ir. T.S. van Ede MSc (Thijs)


About Me

I am a Lecturer in the Semantics, Cybersecurity and Services group of the university of Twente.

My research focuses on security automation and the integration of machine learning and AI techniques into security solutions. More specifically, I am interested in network-based intrusion detection and the continuous integration of such systems in dynamic, rapidly changing environments. To this end, I focus on anomaly detection, contextual security analysis using deep neural networks, and the application of Natural Language Processing (NLP) techniques for sharing cyber threat intelligence.

I strongly believe in open, collaborative science, where researchers can easily and quickly access previous research. To that end, I maintain several security tools that have been developed through research efforts.

Finally, I love Capture The Flag (CTF) competitions, and I am involved in the organization of the Twente Hacking Squad, the University of Twente's student hacking team.


van Ede, T. S. (2023). Comprehending Security Events: Context-Based Identification and Explanation. [PhD Thesis - Research UT, graduation UT, University of Twente]. University of Twente. https://doi.org/10.3990/1.9789036558891
Gupta, C. , Ede, T. V. , & Continella, A. (2023). HoneyKube: Designing and Deploying a Microservices-based Web Honeypot. In Proceeding - 44th IEEE Symposium on Security and Privacy Workshops, SPW 2023 (pp. 1-11). (Proceeding - IEEE Symposium on Security and Privacy Workshops (SPW); Vol. 2023). IEEE. https://doi.org/10.1109/SPW59333.2023.00005
Zangrandi, L. M. , Ede, T. V., Booij, T., Sciancalepore, S., Allodi, L. , & Continella, A. (2022). Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behaviour profiles. In Proceedings of the Annual Computer Security Applications Conference, ACSAC 2022 Applied Computer Security Associates. https://doi.org/10.1145/3564625.3564644
Meijer, M., Petrucci, G. T., Schotsman, M., Morgese, L. , Ede, T. V. , Continella, A., Gankhuyag, G., Allodi, L., & Sciancalepore, S. (2022). Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation. In IEEE World Forum on IoT (WF-IoT)
Ede, T. V., Khasuntsev, N. , Steen, B. , & Continella, A. (2022). Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies. In CCSW 2022 - Proceedings of the 2022 Cloud Computing Security Workshop, co-located with CCS 2022 (pp. 63-74) https://doi.org/10.1145/3560810.3564264
van Ede, T., Aghakhani, H., Spahn, N. , Bortolameotti, R., Cova, M. , Continella, A. , van Steen, M. , Peter, A., Kruegel, C., & Vigna, G. (2022). DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. In 2022 IEEE Symposium on Security and Privacy (SP) (pp. 522-539). (Proceedings - IEEE Symposium on Security and Privacy; Vol. 2022-May). IEEE. https://doi.org/10.1109/SP46214.2022.9833671
Bortolameotti, R. , van Ede, T. S. , Continella, A., Hupperich, T. M. , Everts, M. H., Rafati, R. , Jonker, W. , Hartel, P. , & Peter, A. (2020). HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery. https://doi.org/10.1145/3341105.3373862
van Ede, T. S. , Bortolameotti, R. , Continella, A., Ren, J., Dubois, D. J., Lindorfer, M., Choffnes, D. , van Steen, M. , & Peter, A. (2020). FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. In Network and Distributed System Security Symposium (NDSS) (27 ed.). Internet Society. https://doi.org/10.14722/ndss.2020.24412
Bortolameotti, R. , van Ede, T. S. , Everts, M. H. , Jonker, W. , Hartel, P. H. , Peter, A. , & Continella, A. (2019). Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.), Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST). https://doi.org/10.1007/978-3-030-37228-6_22
Other Contributions

Bortolameotti, R., van Ede, T., Continella, A., Everts, M.H., Jonker, W., Hartel, P. & Peter, A. (2019, October). Victim-Aware Adaptive Covert Channels. In Proceedings of the International Conference on Security and Privacy in Communication Networks. Springer.

Bortolameotti, R., van Ede, T., Caselli, M., Everts, M. H., Hartel, P., Hofstede, R., Jonker, W. & Peter, A. (2017, December). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386). ACM.

UT Research Information System

Google Scholar Link

Affiliated Study Programmes



Contact Details

Visiting Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (building no. 11), room 2005
Hallenweg 19
7522NH  Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling  2005
P.O. Box 217
7500 AE Enschede
The Netherlands

Social Media