Welkom...

dr. J. van der Ham - de Vos (Jeroen)

Universitair hoofddocent

Expertises

Engineering & Materials Science
Computer Science
Ethical Aspects
Internet
Security Of Data
Social Sciences
Moral Philosophy
Business & Economics
Best Practice
Cybersecurity
Data Sharing

Publicaties

Recent
Kuzuno, H., Yano, T., Omo, K. , van der Ham, J., & Yamauchi, T. (2024). Security Risk Indicator for Open Source Software to Measure Software Development Status. In H. Kim, & J. Youn (Eds.), Information Security Applications: 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers (pp. 143-156). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 14402). Springer. https://doi.org/10.1007/978-981-99-8024-6_12
Khan, E. , Sperotto, A. , Ham, J. V. D. , & Rijswijk-Deij, R. V. (2023). Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers. In A. Brunstrom, M. Flores, & M. Fiore (Eds.), Passive and Active Measurement: 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023, Proceedings (pp. 46-68) https://doi.org/10.1007/978-3-031-28486-1_3
Reidsma, D. , van der Ham, J. , & Continella, A. (2023). Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to Practice. In Proceedings EthiCS 2023: The 2nd International Workshop on Ethics in Computer Security, February 27, 2022, San Diego, CA, USA Internet Society. https://doi.org/10.14722/ethics.2023.237352
de Smale, S., van Dijk, R., Bouwman, X. , van der Ham, J., & van Eeten, M. (2023). No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information. In 2023 IEEE Symposium on Security and Privacy (SP) (pp. 203-219). (Proceedings - IEEE Symposium on Security and Privacy; Vol. 2023-May). IEEE. https://doi.org/10.1109/SP46215.2023.00012
Sommese, R. , Jonker, M. , van der Ham, J., & Moura, G. (2022). Assessing e-Government DNS Resilience. In 18th International Conference on Network and Service Management https://doi.org/10.23919/CNSM55787.2022.9965155
Yazdani, R., Hilton, A. , van der Ham, J. , van Rijswijk - Deij, R. M., Deccio, C. , Sperotto, A. , & Jonker, M. (2022). Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (pp. 263-275). Association for Computing Machinery. https://doi.org/10.1145/3545948.3545959
Macnish, K. N. J. , & van der Ham, J. (2022). Ethical Approaches to Cybersecurity. In C. Véliz (Ed.), The Oxford Handbook of Digital Ethics Oxford University Press. https://doi.org/10.1093/oxfordhb/9780198857815.013.28

Pure Link

Google Scholar Link

Vakken Collegejaar  2023/2024

Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.
 

Vakken Collegejaar  2022/2023

Contactgegevens

Bezoekadres

Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (gebouwnr. 11), kamer 5122
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling  5122
Postbus 217
7500 AE Enschede

Social Media