


default search action
Luuk Hendriks
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c13]Paola Grosso, Cristian Hesselman, Luuk Hendriks, Joseph Hill, Stavros Konstantaras, Ronald van der Pol, Victor Reijs, Joeri de Ruiter, Caspar Schutijser:
A National Programmable Infrastructure to Experiment with Next-Generation Networks. IM 2021: 778-782 - 2020
- [c12]Nils Rodday, Ruben van Baaren, Luuk Hendriks, Roland van Rijswijk-Deij
, Aiko Pras, Gabi Dreo:
Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies. CoNEXT 2020: 530-531 - [c11]Abraham Westerbaan, Luuk Hendriks:
Polymorphic Encryption and Pseudonymisation of IP Network Flows. Networking 2020: 494-498
2010 – 2019
- 2019
- [i2]Abraham Westerbaan, Luuk Hendriks:
Polymorphic Encryption and Pseudonymisation of IP Network Flows. CoRR abs/1911.02674 (2019) - 2018
- [c10]Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle:
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. Internet Measurement Conference 2018: 364-378 - [i1]Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle:
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. CoRR abs/1806.01633 (2018) - 2017
- [c9]Luuk Hendriks, Petr Velan
, Ricardo de Oliveira Schmidt, Pieter-Tjerk de Boer, Aiko Pras:
Flow-Based Detection of IPv6-specific Network Layer Attacks. AIMS 2017: 137-142 - [c8]Luuk Hendriks, Pieter-Tjerk de Boer, Aiko Pras:
IPv6-specific misconfigurations in the DNS. CNSM 2017: 1-5 - [c7]Luuk Hendriks, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij
, Aiko Pras:
On the Potential of IPv6 Open Resolvers for DDoS Attacks. PAM 2017: 17-29 - [c6]Luuk Hendriks, Petr Velan
, Ricardo de Oliveira Schmidt, Pieter-Tjerk de Boer, Aiko Pras:
Threats and surprises behind IPv6 extension headers. TMA 2017: 1-9 - 2016
- [j2]Ricardo de Oliveira Schmidt, Ramin Sadre, Luuk Hendriks:
Flow-Based Network Management: A Report from the IRTF NMRG Workshop. J. Netw. Syst. Manag. 24(2): 746-753 (2016) - [c5]Luuk Hendriks, Ricardo de Oliveira Schmidt, Ramin Sadre, Jeronimo Bezerra, Aiko Pras:
Assessing the Quality of Flow Measurements from OpenFlow Devices. TMA 2016 - 2015
- [c4]Luuk Hendriks, Anna Sperotto
, Aiko Pras:
Characterizing the IPv6 Security Landscape by Large-Scale Measurements. AIMS 2015: 145-149 - [c3]Morteza Karimzadeh, Zhongliang Zhao, Luuk Hendriks, Ricardo de Oliveira Schmidt, Sebastiaan la Fleur, Hans van den Berg, Aiko Pras, Torsten Braun
, Marius Iulian Corici
:
Mobility and bandwidth prediction as a service in virtualized LTE systems. CloudNet 2015: 132-138 - 2014
- [j1]Rick Hofstede, Luuk Hendriks, Anna Sperotto
, Aiko Pras:
SSH Compromise Detection using NetFlow/IPFIX. Comput. Commun. Rev. 44(5): 20-26 (2014) - 2012
- [c2]Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto
, Ramin Sadre, Aiko Pras:
SSHCure: A Flow-Based SSH Intrusion Detection System. AIMS 2012: 86-97 - 2011
- [c1]Martijn van Eenennaam, Luuk Hendriks, Georgios Karagiannis, Geert J. Heijenk
:
Oldest packet drop (OPD): A buffering mechanism for beaconing in IEEE 802.11p VANETs (poster). VNC 2011: 252-259
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint