- document
-
de Koning, Quinten Damy (author)In the last few years the smart building market has grown exponentially and is estimated to be worth around 100 billion by the year 2025. The amount of active competitors, combined with the required time and effort to launch a new sensor-based product, makes it difficult to enter the market and slows innovation. WeAreReasonablePeople (WARP), a...master thesis 2023
- document
-
Kranenburg, W.M. (author), Tiessen, Meinard (author), Blaas, Meinte (author), Van Veen, Nathalie (author)Around the world, estuaries have been partially or completely closed-off from the sea and their number may increase with rising sea levels. Concurrently, there is a trend to reintroduce seawater inflow into enclosed former estuaries for ecosystem improvement. This is also the case in the Haringvliet, a former estuary in the Rhine-Meuse Delta,...journal article 2023
- document
-
Sharma, Bhawana (author), Sharma, Lokesh (author), Lal, C. (author), Roy, Satyabrata (author)Internet of Things (IoT) applications are growing in popularity for being widely used in many real-world services. In an IoT ecosystem, many devices are connected with each other via internet, making IoT networks more vulnerable to various types of cyber attacks, thus a major concern in its deployment is network security and user privacy. To...journal article 2023
- document
-
Sharma, Bhawana (author), Sharma, Lokesh (author), Lal, C. (author)IoT has gained immense popularity recently with advancements in technologies and big data. IoT network is dynamically increasing with the addition of devices, and the big data is generated within the network, making the network vulnerable to attacks. Thus, network security is essential, and an intrusion detection system is needed. In this...conference paper 2023
- document
-
Vreeburg, Huib (author)Saltwater intrusion in groundwater is a concern in many aquifers around the world. It results in deterioration of potable and irrigation water quality and degradation of ecosystems. The problem is exacerbated by fresh groundwater abstraction, drying climates and a rising seawater level.<br/>Esperance is a small town situated on the south coast...master thesis 2022
- document
-
Iglesias, Sebastian (author)Nature-based initiatives have emerged as potential solutions to problems caused by saltwater intrusion in deltas found globally, but their successful implementation is enabled partly by a multi-stakeholder approach. The latter involves managing several parallel stakeholder objectives, which usually requires quantitative knowledge to understand...master thesis 2022
- document
-
De Fockert, Anton (author), O'Mahoney, Tom S.D. (author), Nogueira, Helena I.S. (author), Oldenziel, G. (author), Bijlsma, Arnout C. (author), Janssen, Hans (author)Salt water intrusion through the New Sea Lock of IJmuiden, Netherlands requires mitigation to ensure availability of enough fresh water further inland. For this purpose, a salt screen has been proposed for selective withdrawal of salt water from the Noordzeekanaal in the vicinity of the lock complex. Formulas to assess the withdrawal rate of...journal article 2022
- document
-
Nadeem, A. (author), Verwer, S.E. (author), Moskal, Stephen (author), Yang, Shanchieh Jay (author)Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical representation, often referred to as an attack graph (AG). Instead of deriving AGs...journal article 2022
- document
-
Klessens, Tycho M.A. (author), Daniel, D. (author), Jiang, Yong (author), van Breukelen, B.M. (author), Scholten, L. (author), Pande, S. (author)Freshwater resources in coastal areas are under intense pressure from excessive groundwater extraction, which amplifies saltwater intrusion (SWI) into coastal freshwater aquifers, such as in the Mekong Delta. Studies that combine socioenvironmental data and households' psychological factors next to salinity measurement data to design...journal article 2022
- document
-
Aliyu, Ibrahim (author), van Engelenburg, S.H. (author), Mu'azu, Muhammed Bashir (author), Kim, Jinsul (author), Lim, Chang Gyoon (author)The internet-of-Vehicle (IoV) can facilitate seamless connectivity between connected vehicles (CV), autonomous vehicles (AV), and other IoV entities. Intrusion Detection Systems (IDSs) for IoV networks can rely on machine learning (ML) to protect the in-vehicle network from cyber-attacks. Blockchain-based Federated Forests (BFFs) could be...journal article 2022
- document
-
Dijkstra, Y.M. (author), Schuttelaars, H.M. (author), Kranenburg, W.M. (author)Tidally averaged transport of salt in estuaries is controlled by various subtidal and tidal processes. In this study, we show the relative importance of various subtidal and tidal transport processes in a width-averaged sense. This is done for a large range of forcing and geometric parameters, which describe well-mixed to salt wedge estuaries...journal article 2022
- document
-
Payo-Payo, Marta (author), Bricheno, Lucy M. (author), Dijkstra, Y.M. (author), Cheng, Weicong (author), Gong, Wenping (author), Amoudry, Laurent O. (author)Salt intrusion in surface waters endangers freshwater availability, influences water quality, and affects estuarine ecosystem services with high economic and social values. Salt transport and the resulting salinity distributions result from the non-linear interactions between salt and water dynamics. Estuaries are often considered under ...journal article 2022
- document
-
Herrera-Semenets, Vitali (author), Hernández-León, Raudel (author), van den Berg, Jan (author)We live in a world that is being driven by data. This leads to challenges of extracting and analyzing knowledge from large volumes of data. An example of such a challenge is intrusion detection. Intrusion detection data sets are characterized by huge volumes, which affects the learning of the classifier. So there is a need to reduce the size...journal article 2022
- document
-
Vermeer, M. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been studied in production environments. We partner with a Managed Security Service Provider (MSSP) to...conference paper 2022
- document
-
Apruzzese, Giovanni (author), Pajola, Luca (author), Conti, M. (author)Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labeled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying...journal article 2022
- document
-
Zhou, Z. (author)Estuaries are partially enclosed water bodies where river water mixes with sea water. Estuaries provide important ecological functions which are strongly regulated by estuarine hydrodynamics and sediment dynamics, and also by human interventions. Sustainable management of such systems therefore requires a thorough understanding of the interplay...doctoral thesis 2021
- document
-
Blom, Jelle (author)Two current assumptions of the Zeesluisformulering (ZSF) regarding a homogeneous lock density and instantaneous shipping are tested against refined descriptions according to literature: a stratified lock density and shipping according the continuity approach. These are implemented into a conceptual model constructed in Python, after which...master thesis 2021
- document
-
Förstel, Irène (author)Nowadays does the internet presence of companies increase, and with it, their attack surface and the probability of breaches: every information system in the company's network may be an entry point for an outsider. Therefore, companies need to secure their information systems. However, current risk assessment frameworks fail to connect the...master thesis 2021
- document
-
Brussen, Arjen (author)Year after year, the amount of network intrusions and costs associated to them rises. Research in this area is, therefore, of high importance and provides valuable insight in how to prevent or counteract intrusions. Machine learning algorithms seem to be a promising answer for automated network intrusion detection, as their results often reach...master thesis 2021
- document
-
Simidžioski, Maria (author)Adversarial attacks pose a risk to machine learning (ML)-based network intrusion detection systems (NIDS). In this manner, it is of great significance to explore to what degree these methods can be viably utilized by potential adversaries. The majority of adversarial techniques are designed for unconstrained domains such as the image recognition...master thesis 2021