Lambert J. M. Nieuwenhuis

ORCID: 0000-0002-6438-7756
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Service-Oriented Architecture and Web Services
  • Business Process Modeling and Analysis
  • Information and Cyber Security
  • Service and Product Innovation
  • Advanced Software Engineering Methodologies
  • Spam and Phishing Detection
  • Network Traffic and Congestion Control
  • Internet Traffic Analysis and Secure E-voting
  • Software System Performance and Reliability
  • Digital Platforms and Economics
  • Innovative Approaches in Technology and Social Development
  • Distributed systems and fault tolerance
  • Mobile Agent-Based Network Management
  • Information Technology Governance and Strategy
  • Multimedia Communication and Technology
  • IPv6, Mobility, Handover, Networks, Security
  • Information Systems Theories and Implementation
  • Advanced Optical Network Technologies
  • Distributed and Parallel Computing Systems
  • Cybercrime and Law Enforcement Studies
  • Cloud Computing and Resource Management
  • Technology Adoption and User Behaviour
  • Big Data and Business Intelligence
  • Embedded Systems Design Techniques

University of Twente
2012-2024

Entrepreneurial Ecosystems
2021

Fontys University of Applied Sciences
2017

Netherlands Institute for Radio Astronomy
1986-2013

Vrije Universiteit Amsterdam
2004

KPN (Netherlands)
1996-2002

University of Groningen
1995

Radboud University Nijmegen
1981

Many IT projects fail to succeed in the market, as they start purely from technology. Much effort is therefore wasted, while potential benefits are not realized. We argue that design process should with creating a business model, which then translated an architecture ensure fitness for market of future system. Therefore, we propose mapping Osterwalder's modeling canvas and ontology enterprise standard ArchiMate, makes above translation possible represents formal basis ArchiMate. A case study...

10.1145/2245276.2232049 article EN 2012-03-26

This study investigates inter-organizational tensions in servitization and develops a dialectic process model to better understand the emergent nature of servitization. Inter-organizational have gained increasing attention literature recently, but their role requires further research. By combining theory ARA framework from Industrial Marketing Purchasing (IMP) tradition, we develop that identifies as generative forces We present single case about implementation circular service proposition...

10.1016/j.indmarman.2023.01.004 article EN cc-by Industrial Marketing Management 2023-02-01

Distributed systems with high availability requirements have to support some form of dynamic reconfiguration. This means that they must provide the ability be maintained or upgraded without being taken off-line. Building a distributed system allows reconfiguration is very intrusive overall design system, and generally requires special skills from both client server side application developers. There an opportunity for at object middleware level systems, create transparency We propose Dynamic...

10.1109/doa.2001.954085 article EN 2002-11-13

A single-gene nuclear mutant has been selected from the yeast Schizosaccharomyces pombe for growth resistance to Dio-9, a plasma membrane H+-ATPase inhibitor. From this mutant, called pma1, an ATPase activity purified. It contains Mr = 100,000 major polypeptide which is phosphorylated by [gamma-32P] ATP. Proton pumping not impaired since isolated able, in reconstituted proteoliposomes, quench fluorescence of delta pH probe 9-amino-6-chloro-2-methoxy acridine. The sensitive Dio-9 as well...

10.1016/s0021-9258(19)75914-6 article EN cc-by Journal of Biological Chemistry 1987-01-01

One of the tasks network management is to dimension capacity access and backbone links. Rules thumb can be used, but they lack rigor precision, as fail reliably predict whether quality, agreed on in service level agreement, actually provided. To make better predictions, a more sophisticated mathematical setup needed. The major contribution this article that it presents such setup; pivotal role played by simple, yet versatile, formula gives minimum amount needed function average traffic rate,...

10.1109/mnet.2009.4804330 article EN IEEE Network 2009-03-01

Distributed Denial of Service (DDoS) attacks provide an easy option for these criminals to disrupt the business online platforms. We analyse economic impact DDoS on a crypto-currency exchange using event analysis. Our contributions are fourfold: Firstly, we develop estimation model utilising ideas from behavioural finance predict volume traded basis changes in price. Secondly, perform analysis evaluate whether there is attack 17 different cases. Thirdly, find that 13 cases negative due...

10.1109/empdp.2019.8671642 article EN 2019-02-01

Reliable availability to the internet and internet-based services is crucial in today’s world. DDoS attacks pose a severe threat of such online resources – especially owing booters virtually everyone can execute them nowadays. In order appropriately protect oneself against attacks, it essential have good insight into threats that exist. This paper proposes novel hybrid model combines postulates from various models on crime opportunity, analyzing targeted victim infrastructure conjunction. We...

