EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: FLAMINGO-2: Management Of Future Internet
Home Policy Brochure Browse Search User Area Contact Help

2017

van Rijswijk-Deij, R.M. and Hageman, K.D. and Sperotto, A. and Pras, A. (2017) The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM transactions on networking, online pre-publication. pp. 1-13. ISSN 1063-6692 *** ISI Impact 2,186 ***

2016

Steinberger, J., ed. (2016) SPRING 2016. SIDAR-Reports SR-2016-01. German Informatics Society (GI), Germany, pp. 1-22. ISSN 2190-846X
Barbosa, R.R.R. and Sadre, R. and Pras, A. (2016) Exploiting traffic periodicity in industrial control networks. International Journal of Critical Infrastructure Protection, 13. pp. 52-62. ISSN 1874-5482 *** ISI Impact 1,351 ***
Dietz, C. and Sperotto, A. and Dreo, G. and Pras, A. (2016) How to Achieve Early Botnet Detection at the Provider Level? In: Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016, 20-23 Jun 2016, Munich, Germany. pp. 142-146. Lecture Notes in Computer Science 9701. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-39813-6
Dietz, C. and Sperotto, A. and Dreo, G. and Pras, A. (2016) Monitoring the DNS Infrastructure for Proactive Botnet Detection. In: Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016), 02-03 Jun 2016, Darmstadt, Germany. pp. 3-4. SIDAR reports SR-2016-01. Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI). ISSN 2190-846X
Dietz, C. and Sperotto, A. and Pras, A. and Dreo, G. (2016) Proactive Botnet Detection and Defense at Internet scale. In: Proceedings of the 6th PhD School on Traffic Monitoring and Analysis, TMA 2016, 5-6 April 2016, Louvain La Neuve. IFIP Digital Library. ISBN not assigned
Hofstede, R.J. (2016) Flow-based Compromise Detection. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 16-384 ISBN 978-90-365-4066-7
Hoogesteger, Martijn and de Oliveira Schmidt, R. and Pras, A. (2016) ITSA: Internet Traffic Statistics Archive. In: IEEE/IFIP Network Operations and Management Symposium (IEEE NOMS 2016), 25-29 Apr 2016, Istanbul, Turkey. pp. 995-996. IEEE Communications Society. ISBN 978-1-5090-0223-8
Jonker, Mattijs and Sperotto, A. and van Rijswijk-Deij, R.M. and Sadre, R. and Pras, A. (2016) Measuring the Adoption of DDoS Protection Services. In: Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016, 14-16 Nov 2016, Santa Monica, CA, USA. pp. 279-285. ACM. ISBN 978-1-4503-4526-2
Pras, A. and Cardoso de Santanna, J.J. and Steinberger, J. and Sperotto, A. (2016) DDoS 3.0 - How Terrorists Bring Down the Internet. (Invited) In: Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems” and “Dependability and Fault-Tolerance”, MMB & DFT 2016, 4-6 April 2016, Münster, Germany. pp. 1-4. Lecture Notes in Computer Science 9629. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-31558-4
Raniery Paula dos Santos, C. and Famaey, J. and Schönwälder, J. and Zambenedetti Granville, L. and Pras, A. and De Turck, F. (2016) Taxonomy for the Network and Service Management Research Field. Journal of Network and Systems Management, 24 (3). pp. 764-787. ISSN 1064-7570 *** ISI Impact 1,078 ***
van Rijswijk-Deij, R.M. and Jonker, Mattijs and Sperotto, A. (2016) On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC. In: Proceedings of the 12th international Conference on Network and Service Management (CNSM 2016), 31 Oct - 04 Nov 2016, Montreal, Canada. pp. 258-262. IEEE. ISBN 978-1-5090-3236-5
van Rijswijk-Deij, R.M. and Jonker, Mattijs and Sperotto, A. and Pras, A. (2016) A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE journal on selected areas in communications, 34 (6). pp. 1877-1888. ISSN 0733-8716 *** ISI Impact 3,672 ***
Steinberger, J. and Cardoso de Santanna, J.J. and Spatharas, E. and Amler, H. and Breuer, N. and Graul, K. and Kuhnert, B. and Piontek, U. and Sperotto, A. and Baier, H. and Pras, A. (2016) "LUDO" - Kids playing Distributed Denial of Service. In: Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016), 12-16 June 2016, Prague, Czech Republic. 3. European Journal of Higher Education IT 2016-02. EUNIS Research and Analysis Initiative. ISSN 2519-1764
Steinberger, J. and Kuhnert, B. and Alavi, S. and Cardoso de Santanna, J.J. and Sperotto, A. and Baier, H. and Pras, A. (2016) Whom do we trust - Booters and SSL/TLS certificates. In: Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016), 2-3 Jun 2016, Darmstadt, Germany. pp. 14-14. SIDAR-Reports SR-2016-01. German Informatics Society (GI). ISSN 2190-846X
Steinberger, J. and Kuhnert, B. and Sperotto, A. and Baier, H. and Pras, A. (2016) Collaborative DDoS Defense using Flow-based Security Event Information. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016 , 25-29 Apr 2016, Istanbul, Turkey. pp. 516-552. IEEE Communications Society. ISBN 978-1-5090-0223-8
Steinberger, J. and Kuhnert, B. and Sperotto, A. and Baier, H. and Pras, A. (2016) In Whom Do We Trust - Sharing Security Events. In: Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016), 20-23 June 2016, Munich, Germany. pp. 111-124. Lecture Notes in Computer Science 9701. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-39813-6

2015

Bouten, N. and de Oliveira Schmidt, R. and Famaey, J. and Latré, S. and Pras, A. and De Turck, F. (2015) QoE-Driven In-Network Optimization for Adaptive Video Streaming Based on Packet Sampling Measurements. Computer networks, 81. pp. 96-115. ISSN 1389-1286 *** ISI Impact 1,446 ***
Cardoso de Santanna, J.J. and Durban, R. and Sperotto, A. and Pras, A. (2015) Inside Booters: an analysis on operational databases. In: IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015, Ottawa, Canada. pp. 432-440. IEEE Computer Society. ISBN 978-3-901882-76-0
Cardoso de Santanna, J.J. and van Rijswijk-Deij, R.M. and Hofstede, R.J. and Sperotto, A. and Wierbosch, M. and Zambenedetti Granville, L. and Pras, A. (2015) Booters - an analysis of DDoS-as-a-Service attacks. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, 11-15 May 2015, Ottawa, Canada. 243 -251. IEEE Computer Society. ISBN 978-3-901882-76-0
Chromik, J.J. and Cardoso de Santanna, J.J. and Sperotto, A. and Pras, A. (2015) Booter websites characterization: Towards a list of threats. In: Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015, 18-22 May 2015, Vitoria, Brasil. pp. 445-458. Brazilian Computer Society (SBC). ISSN 2177-496X
Hendriks, L. and Sperotto, A. and Pras, A. (2015) Characterizing the IPv6 Security Landscape by Large-Scale Measurements. In: Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, 22-25 June 2015, Ghent, Belgium. pp. 145-149. Lecture Notes in Computer Science 9122. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-20033-0
Hofstede, R.J. and Hendriks, L. (2015) Unveiling SSHCure 3.0: Flow-based SSH Compromise Detection. In: Proceedings of the International Conference on Networked Systems, NetSys 2015, 9-13 Mar 2015, Cottbus, Germany. Brandenburg University of Technology Cottbus-Senftenberg. ISBN not assigned
Hofstede, R.J. and Hendriks, L. (2015) SSH Compromise Detection Using NetFlow/IPFIX. In: FloCon 2015, 12-15 Jan 2015, Portland, OR, USA. Carnegie Mellon University. ISBN not assigned
Jonker, Mattijs and Hofstede, R.J. and Sperotto, A. and Pras, A. (2015) Unveiling Flat Traffic on the Internet: An SSH Attack Case Study. In: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015, Ottawa, Canada. pp. 270-278. IEEE Communications Society. ISBN 978-3-901882-76-0
Jonker, Mattijs and Sperotto, A. (2015) Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking. In: Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, 22-25 June 2015, Ghent, Belgium. pp. 129-133. Lecture Notes in Computer Science 9122. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-20033-0
de Oliveira Schmidt, R. and van den Berg, J.L. and Pras, A. (2015) Measurement-Based Network Link Dimensioning. In: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015, Ottawa, Canada. 1071-1077. IEEE. ISBN 978-3-901882-76-0
de Oliveira Schmidt, R. and Sadre, R. and Sperotto, A. and van den Berg, J.L. and Pras, A. (2015) Impact of packet sampling on link dimensioning. IEEE Transactions on Network and Service Management, 12 (3). pp. 392-405. ISSN 1932-4537 *** ISI Impact 1,296 ***
Ossenbühl, S. and Steinberger, J. and Baier, H. (2015) Towards automated incident handling: how to select an appropriate response against a network-based attack? In: Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics (IMF 2015), 18-20 May 2015, Magdeburg, Germany. pp. 51-67. IEEE Computer Society. ISBN 978-1-4799-9902-6
van Rijswijk-Deij, R.M. and Jonker, Mattijs and Sperotto, A. and Pras, A. (2015) The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, 17-21 Aug 2015, London, UK. pp. 91-92. ACM. ISBN 978-1-4503-3542-3
van Rijswijk-Deij, R.M. and Sperotto, A. and Pras, A. (2015) Making the Case for Elliptic Curves in DNSSEC. ACM SIGCOMM Computer Communication Review, 45 (5). pp. 13-19. ISSN 0146-4833 *** ISI Impact 1,402 ***
Sperotto, A. and Doyen, G. and Latré, S. and Charalambides, M. and Famaey, J. and Velan, P. and Čeleda, P. (2015) Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014). Journal of Network and Systems Management, 23 (3). pp. 794-802. ISSN 1064-7570 *** ISI Impact 1,078 ***
Sperotto, A. and Hofstede, R.J. and Dainotti, A. and Schmitt, C. and Dreo Rodosek, G. (2015) Editorial special issue on measure, detect and mitigate – challenges and trends in network security. International journal of network management, 25 (5). pp. 261-262. ISSN 1055-7148 *** ISI Impact 0,681 ***
van der Steeg, D. and Hofstede, R.J. and Sperotto, A. and Pras, A. (2015) Real-time DDoS attack detection for Cisco IOS using NetFlow. In: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015, Ottawa, Canada. pp. 972-977. IEEE Communications Society. ISBN 978-3-901882-76-0
Steinberger, J. and Sperotto, A. and Baier, H. and Pras, A. (2015) Collaborative Attack Mitigation and Response: A survey. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015, Ottawa, Canada. pp. 910-913. IEEE Computer Society. ISBN 978-3-901882-76-0
Steinberger, J. and Sperotto, A. and Baier, H. and Pras, A. (2015) Exchanging security events of flow-based intrusion detection systems at internet scale. In: Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015), 19 June 2015, Berlin, Germany. 3. Internet Architecture Board Website. ISBN not assigned
Steinberger, J. and Sperotto, A. and Golling, M. and Baier, H. (2015) How to exchange security events? Overview and evaluation of formats and protocols. In: IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015, Ottawa, Canada. pp. 261-269. IEEE Computer Society. ISBN 978-3-901882-76-0
van der Toorn, O. and Hofstede, R.J. and Jonker, Mattijs and Sperotto, A. (2015) A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX. In: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015, Ottawa, Canada. pp. 862-865. IEEE Communications Society. ISBN 978-3-901882-76-0
de Vries, W.B. and Cardoso de Santanna, J.J. and Sperotto, A. and Pras, A. (2015) How asymmetric is the Internet? A Study to Support the use of Traceroute. In: Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, 22-25 June 2015, Ghent, Belgium. pp. 113-125. Lecture Notes in Computer Science 9122. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-20033-0

