Searched for: author%3A%22van+den+Berg%2C+Jan%22
(1 - 15 of 15)
document
Bustio-Martínez, Lázaro (author), Herrera-Semenets, Vitali (author), García-Mendoza, Juan-Luis (author), González-Ordiano, Jorge Ángel (author), Zúñiga-Morales, Luis (author), Sánchez Rivero, Rubén (author), Quiróz-Ibarra, José Emilio (author), Santander-Molina, Pedro Antonio (author), van den Berg, Jan (author), Buscaldi, Davide (author)
Persuasion is a human activity of influence. In marketing, persuasion can help customers find solutions to their problems, make informed choices, or convince someone to buy a useful (or useless) product or service. In computer crimes, persuasion can trick users into revealing sensitive information, or even performing actions that benefit...
conference paper 2024
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Decision trees are one of the most popular structures for decision-making and the representation of a set of rules. However, when a rule set is represented as a decision tree, some quirks in its structure may negatively affect its performance. For example, duplicate sub-trees and rule filters, that need to be evaluated more than once, could...
conference paper 2023
document
Herrera-Semenets, Vitali (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
We live in a world that is being driven by data. This leads to challenges of extracting and analyzing knowledge from large volumes of data. An example of such a challenge is intrusion detection. Intrusion detection data sets are characterized by huge volumes, which affects the learning of the classifier. So there is a need to reduce the size...
journal article 2022
document
Herrera Semenets, V. (author), Hernández-León, Raudel (author), Bustio-Martínez, Lázaro (author), van den Berg, Jan (author)
Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling...
conference paper 2022
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Every day the number of devices interacting through telecommunications networks grows resulting into an increase in the volume of data and information generated. At the same time, a growing number of information security incidents is being observed including the occurrence of unauthorized accesses, also named intrusions. As a consequence of...
journal article 2021
document
van den Berg, Jan (author)
For most people, cybersecurity is a difficult notion to grasp. Traditionally, cybersecurity has been considered a technical challenge, and still many specialists understand it as information security, with the notions of confidentiality, integrity, and availability as its foundation. Although many have searched for different and broader...
journal article 2020
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and...
journal article 2020
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this...
conference paper 2019
document
van den Berg, Jan (author)
For most people, cybersecurity is a hard to grasp notion. Traditionally, cybersecurity has been considered as a technical challenge and still many specialists view it equivalent with information security, with the notions of confidentiality, integrity and availability as starting points of thinking. And although others searched for a broader...
conference paper 2019
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To...
journal article 2018
document
Herrera Semenets, V. (author), Pérez-García, Osvaldo Andrés (author), Hernández-León, Raudel (author), van den Berg, Jan (author), Dörr, C. (author)
In the last few years, the telecommunications scenario has experienced an increase in the volume of information generated, as well as in the execution of malicious activities. In order to complement Intrusion Detection Systems (IDSs), data mining techniques have begun to play a fundamental role in data analysis. On the other hand, the...
journal article 2018
document
Leenstra, H. (author), van den Berg, Jan (author), van Wee, G.P. (author)
Connected- en de autonoom rijdende auto’s communiceren constant met hun omgeving. Deze rijdende computers zijn nooit ontworpen om kwaadwillende hackers buiten te houden. Het is tijd om de ICT architectuur in onze auto’s grondig te herzien om ervoor te zorgen dat de fysieke consumentenveiligheid gegarandeerd wordt. Onderzoek vanuit de Cyber...
journal article 2017
document
Ma, M. (author), Herdeiro Teixeira, A.M. (author), van den Berg, Jan (author), Palensky, P. (author)
Low-voltage distribution grids experience a rising penetration of inverter-based, distributed generation. In order to not only contribute to but also solve voltage problems, these inverters are increasingly asked to participate in intelligent grid controls. Communicating inverters implement distributed voltage droop controls. The impact of...
journal article 2017
document
Aertsen, Maarten (author), Korczynski, M.T. (author), Moura, Giovane C. M. (author), Tajalizadehkhoob, S. (author), van den Berg, Jan (author)
The 2013 National Security Agency revelations of pervasive monitoring have led to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users' privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications....
conference paper 2017
document
Bierens, R.H. (author), Klievink, A.J. (author), van den Berg, Jan (author)
Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the...
conference paper 2017
Searched for: author%3A%22van+den+Berg%2C+Jan%22
(1 - 15 of 15)