default search action
Lambert J. M. Nieuwenhuis
Person information
- affiliation: University of Twente, Enschede, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Sander Zeijlemaker, Annette Chau, Michael Siegel, Lambert J. M. Nieuwenhuis:
Measuring Malware Detection Capability for Security Decision Making. EuroS&P Workshops 2024: 342-351 - [c35]Ebrima Jaw, Moritz Müller, Cristian Hesselman, Lambert J. M. Nieuwenhuis:
Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics. TMA 2024: 1-10 - 2023
- [c34]Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Raffaele Sommese, Mattijs Jonker, Lambert J. M. Nieuwenhuis:
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict. EuroS&P Workshops 2023: 487-494 - [i4]Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Raffaele Sommese, Mattijs Jonker, Lambert J. M. Nieuwenhuis:
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict. CoRR abs/2305.17666 (2023) - 2022
- [c33]Muhammad Yasir Muzayan Haq, Mattijs Jonker, Roland van Rijswijk-Deij, kc claffy, Lambert J. M. Nieuwenhuis, Abhishta Abhishta:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. EuroS&P Workshops 2022: 322-331 - [i3]Muhammad Yasir Muzayan Haq, Mattijs Jonker, Roland van Rijswijk-Deij, Kimberly C. Claffy, Lambert J. M. Nieuwenhuis, Abhishta Abhishta:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. CoRR abs/2205.12765 (2022) - 2021
- [c32]Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Lambert J. M. Nieuwenhuis:
The effect of consumer portfolio on the risk profile of cloud provider. SIGCOMM Posters and Demos 2021: 18-20 - 2020
- [j6]Abhishta Abhishta, Wouter van Heeswijk, Marianne Junger, Lambert J. M. Nieuwenhuis, Reinoud Joosten:
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2): 3-22 (2020)
2010 – 2019
- 2019
- [c31]Abhishta Abhishta, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
A Note on Analysing the Attacker Aims Behind DDoS Attacks. IDC 2019: 255-265 - [c30]Abhishta Abhishta, Reinoud Joosten, Sergey Dragomiretskiy, Lambert J. M. Nieuwenhuis:
Impact of Successful DDoS Attacks on a Major Crypto-Currency Exchange. PDP 2019: 379-384 - [c29]Abhishta Abhishta, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network. IEEE Symposium on Security and Privacy Workshops 2019: 242-247 - 2018
- [j5]Abhishta Abhishta, Roland van Rijswijk-Deij, Lambert J. M. Nieuwenhuis:
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers. Comput. Commun. Rev. 48(5): 70-76 (2018) - [c28]C. G. J. Putman, Abhishta, Lambert J. M. Nieuwenhuis:
Business Model of a Botnet. PDP 2018: 441-445 - [c27]Abhishta, Roland van Rijswijk-Deij, Lambert J. M. Nieuwenhuis:
Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers. WTMC@SIGCOMM 2018: 1-7 - [i2]C. G. J. Putman, Abhishta, Lambert J. M. Nieuwenhuis:
Business Model of a Botnet. CoRR abs/1804.10848 (2018) - [i1]Abhishta, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
Analysing The Impact Of A DDoS Attack Announcement On Victim Stock Prices. CoRR abs/1805.00749 (2018) - 2017
- [j4]Abhishta, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(4): 1-18 (2017) - [c26]Abhishta, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices. PDP 2017: 354-362 - 2014
- [j3]Maria-Eugenia Iacob, Lucas O. Meertens, Henk Jonkers, Dick A. C. Quartel, Lambert J. M. Nieuwenhuis, Marten van Sinderen:
From enterprise architecture to business models and back. Softw. Syst. Model. 13(3): 1059-1083 (2014) - 2013
- [c25]Lucas Onno Meertens, Eelco Starreveld, Maria-Eugenia Iacob, Bart Nieuwenhuis:
Creating a Business Case from a Business Model. BMSD 2013: 46-63 - 2012
- [c24]Berend T. Alberts, Lucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis:
A Meta-Model Perspective on Business Models. BMSD 2012: 64-81 - [c23]Lucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis, Marten van Sinderen, Henk Jonkers, Dick A. C. Quartel:
Mapping the business model canvas to ArchiMate. SAC 2012: 1694-1701 - 2011
- [c22]Lucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis:
A Method for Business Model Development. BMSD 2011: 113-129 - 2010
