on ITU-T G. 805
F Dijkstra, B Andree, K Koymans, J van der Ham, P Grosso, C de Laat
Computer Networks 52 (10), 1927-1937, 2008
462008
On-demand provisioning of cloud and grid based infrastructure services for collaborative projects and groups
Y Demchenko, C de Laat, J Van der Ham, M Ghijsen, V Yakovenko, ...
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
372011
Communication for goal directed agents
M Dastani, J Van Der Ham, F Dignum
Communication in Multiagent Systems: Agent Communication Languages and …, 2003
342003
A survey of network traffic anonymisation techniques and implementations
N van Dijkhuizen, J van der Ham
ACM Computing Surveys (CSUR) 51 (3), 1-27, 2018
312018
No one drinks from the firehose: How organizations filter and prioritize vulnerability information
S de Smale, R van Dijk, X Bouwman, J van der Ham, M van Eeten
2023 IEEE Symposium on Security and Privacy (SP), 1980-1996, 2023
302023
The NOVI information models
J van der Ham, J Stéger, S Laki, Y Kryftis, V Maglaris, C de Laat
Future Generation Computer Systems 42, 64-73, 2015
302015
A path finding implementation for multi-layer networks
F Dijkstra, J van der Ham, P Grosso, C de Laat
Future Generation Computer Systems 25 (2), 142-146, 2009
302009
Ethics and internet measurements
J Van Der Ham, R van Rijswijk-Deij
Journal of Cyber Security and Mobility 5 (4), 287-308, 2016
282016
A semantic model for complex computer networks: the network description
JJ van der Ham
272010
An agent based network resource planner for workflow applications
Z Zhao, P Grosso, J Van der Ham, R Koning, C De Laat
Multiagent and Grid Systems 7 (6), 187-202, 2011
262011
A terminology for control models at optical exchanges
F Dijkstra, B van Oudenaarde, B Andree, L Gommans, P Grosso, ...
IFIP International Conference on Autonomous Infrastructure, Management and …, 2007
262007
The system can't perform the operation now. Try again later.
Articles 1–20