- document
-
Nadeem, A. (author)Understanding the behavior of cyber adversaries provides threat intelligence to security practitioners, and improves the cyber readiness of an organization. With the rapidly evolving threat landscape, data-driven solutions are becoming essential for automatically extracting behavioral patterns from data that are otherwise too time-consuming to...doctoral thesis 2024
- document
-
Top, Jakob Dirk (author), Jonker, C.M. (author), Verbrugge, Rineke (author), de Weerd, Harmen (author)Epistemic logic can be used to reason about statements such as ‘I know that you know that I know that φ ’. In this logic, and its extensions, it is commonly assumed that agents can reason about epistemic statements of arbitrary nesting depth. In contrast, empirical findings on Theory of Mind, the ability to (recursively) reason about mental...conference paper 2024
- document
-
Fu, Xinyue (author), Zhuang, Taozhi (author), Huang, R. (author), Dong, Yaxian (author)Introduction: Resident participation has gained increasing prominence and significance in the pursuit of sustainable neighborhoods regeneration. However, the current state of resident participation practices remains beset by several challenges, which present formidable impediments to the initiation and execution of neighborhood regeneration...journal article 2023
- document
-
Song, Q. (author), Tan, Rui (author), Wang, J. (author)Driver Behavior Modeling (DBM) aims to predict and model human driving behaviors, which is typically incorporated into the Advanced Driver Assistance System to enhance transportation safety and improve driving experience. Inverse reinforcement learning (IRL) is a prevailing DBM technique with the goal of modeling the driving policy by...conference paper 2023
- document
-
Nadeem, A. (author), Verwer, S.E. (author), Yang, Shanchieh Jay (author)The evolving nature of the tactics, techniques, and procedures used by cyber adversaries have made signature and template based methods of modeling adversary behavior almost infeasible. We are moving into an era of data-driven autonomous cyber defense agents that learn contextually meaningful adversary behaviors from observables. In this chapter...book chapter 2023
- document
-
Klessens, Tycho M.A. (author), Daniel, D. (author), Jiang, Yong (author), van Breukelen, B.M. (author), Scholten, L. (author), Pande, S. (author)Freshwater resources in coastal areas are under intense pressure from excessive groundwater extraction, which amplifies saltwater intrusion (SWI) into coastal freshwater aquifers, such as in the Mekong Delta. Studies that combine socioenvironmental data and households' psychological factors next to salinity measurement data to design...journal article 2022
- document
-
Hung, H.S. (author), Gedik, E. (author), Cabrera Quiros, L.C. (author)When aspiring to achieve 'in the wild' behavior analysis, we come across a number of conceptual and practical issues. In this chapter, we focus primarily on describing the data collection process for the automated analysis of human social behavior. Specifically, we address the task of analyzing social interaction during conversations. Most...book chapter 2019
- document
-
Thoen, Sebastiaan (author)Tour formation is a distinguishing feature of freight transportation. An increasing amount of research is dedicated to the consideration of tour formation in freight simulation models, but these tour formation models lack statistical calibration on empirical data, do not represent shipments explicitly, or focus on a narrow segment of freight...master thesis 2018
- document
-
Ingeveld, M. (author)With the aim of investigating the perception of elderly on two types of automated vehicle (owned and shared) this thesis research questioned 123 elderly respondents on their intention of using AV in the (near) future and what the main reasons for (not) using these technologies are. By using behavioral modeling and a modified UTAUT model the main...master thesis 2017
- document
- Xu, J. (author) doctoral thesis 2015
- document
-
Ozkale, B. (author)Recently, some retail stores face large amount of cash transactions and thus leave traditional cash handling organizations to improve the efficiency. When switching to a new cash management system, retailers need forecasts of cash payment volumes. Two airport retailers, Schiphol Airport Retail (SAR) & Kappe are among those companies that seek...master thesis 2013
- document
-
Taal, J.R. (author), Chen, Z. (author), He, Y. (author), Lagendijk, R.I.L. (author)Wireless and Internet video applications are inherently subjected to bit errors and packet errors, respectively. This is especially so if constraints on the end-to-end compression and transmission latencies are imposed. Therefore, it is necessary to develop methods to optimize the video compression parameters and the rate allocation of these...journal article 2004