default search action
Jan van den Berg
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Lázaro Bustio-Martínez, Vitali Herrera-Semenets, Juan-Luis García-Mendoza, Miguel Ángel Álvarez-Carmona, Jorge Ángel González Ordiano, Luis N. Zúñiga-Morales, José Emilio Quíroz-Ibarra, Pedro Antonio Santander-Molina, Jan van den Berg:
Uncovering phishing attacks using principles of persuasion analysis. J. Netw. Comput. Appl. 230: 103964 (2024) - [c40]Vitali Herrera-Semenets, Lázaro Bustio-Martínez, Jorge Ángel González Ordiano, Jan van den Berg:
Tax Underreporting Detection Using an Unsupervised Learning Approach. MICAI (2) 2024: 16-28 - 2023
- [c39]Lázaro Bustio-Martínez, Vitali Herrera-Semenets, