Baywatch: Two approaches to measure the effects of blocking access to The Pirate Bay
Poort, Joost, Leenheer, Jorna, van der Ham, Jeroen, Dumitru, Cosmin
Published in Telecommunications policy (01.05.2014)
Published in Telecommunications policy (01.05.2014)
Get full text
Journal Article
Using zero configuration technology for IP addressing in optical networks
Dijkstra, Freek, van der Ham, Jeroen J., de Laat, Cees T.A.M.
Published in Future generation computer systems (01.10.2006)
Published in Future generation computer systems (01.10.2006)
Get full text
Journal Article
A multi-layer network model based on ITU-T G.805
Dijkstra, Freek, Andree, Bert, Koymans, Karst, van der Ham, Jeroen, Grosso, Paola, de Laat, Cees
Published in Computer networks (Amsterdam, Netherlands : 1999) (16.07.2008)
Published in Computer networks (Amsterdam, Netherlands : 1999) (16.07.2008)
Get full text
Journal Article
Using RDF to describe networks
van der Ham, Jeroen J., Dijkstra, Freek, Travostino, Franco, Andree, Hubertus M.A., de Laat, Cees T.A.M.
Published in Future generation computer systems (01.10.2006)
Published in Future generation computer systems (01.10.2006)
Get full text
Journal Article
Technology-aware multi-domain multi-layer routing
Iqbal, Farabi, van der Ham, Jeroen, Kuipers, Fernando
Published in Computer communications (15.05.2015)
Published in Computer communications (15.05.2015)
Get full text
Journal Article
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information
de Smale, Stephanie, van Dijk, Rik, Bouwman, Xander, van der Ham, Jeroen, van Eeten, Michel
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Get full text
Conference Proceeding
The NOVI information models
van der Ham, Jeroen, Stéger, József, Laki, Sándor, Kryftis, Yiannos, Maglaris, Vasilis, de Laat, Cees
Published in Future generation computer systems (01.01.2015)
Published in Future generation computer systems (01.01.2015)
Get full text
Journal Article
Open Cloud eXchange (OCX): Architecture and Functional Components
Demchenko, Yuri, van der Ham, Jeroen, Ngo, Canh, de Laat, Cees, Matselyukh, Taras, Escalona, Eduard, Filiposka, Sonja
Published in 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (01.12.2013)
Published in 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (01.12.2013)
Get full text
Conference Proceeding
Planning Data Intensive Workflows on Inter-domain Resources Using the Network Service Interface (NSI)
Zhao, Zhiming, Ham, Jeroen van der, Taal, Arie, Koning, Ralph, Dumitru, Cosmin, Wibisono, Adianto, Grosso, Paola, de Laat, Cees
Published in 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (01.11.2012)
Published in 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (01.11.2012)
Get full text
Conference Proceeding
A semantic-web approach for modeling computing infrastructures
Ghijsen, Mattijs, van der Ham, Jeroen, Grosso, Paola, Dumitru, Cosmin, Zhu, Hao, Zhao, Zhiming, de Laat, Cees
Published in Computers & electrical engineering (01.11.2013)
Published in Computers & electrical engineering (01.11.2013)
Get full text
Journal Article
A path finding implementation for multi-layer networks
Dijkstra, Freek, van der Ham, Jeroen, Grosso, Paola, de Laat, Cees
Published in Future generation computer systems (01.02.2009)
Published in Future generation computer systems (01.02.2009)
Get full text
Journal Article
Ethics in Data Sharing: Developing a Model for Best Practice
Dietrich, Sven, Van Der Ham, Jeroen, Pras, Aiko, Van Rijswijk Deij, Roland, Shou, Darren, Sperotto, Anna, Wynsberghe, Aimee van, Zuck, Lenore D.
Published in 2014 IEEE Security and Privacy Workshops (01.05.2014)
Published in 2014 IEEE Security and Privacy Workshops (01.05.2014)
Get full text
Conference Proceeding