Showing
1 - 4
results of
4
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Van Der Ham-De Vos, Jeroen
Search Results - Van Der Ham-De Vos, Jeroen
Showing
1 - 4
results of
4
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure
by
van Hove, Koen
,
van der Ham-de Vos, Jeroen
,
van Rijswijk-Deij, Roland
Published in
Digital threats (Print)
Get full text
Items that this one cites
Article
Save to List
Saved in:
2
Loading…
Are You Sure You Want To Do Coordinated Vulnerability Disclosure?
by
Chen, Ting-Han
,
Tagliaro, Carlotta
,
Lindorfer, Martina
,
Borgolte, Kevin
,
Van Der Ham-De Vos, Jeroen
Request full text
Conference Proceeding
Save to List
Saved in:
3
Loading…
A First Look at User-Installed Residential Proxies From a Network Operator's Perspective
by
Khan, Etienne
,
Chiapponi, Elisa
,
Verkleij, Martijn
,
Sperotto, Anna
,
Van Rijswijk-Deij, Roland
,
Van Der Ham-De Vos, Jeroen
Request full text
Conference Proceeding
Save to List
Saved in:
4
Loading…
Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue
by
Koen van Hove
,
Jeroen van der Ham-de Vos
,
Roland van Rijswijk-Deij
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
1 results
1
Full Text
4 results
4
Format
Articles
2 results
2
Conference Proceedings
2 results
2
Journal Title
Digital Threats
1 results
1
Subjects
Computer Science
2 results
2
Computer Science, Information Systems
2 results
2
Science & Technology
2 results
2
Security
2 results
2
Technology
2 results
2
Computer Science, Theory & Methods
1 results
1
Critical Infrastructure
1 results
1
Current Measurement
1 results
1
Denial Of Inventory
1 results
1
Ecosystems
1 results
1
Electronic Mail
1 results
1
Fraud
1 results
1
Internet Of Things
1 results
1
Malware
1 results
1
Metadata
1 results
1
Mobile Applications
1 results
1
Monitoring
1 results
1
Network Protocol Design
1 results
1
Network Security
1 results
1
Networks
1 results
1
Year of Publication
From:
To:
Source
Ieee Electronic Library (Iel) Conference Proceedings
2 results
2
Ieee Xplore All Conference Series
2 results
2
Acm Digital Library Complete
1 results
1
Association For Computing Machinery:jisc Collections:acm Open Journals 2023-2025 (Reading List)
1 results
1
Open Access: Freely Accessible Journals By Multiple Vendors
1 results
1
Road: Directory Of Open Access Scholarly Resources
1 results
1
Ezb Electronic Journals Library
1 results
1
Publicly Available Content Database
1 results
1