- [c21]Lucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis:
Towards a Definition of Role-Related Concepts for Business Modeling. EDOCW 2010: 138-146 - [c20]Lambert J. M. Nieuwenhuis, Björn Kijl:
Business Model Engineering for a Wireless Telerehabilitation Service. eTELEMED 2010: 5-10 - [c19]Björn Kijl, Bart Nieuwenhuis:
Deploying a Telerehabilitation Service Innovation: An Early Stage Business Model Engineering Approach. HICSS 2010: 1-10 - [c18]Lucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis:
Goal and model driven design of an architecture for a care service platform. SAC 2010: 158-164
2000 – 2009
- 2009
- [j2]Aiko Pras, Lambert J. M. Nieuwenhuis, Remco van de Meent, Michel Mandjes:
Dimensioning network links: a new look at equivalent bandwidth. IEEE Netw. 23(2): 5-10 (2009) - [c17]Minh van Le, Frens Jan Rumph, George B. Huitema, Bert-Jan van Beijnum, Lambert J. M. Nieuwenhuis:
Online Charging for IMS-Based Inter-domain Composite Services. ICQT 2009: 72-84 - [c16]Minh van Le, George B. Huitema, Frens Jan Rumph, Lambert J. M. Nieuwenhuis, Bert-Jan van Beijnum:
Design of an Online Charging System to Support IMS-Based Inter-domain Composite Services. MMNS 2009: 1-14 - 2008
- [c15]Minh van Le, Bert-Jan van Beijnum, Lambert J. M. Nieuwenhuis, George B. Huitema:
An Enterprise Model for Real-Time Inter-domain Billing of Services. EDOCW 2008: 405-412 - 2007
- [c14]Bart Nieuwenhuis:
Service Science for Market Services. ENASE 2007: 29 - [c13]Bart Nieuwenhuis:
Service Science for Market Services. ICSOFT (PL/DPS/KE/MUSE) 2007: 29 - 2005
- [c12]Róbert Párhonyi, Dick A. C. Quartel, Aiko Pras, Lambert J. M. Nieuwenhuis:
An interconnection architecture for micropayment systems. ICEC 2005: 633-640 - [c11]Róbert Párhonyi, Lambert J. M. Nieuwenhuis, Aiko Pras:
Second generation micropayment systems: lessons learned. I3E 2005: 345-359 - 2003
- [c10]Remco van de Meent, Aiko Pras, Michel Mandjes, Hans van den Berg, Lambert J. M. Nieuwenhuis:
Traffic Measurements for Link Dimensioning - A Case Study. DSOM 2003: 106-117 - 2001
- [c9]João Paulo A. Almeida, Maarten Wegdam, Marten van Sinderen, Lambert J. M. Nieuwenhuis:
Transparent Dynamic Reconfiguration for CORBA. DOA 2001: 197-207 - [e1]Marten van Sinderen, Lambert J. M. Nieuwenhuis:
Protocols for Multimedia Systems, 6th International Conference, PROMS 2001, Enschede, The Netherlands, October 17-19, 2001, Proceedings. Lecture Notes in Computer Science 2213, Springer 2001, ISBN 3-540-42708-2 [contents] - 2000
- [c8]Maarten Wegdam, Dirk-Jaap Plas, Aart van Halteren, Bart Nieuwenhuis:
Using Message Reflection in a Management Architecture for CORBA. DSOM 2000: 230-242 - [c7]Cristian Hesselman, Ing Widya, Aart van Halteren, Bart Nieuwenhuis:
Middleware Support for Media Streaming Establishment Driven by User-Oriented QoS Requirements. IDMS 2000: 158-171 - [c6]Maarten Wegdam, Dirk-Jaap Plas, Aart van Halteren, Bart Nieuwenhuis:
ORB Instrumentation for Management of CORBA. PDPTA 2000 - [c5]Lambert J. M. Nieuwenhuis, Ing Widya:
Quality of Service and Service Provisioning on a Competitive Market. USM 2000: 17-26
1990 – 1999
- 1999
- [c4]Aart van Halteren, A. Noutash, Lambert J. M. Nieuwenhuis, Maarten Wegdam:
Extending CORBA with Specialised Protocols for QoS Provisioning. DOA 1999: 318-327 - 1996
- [j1]Mark A. Nankman, Lambert J. M. Nieuwenhuis:
Specification of a distributed storage system. Comput. Commun. 19(1): 30-38 (1996) - 1992
- [c3]Lambert J. M. Nieuwenhuis:
A Dependable Distributed Software Architecture. NATO ASI RTC 1992: 563-564 - [c2]Lambert J. M. Nieuwenhuis:
Dependability of Telecommunication Software. NATO ASI RTC 1992: 645-646 - 1991
- [b1]Lambert J. M. Nieuwenhuis:
Fault tolerance through program transformation. PTT Research 1991, ISBN 978-90-72125-29-3, pp. I-VIII, 1-280 - 1990
- [c1]Lambert J. M. Nieuwenhuis:
Static allocation of process replicas in fault tolerant computing systems. FTCS 1990: 298-306
Coauthor Index
aka: Abhishta Abhishta
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint