Jens Myrup Pedersen

Orcid: 0000-0002-1903-2921

According to our database1, Jens Myrup Pedersen authored at least 110 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset.
IEEE Access, 2024

2023
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey.
ACM Comput. Surv., November, 2023

An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

CincoCrypto - A Cryptocurrency Price Forecasting Tool for Everyone.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023

The Privacy Universe - a game-based learning platform for data protection, privacy and ethics.
Proceedings of the IEEE Global Engineering Education Conference, 2023

In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

Price Prediction of Digital Currencies using Machine Learning.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

2022
Detecting Cyber Attacks through Measurements: Learnings from a Cyber Range.
IEEE Instrum. Meas. Mag., 2022

A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Understanding the Challenges of Blocking Unnamed Network Traffic.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Detecting Ambiguous Phishing Certificates using Machine Learning.
Proceedings of the International Conference on Information Networking, 2022

Deceptive directories and "vulnerable" logs: a honeypot study of the LDAP and log4j attack landscape.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Detecting DNS hijacking by using NetFlow data.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Towards Using Sensors as Data Sources in Teaching: Requirements for School Curricula-Compatible Sensors.
Complex Syst. Informatics Model. Q., 2021

COVID-19 vaccination certificates in the Darkweb.
CoRR, 2021

Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting.
CoRR, 2021

Open Data Interface (ODI) for secondary school education.
Comput. Educ., 2021

Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists.
Proceedings of the Security and Privacy in Communication Networks, 2021

Can a TLS Certificate Be Phishy?
Proceedings of the 18th International Conference on Security and Cryptography, 2021

An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence.
Proceedings of the Network and System Security - 15th International Conference, 2021

Gollector: Measuring Domain Name Dark Matter from Different Vantage Points.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

Open for hire: attack trends and misconfiguration pitfalls of IoT devices.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Bridging the Gap: Adapting a Security Education Platform to a New Audience.
Proceedings of the IEEE Global Engineering Education Conference, 2021

A qualitative mapping of Darkweb marketplaces.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

DefAtt - Architecture of Virtual Cyber Labs for Research and Education.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Digital innovation in education: Perspectives, opportunities and challenges of educational open data and sensor data.
Proceedings of the Joint Proceedings of the BIR 2021 Workshops and Doctoral Consortium co-located with 20th International Conference on Perspectives in Business Informatics Research (BIR 2021), 2021

2020
Featureless Discovery of Correlated and False Intrusion Alerts.
IEEE Access, 2020

Towards Adversarial Phishing Detection.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Towards systematic honeytoken fingerprinting.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Enterprise Architecture Oriented Requirements Engineering for the Design of a School Friendly Open Data Web Interface.
Complex Syst. Informatics Model. Q., 2019

Bringing open data into danish schools and its potential impact on school pupils.
Proceedings of the 15th International Symposium on Open Collaboration, 2019

Kraaler: A User-Perspective Web Crawler.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

Haaukins: A Highly Accessible and Automated Virtualization Platform for Security Education.
Proceedings of the 19th IEEE International Conference on Advanced Learning Technologies, 2019

Enterprise Architecture Oriented Requirements Engineering for Open Data Usage in Schools.
Proceedings of the Perspectives in Business Informatics Research, 2019

Deploying a University Honeypot: A Case Study.
Proceedings of the Joint Proceedings of the BIR 2019 Workshops and Doctoral Consortium co-located with 18th International Conference on Perspectives in Business Informatics Research (BIR 2019), 2019

2018
Heuristic Methods for Efficient Identification of Abusive Domain Names.
Int. J. Cyber Situational Aware., 2018

Opportunities and Challenges in Designing a Blended International Student Project Activity: Experiences from the EPIC Project.
Proceedings of the 17th International Conference on Information Technology Based Higher Education and Training, 2018

Assessing Usefulness of Blacklists Without the Ground Truth.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Detection of Malicious and Abusive Domain Names.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

An Approach to Detect and Prevent Cybercrime in Large Complex Networks.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Detection of Malicious domains through lexical analysis.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Security in Internet of Things: Trends and Challenges.
Proceedings of the Joint Proceedings of the BIR 2018 Short Papers, 2018

2017
A method for identifying compromised clients based on DNS traffic analysis.
Int. J. Inf. Sec., 2017

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Comput. Secur., 2017

Moodle: Practical Advices for University Teachers.
Proceedings of the Image Processing and Communications Challenges 9, 2017

Learning Management Systems on Blended Learning Courses: An Experience-Based Observation.
Proceedings of the Image Processing and Communications Challenges 9, 2017

2016
Detecting bots using multi-level traffic analysis.
Int. J. Cyber Situational Aware., 2016

Variability Handling in Educational Context.
Proceedings of the Information Systems Development: Complexity in Information Systems Development, 2016

An approach for detection and family classification of malware based on behavioral analysis.
Proceedings of the 2016 International Conference on Computing, 2016

