Filter
Article in proceeding

Search results

  • Article in proceeding

    A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks

    Srinivasa, S., Georgoulias, D., Pedersen, J. M. & Vasilomanolakis, E., Mar 2022, IEEE European Symposium on Security and Privacy, Workshop on Attackers and Cyber-Crime Operations. IEEE, p. 82-92 11 p. 9799405. (IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    357 Downloads (Pure)
  • A Capacity Dimensioning Method for Broadband Distribution Networks

    Shawky, A., Pedersen, J. M., Bergheim, H. & Ragnarsson, Ó., 2010, The proceedings of the 7th International Conference on Informatics and Systems 2010. IEEE Press, 7 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    248 Downloads (Pure)
  • A collaborative approach to botnet protection

    Stevanovic, M., Revsbech, K., Pedersen, J. M., Sharp, R. & Damsgaard Jensen, C., 20 Aug 2012, Multidisciplinary Research and Practice for Information Systems : IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings. Springer, Vol. 7465. p. 624-638 15 p. (Lecture Notes in Computer Science).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    11 Citations (Scopus)
  • A Comparison of Network Planning Strategies

    Pedersen, J. M., Riaz, M. T., Dubalski, B. & Madsen, O. B., 2008, 10th International Conference on Advanced Communication Technology, 2008. ICACT 2008.. IEEE, p. 702-707 5 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    9 Citations (Scopus)
  • A Generalization of the Generalized Petersen Graphs and N2R Network Structures

    Pedersen, J. M., Riaz, M. T., Nielsen, R. H. & Madsen, O. B., 2006, Proceedings of the Third IASTED International Conference on Communications and Computer Networks. Acta Press, p. 52-56 5 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • A hybrid Genetic and Simulated Annealing Algorithm for Chordal Ring implementation in large-scale networks

    Riaz, M. T., Gutierrez Lopez, J. M., Pedersen, J. M., Kiedrowski, P. & Dubalski, B., 2011, Image Processing and Communications Challenges 3. Springer, Vol. 102. p. 503-510 (Advances in Intelligent and Soft Computing).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • A Method for Assessing Quality of Service in Broadband Networks

    Bujlow, T., Riaz, M. T. & Pedersen, J. M., 21 Feb 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT). IEEE Press, p. 826-831 6 p. (Proceeding & Journal of the International Conference on Advanced Communication Technology).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    7 Citations (Scopus)
    2576 Downloads (Pure)
  • A Method for Automated Planning of FTTH Access Network Infrastructures

    Riaz, M. T., Pedersen, J. M. & Madsen, O. B., 2005, Proceedings of the IT&T Annual Conference 2005. Walsh, P. (ed.). 9 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    3173 Downloads (Pure)
  • A method for classification of network traffic based on C5.0 Machine Learning Algorithm

    Bujlow, T., Riaz, M. T. & Pedersen, J. M., 2 Feb 2012, ICNC'12: 2012 International Conference on Computing, Networking and Communications (ICNC): Workshop on Computing, Networking and Communications. IEEE Press, p. 237-241 5 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    111 Citations (Scopus)
    6701 Downloads (Pure)
  • A Method for Upper Bounding Long Term Growth of Network Access Speed

    Knudsen, T. P., Pedersen, J. M. & Madsen, O. B., 2004, Proceedings of SCI 2004, Orlando Florida. p. 43-46

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearch

  • A Method for Upper Bounding on Network Access Speed

    Knudsen, T. P., Patel, A., Pedersen, J. M. & Madsen, O. B., 2004, Proceedings of Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2004, Newcastle, UK.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearch

  • An algorithm and a Tool for Wavelength Allocation in OMS-SP Ring Architecture

    Riaz, M. T., Pedersen, J. M. & Madsen, O. B., 2006, Proceedings of The 8th International Conference on Advanced Communication Technology: ICACT 2006. IEEE Press, Vol. 2. p. 1059-1062 4 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    832 Downloads (Pure)
  • Analysis of Degree 5 Chordal Rings for Network Topologies

    Riaz, M. T., Pedersen, J. M., Bujnowski, S., Dubalski, B. & Zabłudowski, A., 10 Aug 2011, Image Processing and Communication Challenges 3. Springer Berlin / Heidelberg: Springer, Vol. Volume 102/2011. p. 445-457 13 p. (Advances in Intelligent and Soft Computing, Vol. Volume 55 / 2009 - Volume 142 / 2012).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    9 Citations (Scopus)
  • Analysis of Malware behavior: Type classification using machine learning

    Pirscoveanu, R-S., Hansen, S. S., Larsen, T. M. T., Stevanovic, M., Pedersen, J. M. & Czech, A., Aug 2015, International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015. IEEE, 7 p. (International Conference on Cyber Situational Awareness, Data Analytics and Assessment Proceedings. (cyberSA)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    91 Citations (Scopus)
  • Analyzing Broadband Divide in the Farming Sector

    Jensen, M., Gutierrez Lopez, J. M. & Pedersen, J. M., 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, p. 578 - 582 5 p. (Proceedings of the International Conference on Advanced Information Networking and Applications).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    File
    1 Citation (Scopus)
    518 Downloads (Pure)
  • An analysis of network traffic classification for botnet detection

    Stevanovic, M. & Pedersen, J. M., Aug 2015, The proceedings of International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015. IEEE Press, 8 p. (International Conference on Cyber Situational Awareness, Data Analytics and Assessment Proceedings. (cyberSA)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements

    Singla, R., Srinivasa, S., Reddy, N., Pedersen, J. M., Vasilomanolakis, E. & Bettati, R., 1 Jul 2023, 2023 7th Network Traffic Measurement and Analysis Conference (TMA). IEEE, 10199005

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • An approach for detection and family classification of malware based on behavioral analysis

    Hansen, S. S., Larsen, T. M. T., Stevanovic, M. & Pedersen, J. M., Feb 2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, 5 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    90 Citations (Scopus)
  • An Approach to Detect and Prevent Cybercrime in Large Complex Networks

    Sorensen, A., Remy, M. J., Kjettrup, N., Mahmoud, R. V. & Pedersen, J. M., 4 Dec 2018, 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018. IEEE, 8 p. 8560687. (International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). Proceedings.).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence

    Anagnostopoulos, M., Kidmose, E., Laghaout, A., Olsen, R. L., Homayoun, S., Jensen, C. D. & Pedersen, J. M., 2021, Network and System Security: 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings. Yang, M., Chen, C. & Liu, Y. (eds.). Springer, p. 185-201 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13041 LNCS).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    26 Downloads (Pure)
  • An efficient flow-based botnet detection using supervised machine learning

    Stevanovic, M. & Pedersen, J. M., 2014, Computing, Networking and Communications (ICNC), 2014 International Conference on. IEEE Press, p. 797-801 5 p. (International Conference on Computing, Networking and Communications).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    93 Citations (Scopus)
    1 Downloads (Pure)
  • An Evaluation Framework for Large-Scale Network Structures

    Pedersen, J. M., Knudsen, T. P. & Madsen, O. B., 2004, Proceedings of the 4th Annual Conference on Information, Technology and Telecommunications IT&T, Limerick, Ireland, October 20-21 2004. p. 191-199

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearch

  • A Novel Model for Security Evaluation for Compliance

    Hald, S. L., Pedersen, J. M., Prasad, N. R. & Prasad, R., 5 Jul 2011, Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). IEEE, 4 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records

    Andersen, M. F., Pedersen, J. M., Böck, L. & Vasilomanolakis, E., 10 Feb 2022, 2021 IEEE Conference on Communications and Network Security, CNS 2021. IEEE, p. 164-172 9 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    223 Downloads (Pure)
  • An updated taxonomy for characterizing hackers according to their threat properties

    Hald, S. L. & Pedersen, J. M., 2012, Advanced Communication Technology (ICACT), 2012 14th International Conference on. IEEE Press, p. 81 - 86 6 p. (Proceeding & Journal of the International Conference on Advanced Communication Technology).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    24 Citations (Scopus)
  • A qualitative mapping of Darkweb marketplaces

    Georgoulias, D., Pedersen, J. M., Falch, M. & Vasilomanolakis, E., 2021, Proceedings of the 2021 APWG Symposium on Electronic Crime Research, eCrime 2021. IEEE, (APWG Symposium on Electronic Crime Research (eCrime)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    12 Citations (Scopus)
  • A Simple, Efficient Routing Scheme for N2R Network Structures

    Pedersen, J. M., Riaz, M. T. & Madsen, O. B., 2005, Proceedings of IT&T Annual Conference 2005. p. 69-80 12 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • Assessing Measurements of QoS for global Cloud Computing Services

    Pedersen, J. M., Riaz, M. T., Júnior, J. C., Dubalski, B., Ledzinski, D. & Patel, A., 2011, 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing. IEEE Computer Society Press, p. 682-689 8 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    15 Citations (Scopus)
  • Assessing usefulness of blacklists without the ground truth

    Kidmose, E., Gausel, K., Brandbyge, S. & Pedersen, J. M., 2018, Image Processing and Communications Challenges 10. Springer, p. 216-223 8 p. (Advances in Intelligent Systems and Computing, Vol. 892).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention

    Andersen, M. F., Vasilomanolakis, E. & Pedersen, J. M., 2022, ICT Systems Security and Privacy Protection: 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings. Meng, W., Fischer-Hübner, S. & Jensen, C. D. (eds.). Springer, p. 109-125 17 p. (I F I P Advances in Information and Communication Technology).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    2 Citations (Scopus)
    191 Downloads (Pure)
  • A Survey On Environmental Backbone Design and Implementation

    Gutierrez Lopez, J. M., Riaz, M. T., Pedersen, J. M. & Madsen, O. B., 2009, Proceedings of ISABEL 2009: 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies. IEEE, p. 1-5

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    3 Citations (Scopus)
  • A Systematic, Automated Network Planning Method: A Case Study

    Holm, J. Å. & Pedersen, J. M., 2006, Proceedings of Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing. CSNDSP, School of CEIS, Northumbria University, p. 427-430 4 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • A Test-Bed for Topological ROuting in 4-regular Grid Structures

    Riaz, M. T., Pedersen, J. M., Gutierrez Lopez, J. M., Nielsen, R. H. & Madsen, O. B., 2008, 10th International Conference on Advanced Communication Technology, 2008. ICACT 2008. IEEE, p. 550-554 4 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    1 Citation (Scopus)
  • Attack and Defend: Combining Game-Based Learning with Virtual Cyber Labs

    Mahmoud, R-V., Kidmose, E., Broholm, R., Pilawka, O. P., Dominika Illés, D., Magnussen, R. & Pedersen, J. M., 2020, Proceedings of the 14th European Conference on Games Based Learning. Fotaris, P. (ed.). Academic Conferences and Publishing International, p. 364-371 8 p. (Proceedings of the European Conference on Games-based Learning, Vol. 2020September).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    3 Citations (Scopus)
    219 Downloads (Pure)
  • Bandwidth Analysis of Smart Meter Network Infrastructure

    Balachandran, K., Olsen, R. L. & Pedersen, J. M., 16 Feb 2014, Advanced Communication Technology (ICACT). IEEE Press, p. 928-933 (Proceeding & Journal of the International Conference on Advanced Communication Technology).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    17 Citations (Scopus)
  • Blended Learning and Problem Based Learning in a multinational and multidisciplinary setting

    Pedersen, J. M., Lazaro, J., Mank, L. & Eichhorn, V., 3 Jul 2017, 6th International Research Symposium on PBL: PBL, Social Progress and Sustainability. Guerra, A., Rodriguez, F. J., Kolmos, A. & Reyes, I. P. (eds.). Aalborg Universitetsforlag, p. 535-546 11 p. (International Research Symposium on PBL).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    971 Downloads (Pure)
  • Bridging the Gap: Adapting a Security Education Platform to a New Audience

    Mennecozzi, G. M., Hageman, K. D., Panum, T. K., Türkmen, A., Mahmoud, R-V. & Pedersen, J. M., 18 Jun 2021, 2021 IEEE Global Engineering Education Conference (EDUCON). Klinger, T., Kollmitzer, C. & Pester, A. (eds.). IEEE, p. 153-159 7 p. 9453985. (2020 IEEE Global Engineering Education Conference (EDUCON)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    5 Citations (Scopus)
  • Bringing fiber to the home to rural areas in Denmark

    Pedersen, J. M. & Riaz, M. T., 2009, Proceedings of ISABEL 2009: 2nd International Symposium on Applied Sciences in Biomedical and Communication. IEEE, 6 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    10 Citations (Scopus)
  • Bringing Open Data into Danish Schools and its Potential Impact on School Pupils

    Saddiqa, M., Rasmussen, L. L. L. M. M., Magnussen, R., Larsen, B. & Pedersen, J. M., 20 Aug 2019, Proceedings of the 15th International Symposium on Open Collaboration (OpenSym '19). Association for Computing Machinery, 10 p. 9

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    15 Citations (Scopus)
    215 Downloads (Pure)
  • Can a TLS certificate be phishy?

