Welcome...

ir. T.S. van Ede MSc (Thijs)

PhD Candidate

Expertise

Engineering & Materials Science
Anomaly Detection
Application Layer
Application Programs
Communication
Http
Malware
Metadata
Monitoring

Publications

Recent
van Ede, T., Aghakhani, H., Spahn, N. , Bortolameotti, R., Cova, M. , Continella, A. , van Steen, M. , Peter, A., Kruegel, C., & Vigna, G. (2022). DeepCASE: Semi-Supervised Contextual Analysis of Security Events. In Proceedings of the IEEE Symposium on Security and Privacy (S&P)
Bortolameotti, R. , van Ede, T. S. , Continella, A. , Hupperich, T. M. , Everts, M. H., Rafati, R. , Jonker, W. , Hartel, P. , & Peter, A. (2020). HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery (ACM). https://doi.org/10.1145/3341105.3373862
van Ede, T. S. , Bortolameotti, R. , Continella, A., Ren, J., Dubois, D. J., Lindorfer, M., Choffnes, D. , van Steen, M. , & Peter, A. (2020). FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. In Network and Distributed System Security Symposium (NDSS) (27 ed.). Internet Society. https://doi.org/10.14722/ndss.2020.24412
Bortolameotti, R. , van Ede, T. S. , Everts, M. H. , Jonker, W. , Hartel, P. H. , Peter, A. , & Continella, A. (2019). Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.), Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST). https://doi.org/10.1007/978-3-030-37228-6_22
Bortolameotti, R. , van Ede, T. S., Caselli, M. , Everts, M. H. , Hartel, P. H., Hofstede, R. , Jonker, W. , & Peter, A. (2017). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386) https://doi.org/10.1145/3134600.3134605
Other Contributions

Bortolameotti, R., van Ede, T., Continella, A., Everts, M.H., Jonker, W., Hartel, P. & Peter, A. (2019, October). Victim-Aware Adaptive Covert Channels. In Proceedings of the International Conference on Security and Privacy in Communication Networks. Springer.

Bortolameotti, R., van Ede, T., Caselli, M., Everts, M. H., Hartel, P., Hofstede, R., Jonker, W. & Peter, A. (2017, December). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386). ACM.

Google Scholar Link

Contact Details

Visiting Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (building no. 11)
Hallenweg 19
7522NH  Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling
P.O. Box 217
7500 AE Enschede
The Netherlands