Correlating intrusion detection alerts on bot malware infections using neural network.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Clustering analysis of malware behavior using Self Organizing Map.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

2015
Telecommunication Networks.
Proceedings of the Intelligent Monitoring, 2015

On the use of machine learning for identifying botnet network traffic.
J. Cyber Secur. Mobil., 2015

On the ground truth problem of malicious DNS traffic analysis.
Comput. Secur., 2015

A novel methodology towards a trusted environment in mashup web applications.
Comput. Secur., 2015

AAU-Star and AAU Honeyjar: Malware Analysis Platforms Developed by Students.
Proceedings of the Image Processing and Communications Challenges 7, 2015

Vehicle data activity quantification using spatio-temporal GIS on modelling smart cities.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Optimizing the Loads of Multi-Player Online Game Servers Using Markov Chains.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Analysis of Malware behavior: Type classification using machine learning.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Network aware dynamic context subscription management.
Comput. Networks, 2014

Is European Broadband Ready for Smart Grid?
Proceedings of the Image Processing and Communications Challenges 6, 2014

An efficient flow-based botnet detection using supervised machine learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

QoE loss score value for service migration in context aware environment.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Location Intelligence Application in Digital Data Activity Dimensioning in Smart Cities.
Proceedings of the Complex Adaptive Systems 2014 Conference, 2014

2013
Using latency as a QoS indicator for global cloud computing services.
Concurr. Comput. Pract. Exp., 2013

Phase Planning for Overall Copper-Fiber Switch-over.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013

Design and analysis of a service migration framework.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Network Structures Constructed on Basis of Chordal Rings 4th Degree.
Proceedings of the Image Processing and Communications Challenges 5, 2013

The Threat of Digital Hacker Sabotage to Critical Infrastructures.
Proceedings of the Image Processing and Communications Challenges 5, 2013

Restorability on 3-connected WDM networks under single and dual physical link failures.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Analyzing Broadband Divide in the Farming Sector.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Converged Optical Network and Data Center Virtual Infrastructure Planning.
JOCN, 2012

Classification of HTTP traffic based on C5.0 Machine Learning Algorithm.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Obtaining Internet Flow Statistics by Volunteer-Based System.
Proceedings of the Image Processing and Communications Challenges 4, 2012

Obtaining application-based and content-based internet traffic statistics.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

Cost and availability analysis of 2- and 3-connected WDM networks physical interconnection.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

A method for classification of network traffic based on C5.0 Machine Learning Algorithm.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Class-Based Context Quality Optimization for Context Management Frameworks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Energy resource management in smart grid.
Proceedings of the Complexity in Engineering, 2012

Optimizing the quality of dynamic context subscriptions for scarce network resources.
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012

A Collaborative Approach to Botnet Protection.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A Methodology for Physical Interconnection Decisions of Next Generation Transport Networks.
J. Interconnect. Networks, 2011

Analytical model based on green criteria for optical backbone network interconnection.
Comput. Stand. Interfaces, 2011

Strategies on 3-connected graphs optimization search for future ICT infrastructure.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

A Hybrid Genetic and Simulated Annealing Algorithm for Chordal Ring Implementation in Large-Scale Networks.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Certificate-Based Authentication Using Hardware Cryptographic Devices.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Analysis of Degree 5 Chordal Rings for Network Topologies.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Service Degradation in Context Management Frameworks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Assessing Measurements of QoS for Global Cloud Computing Services.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
A Framework for Planning a Unified Wired and Wireless ICT Infrastructure.
Wirel. Pers. Commun., 2010

Using Google Earth for Visualization in FTTH Network Planning.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Comparison of Modified Degree 6 Chordal Rings.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Green Network Planning Model for Optical Backbones.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

On Planning of FTTH Access Networks with and without Redundancy.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

2009
Characterization of Static/Dynamic Topological Routing for Grid Networks.
Proceedings of the Eighth International Conference on Networks, 2009

2008
Multilevel network characterization using regular topologies.
Comput. Networks, 2008

Restoration Mechanism for the N2R Topological Routing Algorithm.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Improving Topological Routing in N2R Networks.
Proceedings of the Combinatorial and Algorithmic Aspects of Networking, 4th Workshop, 2007

2006
Applying 4-regular grid structures in large-scale access networks.
Comput. Commun., 2006

On embedding N2R structures in optical fibeR OMS-SP rings.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2006

A generalization of the generalized petersen graphs and N2R network structures.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2006

2005
Distances in Generalized Double Rings and Degree Three Chordal Rings.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Designing broadband access networks with triple redundancy.
Proceedings of the 5th International Workshop on Design of Reliable Communication Networks, 2005

2004
Combining Wired and Wireless Networks for a QoS-Aware Broadband Infrastructure.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Signal Propagation Delay as a Barrier to Control Applications in WAN.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004


  Loading...