Skip to main content

Showing 1–3 of 3 results for author: van der Ham, J

.
  1. arXiv:2203.00993  [pdf, other

    cs.CR cs.NI

    Rpkiller: Threat Analysis from an RPKI Relying Party Perspective

    Authors: Koen van Hove, Jeroen van der Ham, Roland van Rijswijk-Deij

    Abstract: The Resource Public Key Infrastructure (RPKI) aims to secure internet routing by creating an infrastructure where resource holders can make attestations about their resources. RPKI Certificate Authorities issue these attestations and publish them at Publication Points. Relying Party software retrieves and processes the RPKI-related data from all publication points, validates the data and makes it… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

    Comments: 17 pages

  2. arXiv:2107.11167  [pdf, ps, other

    cs.CR cs.LG

    Dynamic detection of mobile malware using smartphone data and machine learning

    Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur

    Abstract: Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as seen in the rise of detected mobile malware samples per year. The number of active smartphone users is expected to grow, stressing the importance of research on the detection of mobile malware. Detection methods for mobile malware exist but are still limited. In this paper, we provide an overview… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: 14 pages content, 22 pages total, to be published in ACM DTRAP (currently in last revision phase)

    ACM Class: D.4.6

    Journal ref: Digital Threats Research and Practice; Volume 3; Issue 2; June 2022; Article No 9; pp 1-24

  3. arXiv:1402.3951  [pdf, other

    cs.NI

    Trends in Computer Network Modeling Towards the Future Internet

    Authors: Jeroen van der Ham, Mattijs Ghijsen, Paola Grosso, Cees de Laat

    Abstract: This article provides a taxonomy of current and past network modeling efforts. In all these efforts over the last few years we see a trend towards not only describing the network, but connected devices as well. This is especially current given the many Future Internet projects, which are combining different models, and resources in order to provide complete virtual infrastructures to users. An i… ▽ More

    Submitted 5 March, 2014; v1 submitted 17 February, 2014; originally announced February 2014.