


default search action
Rick Hofstede
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i1]Mario Golling, Robert Koch, Peter Hillmann
, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective Transformation and Simplification of YANG to UML. CoRR abs/2005.03292 (2020)
2010 – 2019
- 2018
- [j8]Rick Hofstede, Aiko Pras, Anna Sperotto, Gabi Dreo Rodosek:
Flow-Based Compromise Detection: Lessons Learned. IEEE Secur. Priv. 16(1): 82-89 (2018) - 2017
- [j7]Rick Hofstede, Mattijs Jonker, Anna Sperotto
, Aiko Pras
:
Flow-Based Web Application Brute-Force Attack and Compromise Detection. J. Netw. Syst. Manag. 25(4): 735-758 (2017) - [c16]Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386 - 2016
- [b1]Rick Hofstede:
Flow-based compromise detection. University of Twente, Enschede, Netherlands, 2016 - 2015
- [j6]Anna Sperotto
, Rick Hofstede, Alberto Dainotti
, Corinna Schmitt, Gabi Dreo Rodosek:
Special issue on measure, detect and mitigate-challenges and trends in network security. Int. J. Netw. Manag. 25(5): 261-262 (2015) - [j5]Idilio Drago
, Rick Hofstede, Ramin Sadre, Anna Sperotto
, Aiko Pras:
Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case. J. Netw. Syst. Manag. 23(1): 58-88 (2015) - [c15]José Jair Santanna, Roland van Rijswijk-Deij
, Rick Hofstede, Anna Sperotto
, Mark Wierbosch, Lisandro Zambenedetti Granville
, Aiko Pras:
Booters - An analysis of DDoS-as-a-service attacks. IM 2015: 243-251 - [c14]Mattijs Jonker, Rick Hofstede, Anna Sperotto
, Aiko Pras:
Unveiling flat traffic on the Internet: An SSH attack case study. IM 2015: 270-278 - [c13]Olivier van der Toorn, Rick Hofstede, Mattijs Jonker, Anna Sperotto
:
A first look at HTTP(S) intrusion detection using NetFlow/IPFIX. IM 2015: 862-865 - [c12]Daniel van der Steeg, Rick Hofstede, Anna Sperotto
, Aiko Pras:
Real-time DDoS attack detection for Cisco IOS using NetFlow. IM 2015: 972-977 - 2014
- [j4]Rick Hofstede, Luuk Hendriks, Anna Sperotto
, Aiko Pras:
SSH Compromise Detection using NetFlow/IPFIX. Comput. Commun. Rev. 44(5): 20-26 (2014) - [j3]Rick Hofstede, Pavel Celeda
, Brian Trammell, Idilio Drago
, Ramin Sadre, Anna Sperotto
, Aiko Pras:
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX. IEEE Commun. Surv. Tutorials 16(4): 2037-2064 (2014) - [j2]Ramin Sadre, Anna Sperotto
, Rick Hofstede, Nevil Brownlee
:
Flow-based Approaches in Network Management: Recent Advances and Future Trends. Int. J. Netw. Manag. 24(4): 219-220 (2014) - [c11]Mario Golling, Robert Koch, Peter Hillmann
, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective transformation and simplification of YANG to UML. CNSM 2014: 300-303 - [c10]Mario Golling, Rick Hofstede, Robert Koch:
Towards multi-layered intrusion detection in high-speed networks. CyCon 2014: 191-206 - 2013
- [j1]Idilio Drago
, Ricardo de Oliveira Schmidt, Rick Hofstede, Anna Sperotto, Morteza Karimzadeh, Boudewijn R. Haverkort
, Aiko Pras:
Networking for the Cloud: Challenges and Trends. Prax. Inf.verarb. Kommun. 36(4): 207-214 (2013) - [c9]Rick Hofstede, Václav Bartos
, Anna Sperotto
, Aiko Pras:
Towards real-time intrusion detection for NetFlow and IPFIX. CNSM 2013: 227-234 - [c8]Pavel Celeda, Petr Velan, Martin Rabek, Rick Hofstede, Aiko Pras:
Large-scale geolocation for NetFlow. IM 2013: 1015-1020 - [c7]Rick Hofstede, Idilio Drago
, Anna Sperotto, Ramin Sadre, Aiko Pras:
Measurement Artifacts in NetFlow Data. PAM 2013: 1-10 - 2012
- [c6]Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto
, Ramin Sadre, Aiko Pras:
SSHCure: A Flow-Based SSH Intrusion Detection System. AIMS 2012: 86-97 - [c5]Rick Hofstede, Aiko Pras:
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach. AIMS 2012: 109-112 - 2011
- [c4]Rick Hofstede, Idilio Drago
, Giovane Cesar Moreira Moura, Aiko Pras:
Carrier Ethernet OAM: An Overview and Comparison to IP OAM. AIMS 2011: 112-123 - [c3]Rick Hofstede, Idilio Drago
, Anna Sperotto
, Aiko Pras:
Flow Monitoring Experiences at the Ethernet-Layer. EUNICE 2011: 134-145 - 2010
- [c2]Rick Hofstede, Anna Sperotto
, Tiago Fioreze, Aiko Pras:
The Network Data Handling War: MySQL vs. NfDump. EUNICE 2010: 167-176
2000 – 2009
- 2009
- [c1]Rick Hofstede, Tiago Fioreze:
SURFmap: A network monitoring tool based on the Google Maps API. Integrated Network Management 2009: 676-690
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint