
Jan van den BergDelft University of Technology | TU · Department of Infrastructure Systems & Services
Jan van den Berg
Prof.dr.ir.
About
135
Publications
40,475
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,785
Citations
Citations since 2017
Publications
Publications (135)
Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling the...
We live in a world that is being driven by data. This leads to challenges of extracting and analyzing knowledge from large volumes of data. An example of such a challenge is intrusion detection. Intrusion detection data sets are characterized by huge volumes, which affects the learning of the classifier. So there is a need to reduce the size of the...
Every day the number of devices interacting through telecommunications networks grows resulting into an increase in the volume of data and information generated. At the same time, a growing number of information security incidents is being observed including the occurrence of unauthorized accesses, also named intrusions. As a consequence of these t...
Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and practitioner...
The rapid development of cyberspace in the recent two decades has introduced the new term cybersecurity as a follow-up of information security or IT security. Despite the rapid adoption of this new term, there exists a lot of confusion about its precise meaning, while – due the societal importance of it – there is a high need for a common understan...
In the last few years, the telecommunications scenario has experienced an increase in the volume of information generated, as well as in the execution of malicious activities. In order to complement Intrusion Detection Systems (IDSs), data mining techniques have begun to play a fundamental role in data analysis. On the other hand, the presence of u...
Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the na...
The 2013 National Security Agency revelations of pervasive monitoring have led to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users' privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications. As a co...
Low-voltage distribution grids experience a rising penetration of inverter-based, distributed generation. In order to not only contribute to but also solve voltage problems, these inverters are increasingly asked to participate in intelligent grid controls. Communicating inverters implement distributed voltage droop controls. The impact of cyber-at...
India has had reserved caste and tribe system which was implemented after independence to reduce
inequality. However, as the social and economic conditions of people from these scheduled castes have
been getting better, debates arose around the existence of the reservation system. This paper aims to check
the efficiency of the reservation system, i...
Bayesian game theory is an interesting field within cyber security. Applying it to bank transfer systems can be very useful in finding risks in time and to dynamically adapt to them. It can not only provide insight about the best threat control methods, but also gives insights in how confidential certain core information and actions within the syst...
The 2013 National Security Agency revelations of pervasive monitoring have lead to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications. As a co...
Cybercrimes today are focused over returns, especially in the form of monetary returns. In this paper - through a literature study and conducting interviews for the people victimized by ransomware and a survey with random set of victimized and non-victimized by ransomware - conclusions about the dependence of ransomware on demographics like age and...
In the last decades we witnessed the creation of a virtual world: cyberspace, which offers plenty of opportunities and challenges. Meanwhile, we are confronted with many conflict situations between different groups of people or countries. In the last years, several events have been described in terms of cyber warfare or the use of cyber weapons, le...
Most research in social networks has focused on the assumption that unknown entities are malicious and thus the traditional approach was to detect them and deny their access to sensitive data. In this paper, we propose a new computational model that helps users predict security risks associated with their information sharing on social networks. The...
Secure and accurate transactions are vital to any large-scale business system in order to guarantee the reliability of the system to stakeholders in both the public and private sectors. In supply chain systems, however, a variety of information security shortcomings is currently occurring in several processes, for example, related to data confident...
Global information systems are becoming more complex and dynamic everyday: huge amounts of data and messages through those systems show dynamically changing traffic patterns. Because of this, diagnosing when sub-systems are not working properly is difficult. System failures or errors in information exchange protocols sometimes happen and interrupt...
Web 2.0 Personal Learning Environments (PLEs) are becoming a promising area of development in e-
Learning. While enhancing students' control over the entire learning process including constructing
learning environment appears to be an essential objective of introducing Web 2.0 PLEs to education,
there is little consensus on how to attain this objec...
With the growing interest in ubiquitous applications, attention should be given to privacy and trust issues. Since these environments are quite dynamic, and interactive where devices possess low computing resources, new trust models are required that suit this environment and help overcome its limitations. In this paper, the authors explore the pos...
