Follow
Thijs van Ede
Title
Cited by
Cited by
Year
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T Van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Network and distributed system security symposium (NDSS) 27, 2020
2362020
Deepcase: Semi-supervised contextual analysis of security events
T Van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
2022 IEEE Symposium on Security and Privacy (SP), 522-539, 2022
822022
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
582017
Headprint: detecting anomalous communications through header-based application fingerprinting
R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ...
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020
142020
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles
L Morgese Zangrandi, T Van Ede, T Booij, S Sciancalepore, L Allodi, ...
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
102022
Honeykube: designing and deploying a microservices-based web honeypot
C Gupta, T Van Ede, A Continella
2023 IEEE Security and Privacy Workshops (SPW), 1-11, 2023
52023
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies
T van Ede, N Khasuntsev, B Steen, A Continella
Proceedings of the 2022 on Cloud Computing Security Workshop, 63-74, 2022
42022
Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation
M Meijer, GT Petrucci, M Schotsman, LM Zangrandi, T Van Ede, ...
2022 IEEE 8th World Forum on Internet of Things (WF-IoT), 1-8, 2022
32022
Mobile App Fingerprinting through Automata Learning and Machine Learning
F Marzani, F Ghassemi, Z Sabahi-Kaviani, T Van Ede, M Van Steen
2023 IFIP Networking Conference (IFIP Networking), 1-9, 2023
22023
Comprehending Security Events: Context-based Identification and Explanation
TS van Ede
12023
Victim-Aware Adaptive Covert Channels
R Bortolameotti, T van Ede, A Continella, M Everts, W Jonker, P Hartel, ...
Security and Privacy in Communication Networks: 15th EAI International …, 2019
12019
Certainty in lockless concurrent algorithms: An informal proof of lace
T van Ede
Technical Report). University of Twente, 2015
12015
DeepCASE Dashboard
B Jonkhout, J van Zwol, M van Iperen, K Radzkova, K Cepelis, L Trusca, ...
2024
Text2Weak: mapping CVEs to CWEs using description embeddings analysis
S Simonetto, TS van Ede, P Bosch, W Jonker
4th Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics, 2024
2024
SPW 2023
C Gupta, T van Ede, K Lim, JH Kang, D Kim
The system can't perform the operation now. Try again later.
Articles 1–15