Jeroen van der Ham
Jeroen van der Ham
Associate Professor, University of Twente
Verified email at - Homepage
Cited by
Cited by
Using RDF to describe networks
JJ Van der Ham, F Dijkstra, F Travostino, HMA Andree, CTAM de Laat
Future Generation Computer Systems 22 (8), 862-867, 2006
Using the network description language in optical networks
J van der Ham, P Grosso, R van der Pol, A Toonk, C de Laat
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
A distributed topology information system for optical networks based on the semantic web
J Van Der Ham, F Dijkstra, P Grosso, R Van Der Pol, A Toonk, C De Laat
Optical Switching and Networking 5 (2-3), 85-93, 2008
Baywatch: Two approaches to measure the effects of blocking access to The Pirate Bay
J Poort, J Leenheer, J van der Ham, C Dumitru
Telecommunications Policy 38 (4), 383-392, 2014
Ethics in cybersecurity research and practice
K Macnish, J Van der Ham
Technology in society 63, 101382, 2020
A semantic-web approach for modeling computing infrastructures
M Ghijsen, J Van Der Ham, P Grosso, C Dumitru, H Zhu, Z Zhao, ...
Computers & Electrical Engineering 39 (8), 2553-2565, 2013
Towards an infrastructure description language for modeling computing infrastructures
M Ghijsen, J Van Der Ham, P Grosso, C De Laat
2012 IEEE 10th International Symposium on Parallel and Distributed …, 2012
A multi-layer network model based on ITU-T G. 805
F Dijkstra, B Andree, K Koymans, J van der Ham, P Grosso, C de Laat
Computer Networks 52 (10), 1927-1937, 2008
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure
M Weulen Kranenbarg, TJ Holt, J van der Ham
Crime Science 7 (1), 1-9, 2018
On-demand provisioning of cloud and grid based infrastructure services for collaborative projects and groups
Y Demchenko, C de Laat, J Van der Ham, M Ghijsen, V Yakovenko, ...
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
Toward a Better Understanding of “Cybersecurity”
J van der Ham
Digital Threats: Research and Practice 2 (3), 1-3, 2021
Communication for goal directed agents
M Dastani, J Van Der Ham, F Dignum
Communication in Multiagent Systems: Agent Communication Languages and …, 2003
A path finding implementation for multi-layer networks
F Dijkstra, J van der Ham, P Grosso, C de Laat
Future Generation Computer Systems 25 (2), 142-146, 2009
A survey of network traffic anonymisation techniques and implementations
N van Dijkhuizen, J van der Ham
ACM Computing Surveys (CSUR) 51 (3), 1-27, 2018
The NOVI information models
J van der Ham, J Stéger, S Laki, Y Kryftis, V Maglaris, C de Laat
Future Generation Computer Systems 42, 64-73, 2015
An agent based network resource planner for workflow applications
Z Zhao, P Grosso, J Van der Ham, R Koning, C De Laat
Multiagent and Grid Systems 7 (6), 187-202, 2011
A terminology for control models at optical exchanges
F Dijkstra, B van Oudenaarde, B Andree, L Gommans, P Grosso, ...
Inter-Domain Management: First International Conference on Autonomous …, 2007
Resource discovery and allocation for federated virtualized infrastructures
C Pittaras, C Papagianni, A Leivadeas, P Grosso, J van der Ham, ...
Future Generation Computer Systems 42, 55-63, 2015
A semantic model for complex computer networks: the network
JJ van der Ham
Network 3 (3), 2, 2010
Open cloud exchange (OCX): Architecture and functional components
Y Demchenko, J Van Der Ham, C Ngo, T Matselyukh, S Filiposka, ...
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20