Pages
- 1
- 2
- document
-
Pijnappel, T. R. (author), Van Den Berg, J. L. (author), Borst, S. C. (author), Litjens, R. (author)The use of drone base stations offers an agile mechanism to safeguard coverage and provide capacity relief when cellular networks are under stress. Such stress conditions can occur for example in case of special events with massive crowds or network outages. In this paper we focus on a disaster scenario with emergence of a hotspot, and...conference paper 2021
- document
-
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, J. (author)Every day the number of devices interacting through telecommunications networks grows resulting into an increase in the volume of data and information generated. At the same time, a growing number of information security incidents is being observed including the occurrence of unauthorized accesses, also named intrusions. As a consequence of...journal article 2021
- document
-
van den Berg, J. (author)For most people, cybersecurity is a difficult notion to grasp. Traditionally, cybersecurity has been considered a technical challenge, and still many specialists understand it as information security, with the notions of confidentiality, integrity, and availability as its foundation. Although many have searched for different and broader...journal article 2020
- document
-
van den Berg, J. (author)For most people, cybersecurity is a hard to grasp notion. Traditionally, cybersecurity has been considered as a technical challenge and still many specialists view it equivalent with information security, with the notions of confidentiality, integrity and availability as starting points of thinking. And although others searched for a broader...conference paper 2019
- document
-
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, J. (author)Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To...journal article 2018
- document
-
Herrera Semenets, V. (author), Pérez-García, Osvaldo Andrés (author), Hernández-León, Raudel (author), van den Berg, J. (author), Dörr, C. (author)In the last few years, the telecommunications scenario has experienced an increase in the volume of information generated, as well as in the execution of malicious activities. In order to complement Intrusion Detection Systems (IDSs), data mining techniques have begun to play a fundamental role in data analysis. On the other hand, the...journal article 2018
- document
-
Leenstra, H. (author), van den Berg, J. (author), van Wee, G.P. (author)Connected- en de autonoom rijdende auto’s communiceren constant met hun omgeving. Deze rijdende computers zijn nooit ontworpen om kwaadwillende hackers buiten te houden. Het is tijd om de ICT architectuur in onze auto’s grondig te herzien om ervoor te zorgen dat de fysieke consumentenveiligheid gegarandeerd wordt. Onderzoek vanuit de Cyber...journal article 2017
- document
-
Aertsen, Maarten (author), Korczynski, M.T. (author), Moreira Moura, G.C. (author), Tajalizadehkhoob, S. (author), van den Berg, J. (author)The 2013 National Security Agency revelations of pervasive monitoring have led to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users' privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications....conference paper 2017
- document
-
Van den Berg, J. (author)De termen “informatiebeveiliging” en “cyber security” worden vaak door elkaar gebruikt soms met dezelfde, soms met een afwijkende betekenis. Velen spreken vandaag de dag ook over cyberspace, bijvoorbeeld als een nieuw (door de mens gecreëerd) vijfde domein naast de bestaande domeinen land, water, lucht en ruimte. Een en ander roept de vraag op...journal article 2015
- document
- Meyer, V.J. (author), Van den Berg, J. (author), Edelenbos, J. (author) journal article 2014
- document
-
Rahimi, E. (author), Tampinongkol, S. (author), Sedighi, M. (author), Van den Berg, J. (author), Veen, W. (author)While supporting regulatory learning processes in work environments is increasingly becoming important, there is not a clear picture of the interaction between self- and coregulatory processes performed by learners in workplace e-learning systems. In this paper, by following a design-based research methodology, we develop a theory-based...conference paper 2014
- document
-
Rahimi, E. (author), Van den Berg, J. (author), Veen, W. (author)While the concept of Web 2.0 based Personal Learning Environments (PLEs) has generated significant interest in educational settings, there is little consensus regarding what this concept means and how teachers and students can develop and deploy Web 2.0 based PLEs to support their teaching and learning activities. In this paper a conceptual...journal article 2014
- document
- Van den Berg, J. (author) master thesis 2013
- document
-
Meyer, V.J. (author), Van den Berg, J. (author), Bregt, A. (author), Broesi, R. (author), Dammers, E. (author), Edelenbos, J. (author), Nieuwenhuijze, L. (author), Roeleveld, G. (author)In dit cahier wordt in beknopte vorm verslag gedaan van het onderzoeksproject Integrated Planning and Design in the Delta (IPDD), dat in de periode 2011-2013 is uitgevoerd als onderdeel van het NWO programma Urban Regions in the Delta (URD). Zoals alle URD projecten, is het doel van het IPDD project om kennis te ontwikkelen voor een duurzaam...report 2013
- document
-
Rahimi, E. (author), Van den Berg, J. (author), Veen, W. (author)Implementing personal learning environments (PLEs) in educational settings is a challenging and complex process. Teachers as the main agents of change in their classroom settings need support in designing and implementing these new learning environments and integrating them into the educational process. In this paper, we propose a model to...journal article 2013
- document
-
Rahimi, E. (author), Van den Berg, J. (author), Veen, W. (author)Although current and upcoming web technologies offer all kinds of new opportunities to support student-centered learning, there does not exist yet a clear roadmap to integrate these technologies into teaching and learning processes. In this paper a model is introduced in order to develop Personal Learning Environements (PLEs) consisting of Web2...conference paper 2012
- document
-
Pruksasri, P. (author), Van den Berg, J. (author), Hofman, W. (author)In order to make the international supply chain system highly efficient in worldwide transportation of goods, its business processes should be supported by high quality information systems that, “24x7”, provide the right data, at the right time, at the right place, to the right person. To do so, the idea of a (virtual) “Seamless Integrated Data...conference paper 2012
- document
-
Egyedi, T.M. (author), Van den Berg, J. (author)The number of inverse infrastructures (Vree, 2003), that is, user-driven and self-organizing infrastructures, is rising and unsettling policies that are foremost tailored to deal with large-scale and centrally-governed infrastructures (Egyedi et al. 2012). To better understand and address this mismatch, Van den Berg (2012) has developed a...conference paper 2012
- document
-
Hofman, W. (author), Bastiaansen, H. (author), Van den Berg, J. (author), Pruksasri, P. (author)In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements implying optimal use of resources and physical...conference paper 2012
- document
-
Heersmink, R. (author), Van den Hoven, J. (author), Van Eck, N.J. (author), Van den Berg, J. (author)This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology...journal article 2011
Pages
- 1
- 2