Using RDF to describe networks JJ Van der Ham, F Dijkstra, F Travostino, HMA Andree, CTAM de Laat Future Generation Computer Systems 22 (8), 862-867, 2006 | 90 | 2006 |
Ethics in cybersecurity research and practice K Macnish, J Van der Ham Technology in society 63, 101382, 2020 | 89 | 2020 |
Using the network description language in optical networks J van der Ham, P Grosso, R van der Pol, A Toonk, C de Laat Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007 | 86 | 2007 |
A distributed topology information system for optical networks based on the semantic web J Van Der Ham, F Dijkstra, P Grosso, R Van Der Pol, A Toonk, C De Laat Optical Switching and Networking 5 (2-3), 85-93, 2008 | 78 | 2008 |
Baywatch: Two approaches to measure the effects of blocking access to The Pirate Bay J Poort, J Leenheer, J van der Ham, C Dumitru Telecommunications Policy 38 (4), 383-392, 2014 | 76 | 2014 |
A semantic-web approach for modeling computing infrastructures M Ghijsen, J Van Der Ham, P Grosso, C Dumitru, H Zhu, Z Zhao, ... Computers & Electrical Engineering 39 (8), 2553-2565, 2013 | 58 | 2013 |
Toward a Better Understanding of “Cybersecurity” J van der Ham Digital Threats: Research and Practice 2 (3), 1-3, 2021 | 55 | 2021 |
Towards an infrastructure description language for modeling computing infrastructures M Ghijsen, J Van Der Ham, P Grosso, C De Laat 2012 IEEE 10th International Symposium on Parallel and Distributed …, 2012 | 55 | 2012 |
A multi-layer network model based on ITU-T G. 805 F Dijkstra, B Andree, K Koymans, J van der Ham, P Grosso, C de Laat Computer Networks 52 (10), 1927-1937, 2008 | 46 | 2008 |
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure M Weulen Kranenbarg, TJ Holt, J van der Ham Crime Science 7 (1), 1-9, 2018 | 41 | 2018 |
On-demand provisioning of cloud and grid based infrastructure services for collaborative projects and groups Y Demchenko, C de Laat, J Van der Ham, M Ghijsen, V Yakovenko, ... 2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011 | 37 | 2011 |
Communication for goal directed agents M Dastani, J Van Der Ham, F Dignum Communication in Multiagent Systems: Agent Communication Languages and …, 2003 | 34 | 2003 |
The NOVI information models J van der Ham, J Stéger, S Laki, Y Kryftis, V Maglaris, C de Laat Future Generation Computer Systems 42, 64-73, 2015 | 30 | 2015 |
A path finding implementation for multi-layer networks F Dijkstra, J van der Ham, P Grosso, C de Laat Future Generation Computer Systems 25 (2), 142-146, 2009 | 30 | 2009 |
A survey of network traffic anonymisation techniques and implementations N van Dijkhuizen, J van der Ham ACM Computing Surveys (CSUR) 51 (3), 1-27, 2018 | 27 | 2018 |
An agent based network resource planner for workflow applications Z Zhao, P Grosso, J Van der Ham, R Koning, C De Laat Multiagent and Grid Systems 7 (6), 187-202, 2011 | 26 | 2011 |
A semantic model for complex computer networks: the network JJ van der Ham Network 3 (3), 2, 2010 | 26 | 2010 |
A terminology for control models at optical exchanges F Dijkstra, B van Oudenaarde, B Andree, L Gommans, P Grosso, ... Inter-Domain Management: First International Conference on Autonomous …, 2007 | 26 | 2007 |
Resource discovery and allocation for federated virtualized infrastructures C Pittaras, C Papagianni, A Leivadeas, P Grosso, J van der Ham, ... Future Generation Computer Systems 42, 55-63, 2015 | 25 | 2015 |
Open cloud exchange (OCX): Architecture and functional components Y Demchenko, J Van Der Ham, C Ngo, T Matselyukh, S Filiposka, ... 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 21 | 2013 |