Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Jeroen van den Bos"'
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 56, Iss Proc. AMMSE 2011, Pp 15-32 (2011)
Algebraic specification has a long tradition in bridging the gap between specification and programming by making specifications executable. Building on extensive experience in designing, implementing and using specification formalisms that are based
Externí odkaz:
https://doaj.org/article/c95ae3a080914ed68bce34d7fb902387
Publikováno v:
Forensic Science International: Digital Investigation, 38:301125. Elsevier Advanced Technology
van der Meer, V, Jonker, H L & van den Bos, J 2021, ' A Contemporary Investigation of NTFS File Fragmentation ', Forensic Science International: Digital Investigation, vol. 38, 301125 . https://doi.org/10.1016/j.fsidi.2021.301125
Forensic Science International, 38, Supplement, pp. 1-11
Forensic Science International, 38, 1-11
van der Meer, V, Jonker, H L & van den Bos, J 2021, ' A Contemporary Investigation of NTFS File Fragmentation ', Forensic Science International: Digital Investigation, vol. 38, 301125 . https://doi.org/10.1016/j.fsidi.2021.301125
Forensic Science International, 38, Supplement, pp. 1-11
Forensic Science International, 38, 1-11
There is a significant amount of research in digital forensics into analyzing file fragments or reconstructing fragmented data. At the same time, there are no recent measurements of fragmentation on current, in-use computer systems. To close this gap
Publikováno v:
ARES
File carving is a data recovery technique used in many investigations in digital forensics, with some limitations. Especially JPEG files are difficult to recover when fragmented, because they consist almost entirely of large blobs of highly compresse
Autor:
Vincent van der Meer, Harm van Beek, Hugo Jonker, Guy Dols, Jeroen van den Bos, Marko van Eekelen
Publikováno v:
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, pp. 1-6
2019 IEEE International Workshop on Information Forensics and Security (WIFS): Proceedings, 1-6
STARTPAGE=1;ENDPAGE=6;TITLE=2019 IEEE International Workshop on Information Forensics and Security (WIFS)
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, 1-6. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=6;TITLE=WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December
van der Meer, V, Jonker, H, Dols, G, van Beek, H, van den Bos, J & van Eekelen, M 2020, File Fragmentation in the Wild : A Privacy-Friendly Approach . in 2019 IEEE International Workshop on Information Forensics and Security (WIFS) : Proceedings . IEEE, Delft, pp. 1-6, 2019 IEEE International Workshop on Information Forensics and Security, Delft, Netherlands, 9/12/19 . https://doi.org/10.1109/WIFS47025.2019.9034981
WIFS
2019 IEEE International Workshop on Information Forensics and Security (WIFS): Proceedings, 1-6
STARTPAGE=1;ENDPAGE=6;TITLE=2019 IEEE International Workshop on Information Forensics and Security (WIFS)
WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December, 1-6. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=6;TITLE=WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12-December
van der Meer, V, Jonker, H, Dols, G, van Beek, H, van den Bos, J & van Eekelen, M 2020, File Fragmentation in the Wild : A Privacy-Friendly Approach . in 2019 IEEE International Workshop on Information Forensics and Security (WIFS) : Proceedings . IEEE, Delft, pp. 1-6, 2019 IEEE International Workshop on Information Forensics and Security, Delft, Netherlands, 9/12/19 . https://doi.org/10.1109/WIFS47025.2019.9034981
WIFS
Digital forensic tooling should be based on reference data. Such reference data can be gathered by measuring a baseline, e.g. from volunteers. However, the privacy provisions in digital forensics tools are typically tailored for criminal investigatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6fd9c312e7c8f2690cb89a511b23b239
https://hdl.handle.net/2066/219343
https://hdl.handle.net/2066/219343
Autor:
Rute Lemos, Julius Weimper, João Alfredo Santos, F. Pedro, José Sande, Rita Carvalho, Alberto Alvarellos, Bas Hofland, Maria Teresa Reis, Nils B. Kerpen, Enrique Peña, Antje Bornschein, Andrés Figuero, Bastian Dost, Jeroen van den Bos, Mário Coimbra, Conceição Juana Fortes, Moritz Körner, Reinhard Pohl
Publikováno v:
Repositório Científico de Acesso Aberto de Portugal
Repositório Científico de Acesso Aberto de Portugal (RCAAP)
instacron:RCAAP
Defect and Diffusion Forum
Repositório Científico de Acesso Aberto de Portugal (RCAAP)
instacron:RCAAP
Defect and Diffusion Forum
A set of scale-model tests carried out to enlarge the range of wave steepness values analysed in run-up, overtopping and armour layer stability studies, focusing on oblique extreme wave conditions and on their effects on a gentler slope breakwater’
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::108cf2395c5435090b14efeb1fe633b7
Autor:
Jeroen van den Bos, Atze van der Ploeg, Bas Basten, Paul Klint, Bert Lisser, Arnold Lankamp, Tijs van der Storm, Mark Hills, Jurgen Vinju
Publikováno v:
Science of Computer Programming
Science of Computer Programming, Elsevier, 2015, 114, pp.7-19. ⟨10.1016/j.scico.2015.11.003⟩
Science of Computer Programming, 114, 7-19
Science of Computer Programming, 2015, 114, pp.7-19. ⟨10.1016/j.scico.2015.11.003⟩
Science of Computer Programming, Elsevier, 2015, 114, pp.7-19. ⟨10.1016/j.scico.2015.11.003⟩
Science of Computer Programming, 114, 7-19
Science of Computer Programming, 2015, 114, pp.7-19. ⟨10.1016/j.scico.2015.11.003⟩
International audience; All software evolves, and programming languages and programming language tools are no exception. And just like in ordinary software construction, modular implementations can help ease the process of changing a language impleme
Publikováno v:
ESEC/SIGSOFT FSE
Network traffic data contains a wealth of information for use in security analysis and application development. Unfortunately, it also usually contains confidential or otherwise sensitive information, prohibiting sharing and analysis. Existing automa
Publikováno v:
Journal of Waterway, Port, Coastal, and Ocean Engineering. 139:157-170
Autor:
Martine Van Puyvelde, Jolien Van Herck, Jeroen Van den Bossche, Frederic Goethals, Daisy Gijbels, Frederic Detaille, Nathalie Pattyn
Publikováno v:
Frontiers in Public Health, Vol 11 (2023)
IntroductionEmergency Medicine (EM) personnel in both military and civilian prehospital settings are often exposed to stressful and extreme events. Therefore, a cross-pollination between both contexts in terms of coping strategies may generate new in
Externí odkaz:
https://doaj.org/article/ac805e6cd66f4ed2adf0405e74ebf9a8
Autor:
Jeroen van den Bos
Publikováno v:
CSMR-WCRE
Binary file formats are regularly extended and modified, often unintentionally in the form of bugs in the implementations of applications and libraries that create files. Applications that need to read data from binary files created by other applicat