Ralph Koning
TitleCited byYear
Detecting peer-to-peer botnets
R Schoof, R Koning
University of Amsterdam, 2007
612007
Linux containers networking: Performance and scalability of kernel modules
J Claassen, R Koning, P Grosso
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 713-717, 2016
272016
Using ontologies for resource description in the CineGrid Exchange
R Koning, P Grosso, C de Laat
Future Generation Computer Systems 27 (7), 960-965, 2011
242011
An agent based network resource planner for workflow applications
Z Zhao, P Grosso, J Van der Ham, R Koning, C De Laat
Multiagent and Grid Systems 7 (6), 187-202, 2011
202011
CoreFlow: Enriching Bro security events using network traffic monitoring data
R Koning, N Buraglio, C de Laat, P Grosso
Future Generation Computer Systems 79, 235-242, 2018
112018
Interactive analysis of sdn-driven defence against distributed denial of service attacks
R Koning, B de Graaff, C de Laat, R Meijer, P Grosso
2016 IEEE NetSoft Conference and Workshops (NetSoft), 483-488, 2016
82016
Detecting peer-to-peer botnets. University of Amsterdam
R Schoof, R Koning
Technical report, 2007
82007
Open Cloud eXchange (OCX): A Pivot for Intercloud Services Federation in Multi-provider Cloud Market Environment
Y Demchenko, C Dumitru, R Koning, C de Laat, T Matselyukh, S Filiposka, ...
72015
Planning data intensive workflows on inter-domain resources using the Network Service Interface (NSI)
Z Zhao, J van der Ham, A Taal, R Koning, C Dumitru, A Wibisono, ...
2012 SC Companion: High Performance Computing, Networking Storage and …, 2012
72012
An agent based planner for including network QoS in scientific workflows
Z Zhao, P Grosso, R Koning, J Van Der Ham, C De Laat
Proceedings of the International Multiconference on Computer Science and …, 2010
62010
Measuring the efficiency of sdn mitigations against attacks on computer infrastructures
R Koning, B de Graaff, G Polevoy, R Meijer, C de Laat, P Grosso
Future Generation Computer Systems 91, 144-156, 2019
52019
Enabling e-science applications with dynamic optical networks: Secure autonomous response networks
R Koning, A Deljoo, S Trajanovski, B De Graaff, P Grosso, L Gommans, ...
Optical Fiber Communication Conference, Tu3E. 1, 2017
52017
OIntEd: online ontology instance editor enabling a new approach to ontology development
A Wibisono, R Koning, P Grosso, A Belloum, M Bubak, C de Laat
Software: Practice and Experience 43 (11), 1319-1335, 2013
52013
Towards trustworthy information sharing by creating cyber security alliances
A Deljoo, T van Engers, R Koning, L Gommans, C de Laat
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
42018
40 Gigabit Ethernet: prototyping transparent end-to-end connectivity
C Dumitru, R Koning, C De Laat
The TERENA Networking Conference 2011 (TNC 2011), 2011
42011
Network resource selection for data transfer processes in scientific workflows
Z Zhao, P Grosso, R Koning, J van der Ham, C de Laat
The 5th Workshop on Workflows in Support of Large-Scale Science, 1-6, 2010
42010
Review en Herhaling BREIN steekproeven 7-9 april 2012
J Van der Ham, H Rood, C Dumitru, R Koning, N Sijm, C De Laat
AmsterdamSystem and Network Engineering, Universiteit van Amsterdam, 2012
32012
Measuring the effectiveness of SDN mitigations against cyber attacks
R Koning, B De Graaff, R Meijer, C De Laat, P Grosso
2017 IEEE Conference on Network Softwarization (NetSoft), 1-6, 2017
22017
Smart cyber infrastructure for big data processing
MX Makkes, R Cushing, AM Oprescu, R Koning, P Grosso, R Meijer, ...
OFC 2014, 1-3, 2014
22014
An architecture including network qos in scientific workflows
Z Zhao, P Grosso, R Koning, J Ham, C de Laat
2010 Ninth International Conference on Grid and Cloud Computing, 104-109, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20