default search action
Jeroen van der Ham
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Ting-Han Chen, Carlotta Tagliaro, Martina Lindorfer, Kevin Borgolte, Jeroen van der Ham-de Vos:
Are You Sure You Want To Do Coordinated Vulnerability Disclosure? EuroS&P Workshops 2024: 307-314 - 2023
- [c20]Etienne Khan, Anna Sperotto, Jeroen van der Ham, Roland van Rijswijk-Deij:
Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers. PAM 2023: 46-68 - [c19]Stephanie de Smale, Rik van Dijk, Xander Bouwman, Jeroen van der Ham, Michel van Eeten:
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information. SP 2023: 1980-1996 - [c18]Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi:
Security Risk Indicator for Open Source Software to Measure Software Development Status. WISA 2023: 143-156 - [i4]Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij:
Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue. CoRR abs/2312.07284 (2023) - 2022
- [c17]Raffaele Sommese, Mattijs Jonker, Jeroen van der Ham, Giovane C. M. Moura:
Assessing e-Government DNS Resilience. CNSM 2022: 118-126 - [c16]Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. RAID 2022: 263-275 - [i3]Koen van Hove, Jeroen van der Ham, Roland van Rijswijk-Deij:
Rpkiller: Threat Analysis from an RPKI Relying Party Perspective. CoRR abs/2203.00993 (2022)
2010 – 2019
- 2018
- [j14]Niels Van Dijkhuizen, Jeroen van der Ham:
A Survey of Network Traffic Anonymisation Techniques and Implementations. ACM Comput. Surv. 51(3): 52:1-52:27 (2018) - 2017
- [c15]Roel van Dijk, Christophe Creeten, Jeroen van der Ham, Jeroen van den Bos:
Model-driven software engineering in practice: privacy-enhanced filtering of network traffic. ESEC/SIGSOFT FSE 2017: 860-865 - [c14]Jeroen van der Ham:
Ethics and Internet Measurements. IEEE Symposium on Security and Privacy Workshops 2017: 247-251 - 2016
- [j13]Jeroen van der Ham, Roland van Rijswijk-Deij:
Ethics and Internet Measurements. J. Cyber Secur. Mobil. 5(4): 287-308 (2016) - 2015
- [j12]Vasilis Maglaris, Chrysa Papagianni, Georgios Androulidakis, Mary Grammatikou, Paola Grosso, Jeroen van der Ham, Cees T. A. M. de Laat, Blazej Pietrzak, Bartosz Belter, József Stéger, Sándor Laki, Mauro Campanella, Sebastià Sallent:
Toward a holistic federated future internet experimentation environment: the experience of NOVI research and experimentation. IEEE Commun. Mag. 53(7): 136-144 (2015) - [j11]Farabi Muhammad Iqbal, Jeroen van der Ham, Fernando A. Kuipers:
Technology-aware multi-domain multi-layer routing. Comput. Commun. 62: 85-96 (2015) - [j10]Chariklis Pittaras, Chrysa Papagianni, Aris Leivadeas, Paola Grosso, Jeroen van der Ham, Symeon Papavassiliou:
Resource discovery and allocation for federated virtualized infrastructures. Future Gener. Comput. Syst. 42: 55-63 (2015) - [j9]Jeroen van der Ham, József Stéger, Sándor Laki, Yiannos Kryftis, Vasilis Maglaris, Cees T. A. M. de Laat:
The NOVI information models. Future Gener. Comput. Syst. 42: 64-73 (2015) - [j8]Aimee van Wynsberghe, Jeroen van der Ham:
Ethical considerations of using information obtained from online file sharing sites: The case of the piratebay. J. Inf. Commun. Ethics Soc. 13(3/4): 256-267 (2015) - 2014
- [c13]Sven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck:
Ethics in Data Sharing: Developing a Model for Best Practice. IEEE Symposium on Security and Privacy Workshops 2014: 5-9 - [i2]Jeroen van der Ham, Mattijs Ghijsen, Paola Grosso, Cees de Laat:
Trends in Computer Network Modeling Towards the Future Internet. CoRR abs/1402.3951 (2014) - 2013
- [j7]Mattijs Ghijsen, Jeroen van der Ham, Paola Grosso, Cosmin Dumitru, Hao Zhu, Zhiming Zhao, Cees de Laat:
A semantic-web approach for modeling computing infrastructures. Comput. Electr. Eng. 39(8): 2553-2565 (2013) - [c12]Yuri Demchenko, Jeroen van der Ham, Canh Ngo, Taras Matselyukh, Sonja Filiposka, Cees de Laat, Eduard Escalona:
Open Cloud eXchange (OCX): Architecture and Functional Components. CloudCom (2) 2013: 81-87 - 2012
- [c11]Mattijs Ghijsen, Jeroen van der Ham, Paola Grosso, Cees de Laat:
Towards an Infrastructure Description Language for Modeling Computing Infrastructures. ISPA 2012: 207-214 - [c10]Zhiming Zhao, Jeroen van der Ham, Arie Taal, Ralph Koning, Cosmin Dumitru, Adianto Wibisono, Paola Grosso, Cees de Laat:
Planning Data Intensive Workflows on Inter-domain Resources Using the Network Service Interface (NSI). SC Companion 2012: 150-156 - [c9]Chariklis Pittaras, Mattijs Ghijsen, Adianto Wibisono, Paola Grosso, Jeroen van der Ham, Cees de Laat:
Semantic Distributed Resource Discovery for Multiple Resource Providers. SKG 2012: 225-228 - 2011
- [j6]Zhiming Zhao, Paola Grosso, Jeroen van der Ham, Ralph Koning, Cees de Laat:
An agent based network resource planner for workflow applications. Multiagent Grid Syst. 7(6): 187-202 (2011) - [c8]Yuri Demchenko, Jeroen van der Ham, Volodymyr Yakovenko, Cees de Laat, Mattijs Ghijsen, Mihai Cristea:
On-demand provisioning of Cloud and Grid based infrastructure services for collaborative projects and groups. CTS 2011: 134-142 - [c7]Leonidas Lymberopoulos, Paola Grosso, Chrysa Papagianni, Dimitrios Kalogeras, Georgios Androulidakis, Jeroen van der Ham, Cees de Laat, Vasilis Maglaris:
Managing federations of virtualized infrastructures: A semantic-aware policy based approach. Integrated Network Management 2011: 1235-1242 - 2010
- [c6]Zhiming Zhao, Paola Grosso, Ralph Koning, Jeroen van der Ham, Cees de Laat:
An Architecture Including Network QoS in Scientific Workflows. GCC 2010: 104-109 - [c5]Zhiming Zhao, Paola Grosso, Ralph Koning, Jeroen van der Ham, Cees de Laat:
An agent based planner for including network QoS in scientific workflows. IMCSIT 2010: 231-238
2000 – 2009
- 2009
- [j5]Freek Dijkstra, Jeroen van der Ham, Paola Grosso, Cees de Laat:
A path finding implementation for multi-layer networks. Future Gener. Comput. Syst. 25(2): 142-146 (2009) - [i1]Freek Dijkstra, Jeroen van der Ham, Ronald van der Pol:
Network Description Tools and Standards. ERCIM News 2009(77) (2009) - 2008
- [j4]Freek Dijkstra, Bert Andree, Karst Koymans, Jeroen van der Ham, Paola Grosso, Cees de Laat:
A multi-layer network model based on ITU-T G.805. Comput. Networks 52(10): 1927-1937 (2008) - [j3]Jeroen van der Ham, Freek Dijkstra, Paola Grosso, Ronald van der Pol, Andree Toonk, Cees de Laat:
A distributed topology information system for optical networks based on the semantic web. Opt. Switch. Netw. 5(2-3): 85-93 (2008) - 2007
- [c4]Freek Dijkstra, Bas van Oudenaarde, Bert Andree, Leon Gommans, Paola Grosso, Jeroen van der Ham, Karst Koymans, Cees T. A. M. de Laat:
A Terminology for Control Models at Optical Exchanges. AIMS 2007: 49-60 - [c3]Jeroen van der Ham, Paola Grosso, Ronald van der Pol, Andree Toonk, Cees T. A. M. de Laat:
Using the Network Description Language in Optical Networks. Integrated Network Management 2007: 199-205 - 2006
- [j2]Jeroen van der Ham, Freek Dijkstra, Franco Travostino, Hubertus M. A. Andree, Cees T. A. M. de Laat:
Using RDF to describe networks. Future Gener. Comput. Syst. 22(8): 862-867 (2006) - [j1]Freek Dijkstra, Jeroen van der Ham, Cees T. A. M. de Laat:
Using zero configuration technology for IP addressing in optical networks. Future Gener. Comput. Syst. 22(8): 908-914 (2006) - [c2]Jeroen van der Ham, Paola Grosso, Freek Dijkstra, Cees T. A. M. de Laat:
Poster reception - Semantics for hybrid networks using the network description language. SC 2006: 182 - 2003
- [c1]Mehdi Dastani, Jeroen van der Ham, Frank Dignum:
Communication for Goal Directed Agents. Communication in Multiagent Systems 2003: 239-252
Coauthor Index
aka: Cees de Laat
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint