van Ede, Thijs
12  results:
Search for persons X
?
 
?
 
?
3

DEEPCASE: Semi-Supervised Contextual Analysis of Security E..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Ede, Thijs van ; Aghakhani, Hojjat ; Spahn, Noah... - p. 522-539 , 2022
 
?
4

Federated Lab (FedLab): An Open-source Distributed Platform..:

, In: 2022 IEEE 8th World Forum on Internet of Things (WF-IoT),
 
?
5

Stepping out of the MUD: Contextual threat information for ..:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
 
?
6

Detecting Anomalous Misconfigurations in AWS Identity and A..:

, In: Proceedings of the 2022 on Cloud Computing Security Workshop,
van Ede, Thijs ; Khasuntsev, Niek ; Steen, Bas. - p. 63-74 , 2022
 
?
7

HeadPrint : detecting anomalous communications through h..:

, In: Proceedings of the 35th Annual ACM Symposium on Applied Computing,
 
?
8

Victim-Aware Adaptive Covert Channels:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks,
 
?
9

DECANTeR : DEteCtion of Anomalous outbouNd HTTP TRaffic ..:

, In: Proceedings of the 33rd Annual Computer Security Applications Conference,
 
?
 
?
12

Characterization of a model of systemic inflammation in hum..:

Kiers, D ; Koch, R. M ; Hamers, L...
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5215288/.  , 2017
 
1-12