While supporting regulatory learning processes in work environments is increasingly
becoming important, there is not a clear picture of the interaction between self- and co-regulatory
processes performed by learners in workplace e-learning systems. In this paper, by
following a design-based research methodology, we develop a theory-based framework...
While the concept of Web 2.0 based Personal Learning Environments (PLEs)
has generated significant interest in educational settings, there is little consensus
regarding what this concept means and how teachers and students can develop and
deploy Web 2.0 based PLEs to support their teaching and learning activities. In this
paper a conceptual framewo...
In recent educational literature, it has been observed that improving student’s control
has the potential of increasing his or her feeling of ownership, personal agency and
activeness as means to maximize his or her educational achievement. While the main
conceived goal for personal learning environments (PLEs) is to increase student’s control
by t...
With the growing interest in social media, attention should be given to privacy and trust issues. Social applications are usually proposed and developed without clear measures related to privacy and trust issues. In this paper, we propose a framework for data sharing in social mobile applications that helps users having dynamic control of their inf...
We consider conditional density approximation by fuzzy systems. Fuzzy systems are typically used to approximate deterministic functions in which the stochastic uncertainty is ignored. We propose probabilistic fuzzy systems (PFSs), in which the probabilistic nature of uncertainty is taken into account. These systems take also fuzzy uncertainty into...
Enterprise Resource Planning systems have been introduced to support the efficient and effective execution of business processes. In practice, this may not fully succeed. This also holds in particular for inventory management (IM), which forms a part of supply chain management. Within this research, by analyzing the IM business process theoreticall...
Implementing and utilizing personal learning environments (PLEs) in educational settings is a challenging and complex process that requires the intensive involvement of both teachers and students. There are several important issues that need to be considered in order to build PLEs and utilize them as effective learning tools in educational settings...
Developing and utilizing Web2.0-based Personal Learning Environments (PLEs) in educational settings is becoming a promising area of development in e-Learning. While the concept of student’s control appears to be an essential and defensible aim of PLEs, there is little consensus regarding what this concept means and how students can attain control o...
The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to be considered at design time of the new data pipeli...
Enterprise Resource Planning systems have been introduced to support the efficient and effective execution of business processes. In practice, this may not fully succeed. This also holds in particular for inventory management (IM), which forms a part of supply chain management. Within this research, by analyzing the IM business process theoreticall...
The interaction mechanisms at the molecular level that govern essential processes inside the cell are conventionally modeled by nonlinear dynamic systems of coupled differential equations. Our implementation adopts an S-system to capture the dynamics of the gene regulatory network (GRN) of interest. To identify a solution to inverse problem of GRN...
Cyber-attacks against companies and governments are increasing in complexity, persistence and numbers. Common intrusion detection methods lack the ability to detect such - what are commonly termed - advanced persistent threats. A new approach is needed that takes the stepwise characteristics of this type of threats into account and links analysis m...
It is widely recognized that approaching sustainability in rangeland management needs to take many criteria into consideration which unavoidably calls for the application of multi-criteria decision making approach. Bearing conflicting objectives in mind, which are mainly conservation and utilization, we have introduced fuzzy multi-objectives decisi...
Although current and upcoming web technologies offer all kinds of new opportunities to support student-centered learning, there does not exist yet a clear roadmap to integrate these technologies into teaching and learning processes. In this paper a model is introduced in order to develop Personal Learning Environements (PLEs) consisting of Web2.0 t...
This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides
a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics
in the field and to identify relations between information and communication technology concept...
An important paradigm in decision-making models is utility-maximization where most models do not include actors' motives. Fuzzy set theory on the other hand offers a method to simulate human decision-making. However, the literature describing expert-driven fuzzy logic models, rarely gives precise details on the methodology (to be) used. To fill the...
We consider function approximation by fuzzy systems. Fuzzy systems are typically used for approximating deterministic functions, in which the stochastic uncertainty is ignored. We propose probabilistic fuzzy systems in which the probabilistic nature of uncertainty is taken into account. Furthermore, these systems take also fuzzy uncertainty into ac...