    Hageman, K., Kidmose, E., Hansen, R. R. & Pedersen, J. M., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SCITEPRESS Digital Library, p. 38-49 12 p. (International Conference on Security and Cryptography - SECRYPT - Proceedings).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    4 Citations (Scopus)
    177 Downloads (Pure)
  • Certificate-Based Authentication Using Hardware Cryptographic Devices

    Dolezel, R. & Pedersen, J. M., 2011, Image Processing and Communications Challenges 3. Springer, p. 519-531 13 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • Characterization and Modeling of Network Traffic

    Shawky, A., Bergheim, H., Ragnarsson, O., Wranty, A. & Pedersen, J. M., 27 Apr 2011, Proceedings of 6th International Computer Engineering Conference (ICENCO). IEEE Press, 4 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    2 Citations (Scopus)
    1763 Downloads (Pure)
  • Characterization of Static/Dynamic Topological Routing For Grid Networks

    Gutierrez Lopez, J. M., Cuevas, R., Riaz, M. T., Pedersen, J. M. & Madsen, O. B., 2009, The Eighth International Conference on Networks (ICN 2009). IEEE Computer Society Press

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    File
    692 Downloads (Pure)
  • CincoCrypto - A Cryptocurrency Price Forecasting Tool for Everyone

    de Leyva, G. L., Dwivedi, A. D. & Pedersen, J. M., 2024, Recent Trends in Image Processing and Pattern Recognition - 6th International Conference, RTIP2R 2023, Revised Selected Papers. Santosh, KC., Makkar, A., Conway, M., Singh, A. K., Vacavant, A., Abou el Kalam, A., Bouguelia, M-R. & Hegadi, R. (eds.). Springer Science+Business Media, p. 250-264 15 p. (Communications in Computer and Information Science, Vol. 2027 CCIS).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

  • Class-Based Context Quality Optimization For Context Management Frameworks

    Shawky, A., Olsen, R. L., Pedersen, J. M. & Schwefel, H-P., 2012, Computer Communications and Networks (ICCCN), 2012 21st International Conference on. IEEE Press, p. 1-5 5 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    File
    3 Citations (Scopus)
    778 Downloads (Pure)
  • Classification of HTTP traffic based on C5.0 Machine Learning Algorithm

    Bujlow, T., Riaz, T. & Pedersen, J. M., 1 Jul 2012, IEEE Symposium on Computers and Communications (ISCC), 2012 . Cappadocia: IEEE, p. 000882 - 000887 6 p. (I E E E International Symposium on Computers and Communications).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    14 Citations (Scopus)
    1032 Downloads (Pure)
  • Clustering analysis of malware behavior using Self Organizing Map

    Pirscoveanu, R-S., Stevanovic, M. & Pedersen, J. M., Jul 2016, 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). IEEE, 6 p. (International Conference on Cyber Situational Awareness, Data Analytics and Assessment Proceedings. (cyberSA)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    11 Citations (Scopus)
  • Colibri: An International Blended Learning Experience based on Real-World Problems

    Pedersen, J. M., Kuran, S., Frick, J. & Mank, L., 2016, Proceedings of the PAEE/ALE’2016, 8th International Symposium on Project Approaches in Engineering. Lima, R. M., Graaff, E. D., Alves, A., Menezes, A., Mesquita, D., Dinis-Carvalho, J., Bettaieb, L., van Hattum-Janssen, N., Costa, N., M. Sousa, R., Fernandes, S. & Villas-Boas, V. (eds.). University of Minho, p. 259-268 (International Symposium on Project Approaches in Engineering Education (PAEE)).

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

    Open Access
    File
    139 Downloads (Pure)
  • Combining Wired and Wireless Networks for a QoS-Aware Broadband Infrastructure

    Pedersen, J. M., Riaz, M. T., Knudsen, T. P. & Madsen, O. B., 2004, Proceedings of the First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks. p. 296-299

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearch

    7 Citations (Scopus)
  • Comparing and Selecting Generalized Double Ring Network Structures

    Pedersen, J. M., Knudsen, T. P. & Madsen, O. B., 2004, Proceedings of the 2nd IASTED International Conference on Communication Computer Networks. p. 375-380 6 p.

    Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearch