Follow
Jeroen van der Ham
Jeroen van der Ham
Senior Researcher NCSC-NL & Associate Professor, University of Twente
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Using RDF to describe networks
JJ Van der Ham, F Dijkstra, F Travostino, HMA Andree, CTAM de Laat
Future Generation Computer Systems 22 (8), 862-867, 2006
862006
Using the network description language in optical networks
J van der Ham, P Grosso, R van der Pol, A Toonk, C de Laat
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
822007
A distributed topology information system for optical networks based on the semantic web
J Van Der Ham, F Dijkstra, P Grosso, R Van Der Pol, A Toonk, C De Laat
Optical Switching and Networking 5 (2-3), 85-93, 2008
772008
Baywatch: Two approaches to measure the effects of blocking access to The Pirate Bay
J Poort, J Leenheer, J van der Ham, C Dumitru
Telecommunications Policy 38 (4), 383-392, 2014
572014
A semantic-web approach for modeling computing infrastructures
M Ghijsen, J Van Der Ham, P Grosso, C Dumitru, H Zhu, Z Zhao, ...
Computers & Electrical Engineering 39 (8), 2553-2565, 2013
512013
Towards an infrastructure description language for modeling computing infrastructures
M Ghijsen, J Van Der Ham, P Grosso, C De Laat
2012 IEEE 10th International Symposium on Parallel and Distributed …, 2012
512012
A multi-layer network model based on ITU-T G. 805
F Dijkstra, B Andree, K Koymans, J Van Der Ham, P Grosso, C de Laat
Computer Networks 52 (10), 1927-1937, 2008
372008
On-demand provisioning of cloud and grid based infrastructure services for collaborative projects and groups
Y Demchenko, C De Laat, J Van der Ham, M Ghijsen, V Yakovenko, ...
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
332011
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure
M Weulen Kranenbarg, TJ Holt, J van der Ham
Crime science 7 (1), 1-9, 2018
302018
Communication for goal directed agents
M Dastani, J Ham, F Dignum
Communication in Multiagent Systems, 239-252, 2003
302003
The NOVI information models
J van der Ham, J Stéger, S Laki, Y Kryftis, V Maglaris, C de Laat
Future Generation Computer Systems 42, 64-73, 2015
292015
Ethics in cybersecurity research and practice
K Macnish, J van der Ham
Technology in society 63, 101382, 2020
282020
A path finding implementation for multi-layer networks
F Dijkstra, J van der Ham, P Grosso, C de Laat
Future Generation Computer Systems 25 (2), 142-146, 2009
272009
Resource discovery and allocation for federated virtualized infrastructures
C Pittaras, C Papagianni, A Leivadeas, P Grosso, J van der Ham, ...
Future Generation Computer Systems 42, 55-63, 2015
262015
An agent based network resource planner for workflow applications
Z Zhao, P Grosso, J Van der Ham, R Koning, C De Laat
Multiagent and Grid Systems 7 (6), 187-202, 2011
262011
A semantic model for complex computer networks: the network
JJ van der Ham
Network 3 (3), 2, 2010
252010
Open cloud exchange (OCX): Architecture and functional components
Y Demchenko, J Van Der Ham, C Ngo, T Matselyukh, S Filiposka, ...
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
232013
Network Markup Language Base Schema version 1
J van der Ham, F Dijkstra, R Łapacz, J Zurawski
20*2013
The network markup language (nml) a standardized network topology abstraction for inter-domain and cross-layer network applications
J van der Ham, F Dijkstra, R Lapacz, A Brown
Proceedings of the 13th Terena Networking Conference, 2013
172013
A survey of network traffic anonymisation techniques and implementations
N van Dijkhuizen, J van der Ham
ACM Computing Surveys (CSUR) 51 (3), 1-27, 2018
162018
The system can't perform the operation now. Try again later.
Articles 1–20