Rijswijk

Results: 354



#Item
11

Ethics in data sharing: developing a model for best practice Sven Dietrich∗ , Jeroen van der Ham† , Aiko Pras‡ , Roland van Rijswijk-Deij§ , Darren Shou¶ , Anna Sperotto‡ , Aimee van Wynsberghe‡, Lenore D. Zu

Add to Reading List

Source URL: wwwhome.ewi.utwente.nl

Language: English - Date: 2016-02-02 09:35:49
    12

    DNSSEC and Its Potential for DDoS Attacks A Comprehensive Measurement Study Roland van Rijswijk-Deij Anna Sperotto

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2014-11-04 06:52:45
      13

      Ethics in Data Sharing a best practice for NRENs Roland van Rijswijk-Deij SURFnet bv

      Add to Reading List

      Source URL: wwwhome.ewi.utwente.nl

      Language: English - Date: 2016-02-02 09:35:49
        14

        The Internet of Names: A DNS Big Dataset Actively Measuring 50% of the Entire DNS Name Space, Every Day Roland van Rijswijk-Deij1,2 , Mattijs Jonker1 , Anna Sperotto1 , Aiko Pras1 1 University of Twente, 2 SURFnet bv

        Add to Reading List

        Source URL: conferences.sigcomm.org

        Language: English - Date: 2015-07-29 16:55:50
          15

          1 DNSSEC meets real world: dealing with unreachability caused by fragmentation Gijs van den Broek∗† , Roland van Rijswijk-Deij† , Anna Sperotto∗ , Aiko Pras∗ ∗ University of Twente

          Add to Reading List

          Source URL: eprints.eemcs.utwente.nl

          Language: English - Date: 2014-01-28 10:09:25
            16

            Large-scale DNS and DNSSEC data sets for network security research Roland van Rijswijk-Deij1,2 , Anna Sperotto1 , and Aiko Pras1 1 Design and Analysis of Communication Systems (DACS), University of Twente,

            Add to Reading List

            Source URL: wwwhome.ewi.utwente.nl

            Language: English - Date: 2016-02-02 09:35:49
              17

              DNSSEC and Its Potential for DDoS Attacks A Comprehensive Measurement Study Roland van Rijswijk-Deij Anna Sperotto

              Add to Reading List

              Source URL: wwwhome.ewi.utwente.nl

              Language: English - Date: 2016-02-02 09:35:49
                18

                Using Trusted Execution Environments in Two-factor Authentication: comparing approaches Roland van Rijswijk-Deij1,2 and Erik Poll1 1 Radboud University Nijmegen, The Netherlands

                Add to Reading List

                Source URL: wwwhome.ewi.utwente.nl

                Language: English - Date: 2016-02-02 09:35:49
                  19

                  BPRC Biomedical Primate Research Centre Rijswijk, The Netherlands www.bprc.nl CdP Centre de Primatology / Université Louis Pasteur

                  Add to Reading List

                  Source URL: www.euprim-net.eu

                  Language: English - Date: 2007-04-05 03:53:36
                    20

                    WAARBORGFONDS M OTO R V E R K E E R PostbusMG Rijswijk Verrijn Stuartlaan 14

                    Add to Reading List

                    Source URL: www.fized.nl

                    Language: Dutch
                      UPDATE