The complexity of large-scale mechanical optimization problems is partially due to the presence of high-dimensional design variables, the na-ture of the design variables, and the high computational cost of the finite element simulations needed to evaluate the fitness of candidate solutions. Evolutionary algorithms are ruled by competitive games of...
In this study, a multi-phase time series prediction approaches is proposed for solving the motorway flow fore-casting problem. The schemes presented here is based on an extensive study of flow patterns that were collected from a densely used ring road of Amsterdam, The Netherlands. The new prediction approach proposed here is based on a multi-phase...
Evolutionary algorithms have been very popular optimization methods for a wide variety of applications. However, in spite of their advantages, their computational cost is still a prohibitive factor in certain real-world applications involving expensive (computationally speaking) fitness function evaluations. In this paper, we depart from the observ...
function approximation, helps in moving from a single isolated learning stage to cooperative exploration of the search space and accelerating learning speed. The performance of the proposed algorithm is compared with the standard SARSA algorithm and some of its properties are discussed. The experimental analysis confirms that the proposed approach...
To reveal farmers’ motives for on-farm diversification and integration of farming components in the Mekong Delta, Vietnam,
we developed a fuzzy logic model (FLM) using a 10-step approach. Farmers’ decision-making was mimicked in a three-layer hierarchical
architecture of fuzzy inference systems, using data of 72 farms. The model includes three vari...
Part of my PhD research is designing and deploying a learning
system in a secondary school in the Netherlands. They search
for a new approach to learning that can foster the 21
st
century
skills, stimulate self-directed learning, and help them achieve
their core values. We suggested a PLE-based model to help
them reach their learning goals. T...
Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity a...
A twofold generalization of the classical continuous Hopfield neural network for modelling constrained optimization problems is proposed. On the one hand, non-quadratic cost functions are admitted corresponding to non-linear output summation functions in the neurons. On the other hand it is shown under which conditions various (new) types of constr...
VOS is a new mapping technique that can serve as an alternative to the well-known technique of multidimensional scaling. We present an extensive comparison between the use of multidimensional scaling and the use of VOS for constructing bibliometric maps. In our theoretical analysis, we show the mathematical relation between the two techniques. In o...
Enterprise Resource Planning systems have been introduced to support the efficient and effective execution of business processes.
In practice, this may not fully succeed. This also holds for inventory management (IM), part of the sub-field within logistics
termed supply chain management. By analyzing the IM business process, eleven potential benefi...
The research discussed in this paper aims at developing fast stable learning agents for large-scale complex systems including network traffic signal control systems. The control system is based on reinforcement learning (RL), an important research area in distributed AI with a wide area of applications including real-time control. RL-based control...
In commercial clusters, like shopping malls, subways and university campuses, shops may act as service providers. Via proximity networks, they can provide services to users with short-range radio mobile devices, including financial services. Short-range mobile payment services represent therefore an alternative business opportunity for the financia...
With the growing interest in context-aware services, attention has been given to privacy and trust issues. Context-aware privacy architectures are usually proposed and developed without taking into account the trustworthiness of a service provider. Therefore, this chapter deals with two challenges in context-aware services. The first one is to impr...
For streamlining the activities of software development, a number of software development processes has been proposed in the past few decades. Despite the relative maturity in the field, large companies involved in developing software are still struggling with selecting suitable software processes. This article takes up the challenge of developing...
Since the late nineties of the previous century, many IT companies fell upon Business Intelligence (BI) and promised better bussiness decision making by means of intelligent data analysis. Ever since those days new BI tools have been developed, usually provided as a closed software solution. As a consequence, the details of the underlying technolog...
Many peer to peer (P2P) networks are used to share different types of files between users who are usually anonymous. To prevent the distribution of files that have been intentionally damaged, filled with false content or infected with malware, users need to be able to distinguish between trustworthy and malicious peers. One way to help a user in se...
This paper provides insight in how existing ICT for Development (ICT4D) paradigms are becoming less successful in meeting the ICT needs of disadvantaged communities. In addition it shows that the call for a new paradigm incorporating existing economic activities within these communities is surfacing. The main research question discusses what policy...
