- Network Security and Intrusion Detection
- Service-Oriented Architecture and Web Services
- Business Process Modeling and Analysis
- Information and Cyber Security
- Service and Product Innovation
- Advanced Software Engineering Methodologies
- Spam and Phishing Detection
- Network Traffic and Congestion Control
- Internet Traffic Analysis and Secure E-voting
- Software System Performance and Reliability
- Digital Platforms and Economics
- Innovative Approaches in Technology and Social Development
- Distributed systems and fault tolerance
- Mobile Agent-Based Network Management
- Information Technology Governance and Strategy
- Multimedia Communication and Technology
- IPv6, Mobility, Handover, Networks, Security
- Information Systems Theories and Implementation
- Advanced Optical Network Technologies
- Distributed and Parallel Computing Systems
- Cybercrime and Law Enforcement Studies
- Cloud Computing and Resource Management
- Technology Adoption and User Behaviour
- Big Data and Business Intelligence
- Embedded Systems Design Techniques
University of Twente
2012-2024
Entrepreneurial Ecosystems
2021
Fontys University of Applied Sciences
2017
Netherlands Institute for Radio Astronomy
1986-2013
Vrije Universiteit Amsterdam
2004
KPN (Netherlands)
1996-2002
University of Groningen
1995
Radboud University Nijmegen
1981
Many IT projects fail to succeed in the market, as they start purely from technology. Much effort is therefore wasted, while potential benefits are not realized. We argue that design process should with creating a business model, which then translated an architecture ensure fitness for market of future system. Therefore, we propose mapping Osterwalder's modeling canvas and ontology enterprise standard ArchiMate, makes above translation possible represents formal basis ArchiMate. A case study...
This study investigates inter-organizational tensions in servitization and develops a dialectic process model to better understand the emergent nature of servitization. Inter-organizational have gained increasing attention literature recently, but their role requires further research. By combining theory ARA framework from Industrial Marketing Purchasing (IMP) tradition, we develop that identifies as generative forces We present single case about implementation circular service proposition...
Distributed systems with high availability requirements have to support some form of dynamic reconfiguration. This means that they must provide the ability be maintained or upgraded without being taken off-line. Building a distributed system allows reconfiguration is very intrusive overall design system, and generally requires special skills from both client server side application developers. There an opportunity for at object middleware level systems, create transparency We propose Dynamic...
A single-gene nuclear mutant has been selected from the yeast Schizosaccharomyces pombe for growth resistance to Dio-9, a plasma membrane H+-ATPase inhibitor. From this mutant, called pma1, an ATPase activity purified. It contains Mr = 100,000 major polypeptide which is phosphorylated by [gamma-32P] ATP. Proton pumping not impaired since isolated able, in reconstituted proteoliposomes, quench fluorescence of delta pH probe 9-amino-6-chloro-2-methoxy acridine. The sensitive Dio-9 as well...
One of the tasks network management is to dimension capacity access and backbone links. Rules thumb can be used, but they lack rigor precision, as fail reliably predict whether quality, agreed on in service level agreement, actually provided. To make better predictions, a more sophisticated mathematical setup needed. The major contribution this article that it presents such setup; pivotal role played by simple, yet versatile, formula gives minimum amount needed function average traffic rate,...
Distributed Denial of Service (DDoS) attacks provide an easy option for these criminals to disrupt the business online platforms. We analyse economic impact DDoS on a crypto-currency exchange using event analysis. Our contributions are fourfold: Firstly, we develop estimation model utilising ideas from behavioural finance predict volume traded basis changes in price. Secondly, perform analysis evaluate whether there is attack 17 different cases. Thirdly, find that 13 cases negative due...
Reliable availability to the internet and internet-based services is crucial in today’s world. DDoS attacks pose a severe threat of such online resources – especially owing booters virtually everyone can execute them nowadays. In order appropriately protect oneself against attacks, it essential have good insight into threats that exist. This paper proposes novel hybrid model combines postulates from various models on crime opportunity, analyzing targeted victim infrastructure conjunction. We...
The lactose-H+ symport protein (LacS) of Streptococcus thermophilus has a C-terminal hydrophilic domain that is homologous to IIA protein(s) domains the phosphoenolpyruvate:sugar phosphotransferase system (PTS). truncation mutants were constructed and expressed in Escherichia coli their properties analyzed. Remarkably, entire (160 amino acids) could be deleted without significant effect on galactoside equilibrium exchange. Analysis LacS S. cells suggested transport affected by PTS-mediated...
Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat the availability of Internet services. The Domain Name System (DNS) is part core and crucial factor in successful delivery Because importance DNS, specialist service providers have sprung up market, that provide managed DNS One their key selling points they protect for domain against DDoS attacks. But what if such becomes target attack, attack succeeds? In this paper we analyse two events, an on NS1 May 2016, Dyn...
We designed a business model for deploying myofeedback-based teletreatment service. An iterative and combined qualitative quantitative action design approach was used developing the related value network. Insights from surveys, desk research, expert interviews, workshops modelling were to produce first then refine it in three cycles. The engineering strategy provided important insights which led an improved, more viable feasible network design. Based on this experience, we conclude that...
Botnets continue to be an active threat against firms or companies and individuals worldwide. Previous research regarding botnets has unveiled information on how the system their stakeholders operate, but insight economic structure that supports these is lacking. The objective of this analyse business model determine revenue stream a botnet owner. We also study life-cycle costs associated with it basis four case studies. conclude building full scale cyber army from scratch very expensive...
The objective of this study was to design a viable business model for commercially deploying telerehabilitation service innovation in the R&D deployment phase. In paper engineering approach used conceptualize is described, analyzed and evaluated. An iterative, multi-method combined qualitative quantitative action developing related value network service. Insights from surveys, desk research, expert interviews, workshops modeling were engineer consequently refine it three cycles.
DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools available to launch an attack significant intensity. These lead a variety losses at the victim's end. We analyse impact Distributed Denial-of-Service (DDoS) announcements over period 5 years on stock prices victim firms. propose method event studies that does not assume cumulative abnormal returns be normally distributed, instead we use empirical distribution testing In most...
In Europe, musculoskeletal disorders constitute a major problem in terms of self-reported symptoms.1 the Netherlands, prevalence neck and shoulder pain workplace is 23%, which similar to mean European prevalence.2 These complaints are associated with enormous costs individual suffering. For total upper extremity estimated be Euro 2.1 billion per year.3 Also, unrelated work industrialized countries number people these growing rapidly. Nineteen percent Europeans experience chronic complaints,...
The objective of this study was to design a viable business model for commercially deploying an e-health service innovation – i.e. so-called myofeedback-based teletreatment in the R&D deployment phase. In paper, and regulatory validation strategy used conceptualise is described, analysed evaluated. Insights from surveys, desk research, expert interviews, workshops quantitative modelling were combined engineer consequently refine it four cycles. engineering led critical insights that would...
Service-Oriented Architecture holds the potential of allowing development on-the-fly flexible applications that can adapt rapidly by combining and reusing existing services. We believe in order to react swiftly coherently changes, an architecture must provide a capability capture how services, more complex based on them, realize business motivations. This research develops framework method for goal-driven, model-driven, service-oriented design. The includes goal modeling MDA stack, from CIM...