Jeroen van der Ham
Universiteit Twente
H-index: 20
Europe-Netherlands
Top articles of Jeroen van der Ham
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Operationalizing cybersecurity research ethics review: from principles and guidelines to practice | Dennis Reidsma Jeroen van der Ham Andrea Continella | 2023/2 | |
Ten years of Vulnerability Disclosure in the Netherlands | Jeroen van der Ham Floor Terra | 2023/9/11 | |
Security Risk Indicator for Open Source Software to Measure Software Development Status | Hiroki Kuzuno Tomohiko Yano Kazuki Omo Jeroen van der Ham Toshihiro Yamauchi | 2023/8/23 | |
No one drinks from the firehose: How organizations filter and prioritize vulnerability information | Stephanie de Smale Rik van Dijk Xander Bouwman Jeroen van der Ham Michel van Eeten | 2023/5/21 | |
Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers | Passive and Active Measurement: 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023, Proceedings | Roland van Rijswijk-Deij | 2023/3/9 |
Dynamic detection of mobile malware using smartphone data and machine learning | Digital Threats: Research and Practice (DTRAP) | JS Panman de Wit Doina Bucur Jeroen van der Ham | 2022/2/8 |
Assessing e-Government DNS Resilience | Raffaele Sommese Mattijs Jonker Jeroen van der Ham Giovane CM Moura | 2022/10/31 | |
Mirrors in the sky: on the potential of clouds in dns reflection-based denial-of-service attacks | Ramin Yazdani Alden Hilton Jeroen van der Ham Roland van Rijswijk-Deij Casey Deccio | 2022/10/26 | |
Introduction to the Special Issue on the 2020 FIRST Conference | Lucimara Desiderá Jeroen van der Ham | 2022/9/12 | |
Rpkiller: Threat analysis from an RPKI relying party perspective | arXiv preprint arXiv:2203.00993 | Koen Van Hove Jeroen van der Ham Roland van Rijswijk-Deij | 2022/3/2 |
Ethical approaches to cybersecurity | Kevin Macnish Jeroen van der Ham | 2021/11/10 | |
Toward a Better Understanding of “Cybersecurity” | Digital Threats: Research and Practice | Jeroen van der Ham | 2021/6/8 |
Ethics in cybersecurity research and practice | Technology in society | Kevin Macnish Jeroen Van der Ham | 2020/11/1 |
Introduction to the FIRST Special Issue | Yasemin Gülbahar | 2020/10/1 |