Follow
Thijs van Ede
Thijs van Ede
PhD Candidate, University of Twente
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Network and Distributed System Security Symposium (NDSS) 27, 2020
732020
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
392017
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events
T van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
IEEE Security and Privacy, 2022
92022
Headprint: detecting anomalous communications through header-based application fingerprinting
R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ...
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020
72020
Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation
M Meijer, GT Petrucci, M Schotsman, L Morgese, T van Ede, A Continella, ...
IEEE World Forum on IoT, 2022
12022
Victim-Aware Adaptive Covert Channels
R Bortolameotti, T Ede, A Continella, M Everts, W Jonker, P Hartel, ...
International Conference on Security and Privacy in Communication Systems …, 2019
12019
Certainty in lockless concurrent algorithms: An informal proof of lace
T van Ede
Technical Report). University of Twente, 2015
12015
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behaviour profiles
LM Zangrandi, T van Ede, T Booij, S Sciancalepore, L Allodi, A Continella
Annual Computer Security Applications Conference, ACSAC 2022, 2022
2022
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles
L Morgese Zangrandi, T Van Ede, T Booij, S Sciancalepore, L Allodi, ...
Annual Computer Security Applications Conference, 467-480, 2022
2022
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies
T van Ede, N Khasuntsev, B Steen, A Continella
Proceedings of the 2022 on Cloud Computing Security Workshop, 63-74, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–10