Witnessing a growing number of increasingly autonomous software agents we interact with or that operate on our behalf under circumstances that are not fully known in advance, we argue that there is a need to provide these agents with moral reasoning capabilities. Looking at the current literature on behaviour constraints and multi-agent (software)...
While there is no consensus on a definition, it is widely recognized that the concept of sustainability has economic, environmental and social dimensions. We used fuzzy logic as a well-suited tool to handle the vague, uncertain, and polymorphous concept of sustainability. For recognizing the major important indicators in defining sustainability in...
Improving quality of child healthcare, optimization of child development, anticipation of child neglect or abuse, and other social-values-based childcare activities usually motivate the adoption of electronic child records (ECRs). Having an ECR system in place, many stakeholders concerned with the welfare of children are supposed to use the persona...
Many peer-to-peer networks are used to share different types of files. These files could be damaged, contain false content or even include malware. To be able to choose the right peers, the requesting peer needs to assess the trustworthiness of the requested peer. Embedded trust algorithms enable the requesting peers to perform this assessment with...
The Maeslant storm surge barrier in the Netherlands is an interesting case in system reliability, first because of the great effort that has been put into making its operation reliable and into assessing its reliability, and second, because it has characteristics that make reliability assessment extremely hard. From its history a number of interest...
Assuming the market is efficient, an obvious portfolio management strategy is passive where the challenge is to track a certain benchmark like a stock index such that equal returns and risks are achieved. A tracking portfolio consists of a (usually small) weighted subset of stock funds. The weights are supposed to be positive here which means that...
Even when assistive technologies do support people with special needs and enabling them to retain an independent lifestyle,
unforeseen thresholds may pop up and hinder people to become fully independent. Aiming to contribute to best practices in
the field of independent living, a co-design case of support for a specific person with serious speech a...
Philosophy can benefit from experiments performed in a laboratory for philosophical experimentation (SophoLab). To illus- trate the power of Experimental Computational Philosophy, we set up and ran several experiments on a part of Harsanyi's theory on utili- tarianism. During decomposition and translation of this theory in the experimental setting...
Het Erasmus Medisch Centrum en de Hogeschool
Rotterdam zijn in 2005 een samenwerking begonnen
teneinde de ongeveer 95% onbenutte rekencapaciteit
van hun computers beschikbaar te maken voor onderzoek
en onderwijs. Deze samenwerking heeft geleid tot
het Erasmus Computing GRID (ECG), een virtuele
supercomputer met na voltooiing een rekencapaciteit
van...
While fuzzy specialists commonly use homogeneous experts' knowledge to construct fuzzy models, it is much more difficult to deal with knowledge elicited from a heterogeneous group of experts. This issue is exemplified in the area of sustainable rangeland management (SRM). One way to deal with the diversity of opinions is to develop a fuzzy system f...
Contrary to the global trend of specialization within agriculture, the rice-based Vietnamese production systems have diversified into integrated agriculture¿aquaculture systems. Economic liberalization in 1986 resulted in an explosive increase in rice production and a rapid diversification. This paper describes the history and dynamics of these sys...
In this paper, we visualize the structure and the evolution of the computational intelligence (CI) field. Based on our visualizations, we analyze the way in which the CI field is divided into several subfields. The visualizations provide insight into the characteristics of each subfield and into the relations between the subfields. By comparing two...
One of the major topics related to the modeling of operational risk is the non-availability of a sufficient amount of data within financial institutions. This paper describes a way to circumvent this problem by presenting a scaling mechanism that enables us to put data originating from several sources together in one modeling framework. Using both...
The concept mapping algorithm proposed in an earlier paper is one of the dimensionality reduction techniques that can be used for knowledge domain visualization. Using this algorithm to visualize large knowledge domains may not always provide a good overview of the domain due to visual cluttering of concepts. In this paper, we propose to apply kern...
In this paper, a knowledge domain visualization approach is applied to the computational intelligence held. A so-called concept map based on the abstracts of the papers presented at the WCCI 2006 is constructed and analyzed. The concept map provides an overview of the computational intelligence field by visualizing the associations between the fiel...