Expertise

  • Computer Science

    • Cybersecurity
    • Vulnerability Disclosure
    • Data Sharing
    • Party Software
    • Public Key Infrastructure
    • Threat Analysis
    • Internet
    • Design

Organisations

Publications

2024
Security Risk Indicator for Open Source Software to Measure Software Development StatusIn Information Security Applications: 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers (pp. 143-156). Springer. Kuzuno, H., Yano, T., Omo, K., van der Ham, J. & Yamauchi, T.https://doi.org/10.1007/978-981-99-8024-6_12
2023
Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue (Submitted). van Hove, K., van der Ham, J. & van Rijswijk - Deij, R. M.https://doi.org/10.48550/arXiv.2312.07284rpkiller: Threat Analysis of the BGP Resource Public Key InfrastructureDigital Threats, 4(4), Article 58, 1-24. Hove, K. v., Vos, J. v. d. H.-d. & Rijswijk-Deij, R. v.https://doi.org/10.1145/3617182Ten years of Vulnerability Disclosure in the Netherlands. van der Ham, J. & Terra, F.https://emagazine.one-conference.nl/2023/ten-years-of-vulnerability-disclosure-in-the-netherlands/No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability InformationIn 2023 IEEE Symposium on Security and Privacy (SP) (pp. 203-219). IEEE. de Smale, S., van Dijk, R., Bouwman, X., van der Ham, J. & van Eeten, M.https://doi.org/10.1109/SP46215.2023.00012Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN ProvidersIn Passive and Active Measurement: 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023, Proceedings (pp. 46-68). Khan, E., Sperotto, A., Ham, J. v. d. & Rijswijk-Deij, R. v.https://doi.org/10.1007/978-3-031-28486-1_3Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to PracticeIn Proceedings EthiCS 2023: The 2nd International Workshop on Ethics in Computer Security, February 27, 2022, San Diego, CA, USA. Internet Society. Reidsma, D., van der Ham, J. & Continella, A.https://doi.org/10.14722/ethics.2023.237352
2022
Assessing e-Government DNS ResilienceIn 18th International Conference on Network and Service Management. Sommese, R., Jonker, M., van der Ham, J. & Moura, G.https://doi.org/10.23919/CNSM55787.2022.9965155Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service AttacksIn Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (pp. 263-275). Association for Computing Machinery. Yazdani, R., Hilton, A., van der Ham, J., van Rijswijk - Deij, R. M., Deccio, C., Sperotto, A. & Jonker, M.https://doi.org/10.1145/3545948.3545959Dynamic detection of mobile malware using smartphone data and machine learningDigital Threats, 3(2), Article 9. Panman de Wit, S., Bucur, D. & van der Ham, J.https://doi.org/10.1145/3484246

Research profiles

Courses academic year 2023/2024

Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.

Courses academic year 2022/2023

Address

Visiting address

University of Twente

Zilverling (building no. 11), room 5122
Hallenweg 19
7522 NH Enschede
Netherlands

Navigate to location

Organisations

Scan the QR code or
Download vCard