Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic T Van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ... Network and distributed system security symposium (NDSS) 27, 2020 | 236 | 2020 |
Deepcase: Semi-supervised contextual analysis of security events T Van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ... 2022 IEEE Symposium on Security and Privacy (SP), 522-539, 2022 | 82 | 2022 |
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ... Proceedings of the 33rd Annual computer security applications Conference …, 2017 | 58 | 2017 |
Headprint: detecting anomalous communications through header-based application fingerprinting R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ... Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020 | 14 | 2020 |
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles L Morgese Zangrandi, T Van Ede, T Booij, S Sciancalepore, L Allodi, ... Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 10 | 2022 |
Honeykube: designing and deploying a microservices-based web honeypot C Gupta, T Van Ede, A Continella 2023 IEEE Security and Privacy Workshops (SPW), 1-11, 2023 | 5 | 2023 |
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies T van Ede, N Khasuntsev, B Steen, A Continella Proceedings of the 2022 on Cloud Computing Security Workshop, 63-74, 2022 | 4 | 2022 |
Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation M Meijer, GT Petrucci, M Schotsman, LM Zangrandi, T Van Ede, ... 2022 IEEE 8th World Forum on Internet of Things (WF-IoT), 1-8, 2022 | 3 | 2022 |
Mobile App Fingerprinting through Automata Learning and Machine Learning F Marzani, F Ghassemi, Z Sabahi-Kaviani, T Van Ede, M Van Steen 2023 IFIP Networking Conference (IFIP Networking), 1-9, 2023 | 2 | 2023 |
Comprehending Security Events: Context-based Identification and Explanation TS van Ede | 1 | 2023 |
Victim-Aware Adaptive Covert Channels R Bortolameotti, T van Ede, A Continella, M Everts, W Jonker, P Hartel, ... Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 1 | 2019 |
Certainty in lockless concurrent algorithms: An informal proof of lace T van Ede Technical Report). University of Twente, 2015 | 1 | 2015 |
DeepCASE Dashboard B Jonkhout, J van Zwol, M van Iperen, K Radzkova, K Cepelis, L Trusca, ... | | 2024 |
Text2Weak: mapping CVEs to CWEs using description embeddings analysis S Simonetto, TS van Ede, P Bosch, W Jonker 4th Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics, 2024 | | 2024 |
SPW 2023 C Gupta, T van Ede, K Lim, JH Kang, D Kim | | |