2014

Barbosa, R.R.R. (2014) Anomaly Detection in SCADA Systems - A Network Based Approach. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 14-300 ISBN 978-90-365-3645-5
van den Broek, G. and van Rijswijk-Deij, R.M. and Sperotto, A. and Pras, A. (2014) DNSSEC meets real world: dealing with unreachability caused by fragmentation. IEEE communications magazine, 52 (4). pp. 154-160. ISSN 0163-6804 *** ISI Impact 5,125 ***
Cardoso de Santanna, J.J. and Sperotto, A. (2014) Characterizing and Mitigating the DDoS-as-a-Service Phenomenon. In: Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, 30 Jun - 3 Jul 2014, Brno, Czech Republic. pp. 74-78. Lecture Notes in Computer Science 8508. Springer . ISSN 0302-9743 ISBN 978-3-662-43861-9
Dietrich, S. and van der Ham, J. and Pras, A. and van Rijswijk-Deij, R.M. and Shou, D. and Sperotto, A. and van Wynsberghe, A.L. and Zuck, L. D. (2014) Ethics in data sharing: developing a model for best practice. In: Proceedings of the IEEE CS Security and Privacy Workshop on Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS), 17 May, 2014, San Jose, CA, USA. pp. 5-9. IEEE Computer Society. ISBN 978-1-4799-5103-1
François, F. and Wang, Ning and Moessner, K. and Georgoulas, S. and de Oliveira Schmidt, R. (2014) Leveraging MPLS Backup Paths for Distributed Energy-Aware Traffic Engineering. Transactions on Network and Service Management, 11 (2). pp. 235-249. ISSN 1932-4537 *** ISI Impact 1,296 ***
Golling, M. and Hofstede, R.J. and Koch, R. (2014) Towards multi-layered intrusion detection in high-speed networks. In: Proceedings of the 6th International Conference on Cyber Conflict (CyCon 2014), 3-6 Jun 2014, Tallinn, Estonia. pp. 191-206. IEEE Communications Society. ISSN 2325-5366 ISBN 978-9949-9544-0-7
Golling, M. and Koch, R. and Hillmann, P. and Hofstede, R.J. and Tietze, F. (2014) YANG2UML: Bijective Transformation and Simplification of YANG to UML. In: Proceedings of the 10th International Conference on Network and Service Management, CNSM 2014, 17-21 Nov 2014, Rio de Janeiro, Brazil. pp. 300-303. IEEE Computer Society. ISBN 978-3-901882-67-8
Hendriks, L. and Hofstede, R.J. and Sperotto, A. and Pras, A. (2014) SSHCure: SSH Intrusion Detection using NetFlow and IPFIX. In: TERENA Networking Conference 2014, 19-22 May 2014, Dublin, Ireland. 22. Trans-European Research and Education Networking Association. ISBN not assigned
Hofstede, R.J. and Celeda, P. and Trammell, B. and Drago, I. and Sadre, R. and Sperotto, A. and Pras, A. (2014) Flow monitoring explained: from packet capture to data analysis with NetFlow and IPFIX. IEEE Communications Surveys & Tutorials, 16 (4). pp. 2037-2064. ISSN 1553-877X *** ISI Impact 9,220 ***
Hofstede, R.J. and Hendriks, L. and Sperotto, A. and Pras, A. (2014) SSH Compromise Detection using NetFlow/IPFIX. ACM SIGCOMM Computer Communication Review, 44 (5). pp. 20-26. ISSN 0146-4833 *** ISI Impact 1,402 ***
Hoogesteger, M. and de Oliveira Schmidt, R. and Sperotto, A. and Pras, A. (2014) ReFlow: Reports on Internet Traffic. In: TERENA Networking Conference, 19-22 May 2014, Dublin, Ireland. TERENA. ISBN not assigned
Karimzadeh Motallebi Azar, M. and Sperotto, A. and Pras, A. (2014) Software defined networking to improve mobility management performance. In: Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014), 30 June - 3 July 2014, Brno, Czech Republic. pp. 118-122. Lecture Notes in Computer Science 8508. Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-43861-9