10.22667/jowua.2020.06.30.003 article EN Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications 2020-06-30

The lactose-H+ symport protein (LacS) of Streptococcus thermophilus has a C-terminal hydrophilic domain that is homologous to IIA protein(s) domains the phosphoenolpyruvate:sugar phosphotransferase system (PTS). truncation mutants were constructed and expressed in Escherichia coli their properties analyzed. Remarkably, entire (160 amino acids) could be deleted without significant effect on galactoside equilibrium exchange. Analysis LacS S. cells suggested transport affected by PTS-mediated...

10.1073/pnas.92.3.778 article EN Proceedings of the National Academy of Sciences 1995-01-31

Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat the availability of Internet services. The Domain Name System (DNS) is part core and crucial factor in successful delivery Because importance DNS, specialist service providers have sprung up market, that provide managed DNS One their key selling points they protect for domain against DDoS attacks. But what if such becomes target attack, attack succeeds? In this paper we analyse two events, an on NS1 May 2016, Dyn...

10.1145/3310165.3310175 article EN ACM SIGCOMM Computer Communication Review 2019-01-28

We designed a business model for deploying myofeedback-based teletreatment service. An iterative and combined qualitative quantitative action design approach was used developing the related value network. Insights from surveys, desk research, expert interviews, workshops modelling were to produce first then refine it in three cycles. The engineering strategy provided important insights which led an improved, more viable feasible network design. Based on this experience, we conclude that...

10.1258/jtt.2010.006009 article EN Journal of Telemedicine and Telecare 2010-08-26

10.1016/j.nima.2011.10.041 article EN Nuclear Instruments and Methods in Physics Research Section A Accelerators Spectrometers Detectors and Associated Equipment 2011-11-07

Botnets continue to be an active threat against firms or companies and individuals worldwide. Previous research regarding botnets has unveiled information on how the system their stakeholders operate, but insight economic structure that supports these is lacking. The objective of this analyse business model determine revenue stream a botnet owner. We also study life-cycle costs associated with it basis four case studies. conclude building full scale cyber army from scratch very expensive...

10.1109/pdp2018.2018.00077 preprint EN 2018-03-01

The objective of this study was to design a viable business model for commercially deploying telerehabilitation service innovation in the R&D deployment phase. In paper engineering approach used conceptualize is described, analyzed and evaluated. An iterative, multi-method combined qualitative quantitative action developing related value network service. Insights from surveys, desk research, expert interviews, workshops modeling were engineer consequently refine it three cycles.

10.1109/hicss.2010.134 article EN 2010-01-01

DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools available to launch an attack significant intensity. These lead a variety losses at the victim's end. We analyse impact Distributed Denial-of-Service (DDoS) announcements over period 5 years on stock prices victim firms. propose method event studies that does not assume cumulative abnormal returns be normally distributed, instead we use empirical distribution testing In most...

10.1109/pdp.2017.82 preprint EN 2017-01-01

In Europe, musculoskeletal disorders constitute a major problem in terms of self-reported symptoms.1 the Netherlands, prevalence neck and shoulder pain workplace is 23%, which similar to mean European prevalence.2 These complaints are associated with enormous costs individual suffering. For total upper extremity estimated be Euro 2.1 billion per year.3 Also, unrelated work industrialized countries number people these growing rapidly. Nineteen percent Europeans experience chronic complaints,...

10.1258/jtt.2010.006001 article EN Journal of Telemedicine and Telecare 2010-08-26

The objective of this study was to design a viable business model for commercially deploying an e-health service innovation – i.e. so-called myofeedback-based teletreatment in the R&D deployment phase. In paper, and regulatory validation strategy used conceptualise is described, analysed evaluated. Insights from surveys, desk research, expert interviews, workshops quantitative modelling were combined engineer consequently refine it four cycles. engineering led critical insights that would...

10.1504/ijhtm.2011.037219 article EN International Journal of Healthcare Technology and Management 2010-12-01

Service-Oriented Architecture holds the potential of allowing development on-the-fly flexible applications that can adapt rapidly by combining and reusing existing services. We believe in order to react swiftly coherently changes, an architecture must provide a capability capture how services, more complex based on them, realize business motivations. This research develops framework method for goal-driven, model-driven, service-oriented design. The includes goal modeling MDA stack, from CIM...

10.1145/1774088.1774119 article EN 2010-03-22
Coming Soon ...