-
1مؤتمر
المؤلفون: Voeten, J.P.M., Vranken, H.P.E.
المصدر: Proceedings of the 26th Euromicro Conference. EUROMICRO 2000. Informatics: Inventing the Future Euromicro Euromicro Conference, 2000. Proceedings of the 26th. 1:193-201 vol.1 2000
Relation: Proceedings of Euromicro Workshop on Multimedia and Telecommunications
-
2مؤتمر
المؤلفون: van Eijndhoven, J.T.J., Sijstermans, F.W., Vissers, K.A., Pol, E.J.D., Tromp, M.I.A., Struik, P., Bloks, R.H.J., van der Wolf, P., Pimentel, A.D., Vranken, H.P.E.
المصدر: Proceedings 1999 IEEE International Conference on Computer Design: VLSI in Computers and Processors (Cat. No.99CB37040) Computer design Computer Design, 1999. (ICCD '99) International Conference on. :586-592 1999
Relation: Proceedings. 1999 IEEE International Conference on Computer Design: VLSI in Computers and Processors. ICCD'99
-
3مؤتمر
المؤلفون: Vranken, H.P.E., Stevens, M.P.J., Segers, M.T.M.
المصدر: Proceedings of 5th International Workshop on Hardware/Software Co Design. Codes/CASHE '97 Hardware/software codesign Hardware/Software Codesign, 1997. (CODES/CASHE '97), Proceedings of the Fifth International Workshop on. :35-39 1997
Relation: Proceedings of 5th International Workshop on Hardware/Software Co Design. Codes/CASHE '97
-
4مؤتمر
المؤلفون: Vranken, H.P.E., Stevens, M.P.J., Segers, M.T.M., van Rhee, J.H.M.M.
المصدر: Proceedings., International Test Conference International test conference 1994 Test Conference, 1994. Proceedings., International. :134-142 1994
Relation: Proceedings of International Test Conference
-
5دورية أكاديمية
المؤلفون: Vranken, H.P.E., Witteman, M.F., Van Wuijtswinkel, R.C.
المصدر: IEEE Design & Test of Computers IEEE Des. Test. Comput. Design & Test of Computers, IEEE. 13(3):79-86 Jan, 1996
-
6
المؤلفون: van Roosmalen, Jos, Vranken, H.P.E., van Eekelen, M.C.J.D.
المساهمون: Haddad , Hisham M., Wainwright , Roger L., Chbeir , Richard
المصدر: van Roosmalen, J, Vranken, H P E & van Eekelen, M C J D 2018, Applying deep learning on packet flows for botnet detection : Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing . in H M Haddad, R L Wainwright & R Chbeir (eds), Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France . acm, New York, pp. 1629-1636, 33rd Annual {ACM} Symposium on Applied Computing, {SAC}, Pau, France, 9/04/18 . https://doi.org/10.1145/3167132
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::080d1ebce918d180526383a869961889
https://hdl.handle.net/1820/2b8106f6-2640-4165-bd95-b02b434bd834 -
7
المؤلفون: van Roosmalen, Jos, Vranken, H.P.E., van Eekelen, M.C.J.D., Haddad, Hisham M., Wainwright, Roger L., Chbeir, Richard
المساهمون: Department Computer Science, RS-Research Line Resilience (part of LIRS program), Academic Field Technology
المصدر: Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, 1629-1636
STARTPAGE=1629;ENDPAGE=1636;TITLE=Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, Franceوصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=narcis______::abfca5185eb4aab860b9cdf14d514528
https://research.ou.nl/en/publications/2b8106f6-2640-4165-bd95-b02b434bd834 -
8
المساهمون: Haddad, H.H.
المصدر: SAC
Haddad, H.H. (ed.), SAC18: The 17th edition of the Computer Security track at the 33rd ACM Symposium on Applied Computing, 9-13 April 2018, Pau, France, pp. 1629-1637
Haddad, H.H. (ed.), SAC18: The 17th edition of the Computer Security track at the 33rd ACM Symposium on Applied Computing, 9-13 April 2018, Pau, France, 1629-1637. New York : ACM
STARTPAGE=1629;ENDPAGE=1637;TITLE=Haddad, H.H. (ed.), SAC18: The 17th edition of the Computer Security track at the 33rd ACM Symposium on Applied Computing, 9-13 April 2018, Pau, Franceمصطلحات موضوعية: Software_OPERATINGSYSTEMS, Network security, business.industry, Computer science, Network packet, Deep learning, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Botnet, 020206 networking & telecommunications, 02 engineering and technology, Intrusion detection system, Internet security, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, 0202 electrical engineering, electronic engineering, information engineering, ComputingMilieux_COMPUTERSANDSOCIETY, 020201 artificial intelligence & image processing, Artificial intelligence, Digital Security, business, Computer network
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19fadd587f0c752f5dae3b95a22e1868
https://doi.org/10.1145/3167132.3167306 -
9
المساهمون: Brynielsson, Joel, Johansson , Fredrik, RS-Research Line Resilience (part of LIRS program), Department Computer Science
المصدر: Pijpker, J & Vranken, H P E 2016, The Role of Internet Service Providers in Botnet Mitigation . in J Brynielsson & F Johansson (eds), 2016 European Intelligence and Security Informatics Conference, Proceedings : 17–19 August 2016 Uppsala, Sweden . IEEE Computer Society Press, pp. 24-32, European Intelligence and Security Informatics Conference, Uppsala, Sweden, 17/08/16 . https://doi.org/10.1109/EISIC.2016.013
2016 European Intelligence and Security Informatics Conference, Proceedings: 17–19 August 2016 Uppsala, Sweden, 24-32
STARTPAGE=24;ENDPAGE=32;TITLE=2016 European Intelligence and Security Informatics Conference, Proceedings
EISICمصطلحات موضوعية: business.industry, Computer science, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, 05 social sciences, Botnet, 020206 networking & telecommunications, 02 engineering and technology, Scientific literature, Computer security, computer.software_genre, Internet service provider, Empirical research, Incentive, 0502 economics and business, 0202 electrical engineering, electronic engineering, information engineering, The Internet, 050207 economics, business, computer, Reference model
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::402162c159ee9dc7f4409ea4b22f3cc0
https://hdl.handle.net/1820/735b915d-42eb-40fa-b33d-263da9bc984c -
10
المؤلفون: Kiljan, S.Z., Vranken, H.P.E., van Eekelen, M.C.J.D., Callegari, Christian, van Sinderen, Maarten, Sarigiannidis, Panagiotis, Samarati, Pierangela, Cabello, Enrique, Lorenz, Pascal, Obaidat, Mohammad S.
المساهمون: Callegari, C., Callegari, Christian, van Sinderen, Maarten, Sarigiannidis, Panagiotis, Samarati, Pierangela, Cabello, Enrique, Lorenz, Pascal, Obaidat, Mohammad S., Academic Field Technology, RS-Research Program Learning and Innovation in Resilient systems (LIRS), RS-Research Line Resilience (part of LIRS program), Department Computer Science
المصدر: Callegari, C. (ed.), SECRYPT 2016 : Proceedings of the International Conference on Security and Cryptography, 26-28 July, Lisbon, Portugal 2016, pp. 259-270
Kiljan, S Z, Vranken, H P E & van Eekelen, M C J D 2016, User-friendly Manual Transfer of Authenticated Online Banking Transaction Data : A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme . in C Callegari, M van Sinderen, P Sarigiannidis, P Samarati, E Cabello, P Lorenz & M S Obaidat (eds), Proceedings of the 13th International Joint Conference on e-Business and Telecommunications : July 26-28, 2016, in Lisbon, Portugal . vol. 4, SCITEPRESS-Science and Technology Publications, Lda., pp. 259-270, 13th International Joint Conference on e-Business and Telecommunications, Lisbon, Portugal, 26/07/16 . https://doi.org/10.5220/0005965102590270
Callegari, C. (ed.), SECRYPT 2016 : Proceedings of the International Conference on Security and Cryptography, 26-28 July, Lisbon, Portugal 2016, 259-270. Setubal : SCITEPRESS
STARTPAGE=259;ENDPAGE=270;TITLE=Callegari, C. (ed.), SECRYPT 2016 : Proceedings of the International Conference on Security and Cryptography, 26-28 July, Lisbon, Portugal 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications: July 26-28, 2016, in Lisbon, Portugal, 4, 259-270
SECRYPTمصطلحات موضوعية: Scheme (programming language), User Friendly, Authentication, business.industry, Computer science, Process (computing), Usability, Computer security, computer.software_genre, Factor (programming language), Digital Security, business, Mobile device, computer, Transaction data, computer.programming_language
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c219d899fb490fa996e45cc23a5662ec
https://hdl.handle.net/2066/161347