Kerkers, M. and Cardoso de Santanna, J.J. and Sperotto, A. (2014) Characterisation of the Kelihos.B Botnet. In: Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, 30 Jun - 03 Jul 2014, Brno, Czech Republic. pp. 79-91. Lecture Notes in Computer Science 8508. Springer. ISSN 0302-9743 ISBN 978-3-662-43861-9
Maan, D. and Cardoso de Santanna, J.J. and Sperotto, A. and de Boer, P.T. (2014) Towards validation of the Internet Census 2012. (Invited) In: Proceedings of the 20th EUNICE/IFIP Workshop on Advances in Communication Networking, Revised Selected Papers, 1-5 Sep 2014, Rennes, France. pp. 85-96. Lecture Notes in Computer Science 8846. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-13487-1
Moreira Moura, G.C. and Sadre, R. and Pras, A. (2014) Bad neighborhoods on the internet. Communications Magazine, 52 (7). pp. 132-139. ISSN 0163-6804 *** ISI Impact 5,125 ***
Moreira Moura, G.C. and Sadre, R. and Pras, A. (2014) Internet Bad Neighborhoods temporal behavior. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), 5-9 May 2014, Krakow, Poland. IEEE Communications Society. ISBN 978-1-4799-0913-1
Moreira Moura, G.C. and Sadre, R. and Pras, A. (2014) Taking on Internet Bad Neighborhoods. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), 5-9 May 2014, Krakow, Poland. pp. 1-7. IEEE Communications Society. ISBN 978-1-4799-0913-1
de Oliveira Schmidt, R. (2014) Measurement-Based Link Dimensioning for the Future Internet. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-334 ISBN 978-90-365-3798-8
de Oliveira Schmidt, R. and Hendriks, L. and Pras, A. and van der Pol, R. (2014) OpenFlow-based Link Dimensioning. In: Proceedings of the Innovating the Network for Data Intensive Science Workshop, INDIS 2014, 16-21 Nov 2014, New Orleans, LA, USA. SCinet. ISBN not assigned
de Oliveira Schmidt, R. and Sadre, R. and Melnikov, N. and Schönwälder, J. and Pras, A. (2014) Linking network usage patterns to traffic Gaussianity fit. In: Proceedings of the 13th IFIP Networking Conference 2014, 2-4 June 2014, Trondheim, Norway. pp. 1-9. IEEE Computer Society. ISBN 978-3-901882-58-6
de Oliveira Schmidt, R. and Sadre, R. and Sperotto, A. and van den Berg, J.L. and Pras, A. (2014) A hybrid procedure for efficient link dimensioning. Computer networks, 67. pp. 252-269. ISSN 1389-1286 *** ISI Impact 1,446 ***
Pras, A. and Pavlou, G. (2014) Network and Service Management - Series Editorial. IEEE communications magazine, 52 (1). pp. 130-131. ISSN 0163-6804 *** ISI Impact 5,125 ***
van Rijswijk-Deij, R.M. and Sperotto, A. and Pras, A. (2014) DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study. In: Proceedings of the Fourteenth ACM Internet Measurement Conference, ACM IMC 2014, 5-7 Nov 2014, Vancouver, Canada. pp. 449-460. ACM. ISBN 978-1-4503-3213-2
van Rijswijk-Deij, R.M. and Sperotto, A. and Pras, A. (2014) Large-scale DNS and DNSSEC data sets for network security research. Technical Report TR-CTIT-14-13, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Sadre, R. and Sperotto, A. and Hofstede, R.J. and Brownlee, N. (2014) Flow-based approaches in network management: recent advances and future trends - Editorial. International Journal of Network Management, 24 (4). pp. 219-220. ISSN 1055-7148 *** ISI Impact 0,681 ***
Steinberger, J. and Sperotto, A. and Pras, A. and Baier, H. (2014) Real-time DDoS defense: a collaborative approach at internet scale. In: Trans-European Research and Education Networking Association (TNC 2014), 19-22 May 2014, Dublin, Ireland. 133. GÉANT Association. ISBN not assigned

2013

Doyen, G. and Waldburger, M. and Čeleda, P. and Sperotto, A. and Stiller, B., ed. (2013) Emerging Management Mechanisms for the Future Internet. 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7943. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-38997-9
Drago, I. (2013) Understanding and Monitoring Cloud Services. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-279 ISBN 978-90-365-3577-9
Drago, I. and Bocchi, E. and Mellia, M. and Slatman, H. and Pras, A. (2013) Benchmarking personal cloud storage. In: Proceedings of the 13th ACM Internet Measurement Conference, IMC 2013, 23-25 Oct 2013, Barcelona, Spain. pp. 205-212. ACM. ISBN 978-1-4503-1953-9
Drago, I. and de Oliveira Schmidt, R. and Hofstede, R.J. and Sperotto, A. and Karimzadeh Motallebi Azar, M. and Haverkort, B.R.H.M. and Pras, A. (2013) Networking for the Cloud: Challenges and Trends. PIK - Praxis der Informationsverarbeitung und Kommunikation, 36 (4). pp. 207-214. ISSN 0930-5157
Ellens, W. and Zuraniewski, P. and Sperotto, A. and Schotanus, H. and Mandjes, M.R.H. and Meeuwissen, E. (2013) Flow-based detection of DNS tunnels. In: Proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, June 25-28, 2013, Barcelona, Spain. pp. 124-135. Lecture Notes in Computer Science 7943. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-38997-9
Hofstede, R.J. and Bartos, V. and Sperotto, A. and Pras, A. (2013) Towards real-time intrusion detection for NetFlow and IPFIX. In: Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013, 14-18 Oct 2013, Zürich, Switserland. pp. 227-234. IEEE Computer Society. ISBN 978-3-901882-53-1
Hoogesteger, M. and de Oliveira Schmidt, R. and Sperotto, A. and Pras, A. (2013) Reports on internet traffic statistics. In: TERENA Networking Conference, TNC 2013, 3-6 Jun 2013, Maastricht, The Netherlands. 19. Trans-European Research and Education Networking Association. ISBN not assigned
Moreira Moura, G.C. (2013) Internet Bad Neighborhoods. PhD thesis, University of Twente. CTIT Ph.D.-thesis Series No. 12-237 ISBN 978-90-365-3460-4
de Oliveira Schmidt, R. and Sadre, R. and Pras, A. (2013) Gaussian traffic revisited. In: Proceedings of the 12th IFIP Networking Conference, 22-24 May 2013, Brooklyn, NY, USA. article 21. International Federation for Information Processing. ISBN 978-3-901882-55-5
de Oliveira Schmidt, R. and Sadre, R. and Sperotto, A. and Pras, A. (2013) Lightweight link dimensioning using sFlow sampling. In: Proceedings of the 9th International Conference on Network and Services Management (CNSM 2013), 14-18 Oct 2013, Zurich, Switzerland. pp. 152-155. IEEE Computer Society. ISBN 978-3-901882-53-1
Steinberger, J. and Schehlmann, L. and Abt, S. and Baier, H. (2013) Anomaly Detection and Mitigation at Internet Scale: A Survey. In: 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, June 25-28, 2013, Barcelona, Spain. pp. 49-60. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-38997-9

2012

Pavlou, G. and Pras, A. (2012) Series editorial: Topics in network and service management. IEEE Communications Magazine, 50 (12). pp. 132-133. ISSN 0163-6804 *** ISI Impact 5,125 ***