1. 2019
  2. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Gustafson, S. S. (ed.). Institute of Electrical and Electronics Engineers Inc., Vol. 2019-October. p. 438-443 6 p. 8599729

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Grasping cybersecurity: A set of essential mental models

    van den Berg, J., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). IARIA / Curran Associates, Vol. 2019-July. p. 534-543 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. 2018
  5. A computational ontology for cyber operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 1 Jan 2018, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Josang, A. (ed.). IARIA / Curran Associates, Vol. 2018-June. p. 278-287 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  6. A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers

    Herrera-Semenets, V., Pérez-García, O. A., Hernández-León, R., van den Berg, J. & Doerr, C., 2018, In : Expert Systems with Applications. 95, p. 272-279 8 p.

    Research output: Contribution to journalArticleScientificpeer-review

  7. Developing a Cyber Operations Computational Ontology

    Maathuis, C., Pieters, W. & van den Berg, J., 2018, In : Journal of Information Warfare. 17, 3, p. 32-49 18 p.

    Research output: Contribution to journalArticleScientificpeer-review

  8. 2017
  9. No domain left behind: Is Let's Encrypt democratizing encryption?

    Aertsen, M., Korczyński, M., Moura, G. C. M., Tajalizadehkhoob, S. & Van Den Berg, J., 15 Jul 2017, ANRW 2017 - Proceedings of the Applied Networking Research Workshop, Part of IETF-99 Meeting. Association for Computing Machinery (ACM), p. 48-57 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. Applying Bayesian game theory to analyse cyber risks of bank transaction systems

    Van Der Veeken, P., Van Schooten, S., Shinde, R., Dunnewind, M. & Van Den Berg, J., 28 Apr 2017, Proceedings of International Conference on Computing, Analytics and Security Trends, CAST 2016. IEEE, p. 84-89 6 p. 7914945

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. A Social Cyber Contract Theory Model for Understanding National Cyber Strategies

    Bierens, R., Klievink, B. & van den Berg, J., 2017, Proceedings of International Conference on Electronic Government 2017. Springer, p. 166-176 (Lecture Notes in Computer Science; vol. 10428).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. Gebrek aan cyber security bedreigt autonoom rijdende auto

    Leenstra, H., van den Berg, J. & van Wee, B., 2017, In : Verkeerskunde: vaktijdschrift over verkeer en vervoer. 1, p. 8-16

    Research output: Contribution to journalArticleProfessional

  13. Voltage Control in Distributed Generation under Measurement Falsification Attacks

    Ma, M., Herdeiro Teixeira, A., van den Berg, J. & Palensky, P., 2017, In : IFAC-PapersOnLine. 50, 1, p. 8379-8384 6 p.

    Research output: Contribution to journalConference articleScientificpeer-review

Previous 1 2 3 4 5 6 7 8 ...10 Next

ID: 136400