Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Jeroen van der Ham"'
Publikováno v:
Crime Science, Vol 7, Iss 1, Pp 1-9 (2018)
Abstract In the computer science field coordinated vulnerability disclosure is a well-known practice for finding flaws in IT-systems and patching them. In this practice, a white-hat hacker who finds a vulnerability in an IT-system reports that vulner
Externí odkaz:
https://doaj.org/article/36aa3c6478b24459a1f78d5d607810f0
It is a public secret that doing email securely is fraught with challenges. We found a vulnerability present at many email providers, allowing us to spoof email on behalf of many organisations. As email vulnerabilities are ten a penny, instead of foc
Externí odkaz:
http://arxiv.org/abs/2312.07284
Publikováno v:
Digital Threats: Research and Practice, 3(2):9. ACM Inc.
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as seen in the rise of detected mobile malware samples per year. The number of active smartphone users is expected to grow, stressing the importance of
Publikováno v:
Proceedings EthiCS 2023: The 2nd International Workshop on Ethics in Computer Security, February 27, 2022, San Diego, CA, USA
Proceedings EthiCS 2023
Proceedings EthiCS 2023
Cybersecurity research involves ethics risks such as accidental privacy breaches, corruption of production services, and discovery of weaknesses in networked systems. Although literature describes these and other issues in some depth, re- flection on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cf63eb20893d1329a34f28da07e10670
https://research.utwente.nl/en/publications/d64d4895-f697-4e73-929f-a9c9c8aaaea7
https://research.utwente.nl/en/publications/d64d4895-f697-4e73-929f-a9c9c8aaaea7
Publikováno v:
Journal of Information, Communication and Ethics in Society, 2015, Vol. 13, Issue 3/4, pp. 256-267.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JICES-10-2014-0044
Publikováno v:
18th International Conference on Network and Service Management
Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name Systems (DNS), which maps e-gov domain names to Internet addresses. Str
Autor:
Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey Deccio, Anna Sperotto, Mattijs Jonker
Publikováno v:
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, 263-275
STARTPAGE=263;ENDPAGE=275;TITLE=Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses
STARTPAGE=263;ENDPAGE=275;TITLE=Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses
Clouds are likely to be well-provisioned in terms of network capacity by design. The rapid growth of cloud-based services means an increased availability of network infrastructure for all types of customers. However, it could also provide attackers o
Autor:
Lucimara Desiderá, Jeroen van der Ham
Publikováno v:
Digital Threats: Research and Practice. 3:1-1
Autor:
Jeroen Van Der Ham
Publikováno v:
Digital Threats, 2(3):18. Association for Computing Machinery
The term “cybersecurity” has gained widespread popularity but has not been defined properly. The term is used by many different people to mean different things in different contexts. A better understanding of “cybersecurity” will allow us a b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::184ce17254fa479fdc0b98ecc34acadd
https://research.utwente.nl/en/publications/4f712276-ad1c-46d1-9f2a-84f76bce97a9
https://research.utwente.nl/en/publications/4f712276-ad1c-46d1-9f2a-84f76bce97a9
Autor:
Jeroen Van der Ham, Andrew Cormack
Publikováno v:
Digital Threats: Research and Practice. 1:1-3