default search action
Thijs van Ede
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e1]Italo Jose da Silva Oliveira, Pedro Paulo F. Barcelos, Rodrigo F. Calhau, Claudenir M. Fonseca, Guendalina Righetti, Stefano De Giorgis, Guendalina Righetti, Gabriele Sacco, Maria M. Hedblom, Oliver Kutz, Martin Glauer, Mirjam Stappel, Cássia Trojahn, María Poveda-Villalón, Daniel Garijo, César Henrique Bernabé, Asiyah Yu Lin, Francesco Compagno, Anna Fensel, Walter Terkaj, Guendalina Righetti, Greta Adamo, Damion M. Dooley, Michaela Kümpel, Georgeta Bordea, Robert Warren, Anoosha Sehar, Matthew Lange, Felix Bindt, Ido Toxopeus, Davide Audrito, Francesca Grasso, Roberto Nai, Emilio Sulis, John Beverley, Mark Jensen, Sergio de Cesare, Frederik Gailly, Giancarlo Guizzardi, Chris Partridge, Oscar Pastor, Alexander García Castro, Thomas Hubauer, Wolfgang Süß, Philipp Schmurr, Greta Adamo, Max Willis, Daniele Francesco Santamaria, Thijs van Ede, Dan Klein, Gal Engelberg, Gianpietro Castiglione, Giampaolo Bella, Andrea Continella, Giancarlo Guizzardi, Davide Lanti, Alessandro Mosca, Federico Maria Scafoglieri, Guohui Xiao, Krzysztof Kutt, Jesualdo Tomás Fernández-Breis, Alois Pichler, Gábor Palkó, Grzegorz J. Nalepa, Pawel Garbacz, Robert Pergl, Zubeida Casmod Khan, Pedro Paulo F. Barcelos, João Moreira, Adrien Barton, Emilio M. Sanfilippo, Laura Daniele, João Paulo A. Almeida, Enrico Franconi, Paul Johannesson, Chiara Ghidini, Veruska Zamborlini:
Proceedings of the Joint Ontology Workshops (JOWO) - Episode X: The Tukker Zomer of Ontology, and satellite events co-located with the 14th International Conference on Formal Ontology in Information Systems (FOIS 2024), Enschede, The Netherlands, July 15-19, 2024. CEUR Workshop Proceedings 3882, CEUR-WS.org 2024 [contents] - 2023
- [c10]Fatemeh Marzani, Fatemeh Ghassemi, Zeynab Sabahi-Kaviani, Thijs van Ede, Maarten van Steen:
Mobile App Fingerprinting through Automata Learning and Machine Learning. IFIP Networking 2023: 1-9 - [c9]Chakshu Gupta, Thijs van Ede, Andrea Continella:
HoneyKube: Designing and Deploying a Microservices-based Web Honeypot. SP (Workshops) 2023: 1-11 - 2022
- [c8]Luca Morgese Zangrandi, Thijs van Ede, Tim M. Booij, Savio Sciancalepore, Luca Allodi, Andrea Continella:
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles. ACSAC 2022: 467-480 - [c7]Thijs van Ede, Niek Khasuntsev, Bas Steen, Andrea Continella:
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies. CCSW 2022: 63-74 - [c6]Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna:
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. SP 2022: 522-539 - [c5]Max Meijer, Giacomo Tommaso Petrucci, Matthijs Schotsman, Luca Morgese Zangrandi, Thijs van Ede, Andrea Continella, Ganduulga Gankhuyag, Luca Allodi, Savio Sciancalepore:
Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation. WF-IoT 2022: 1-8 - 2020
- [c4]Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter:
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. NDSS 2020 - [c3]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter:
HeadPrint: detecting anomalous communications through header-based application fingerprinting. SAC 2020: 1696-1705
2010 – 2019
- 2019
- [c2]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. SecureComm (1) 2019: 450-471 - 2017
- [c1]Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint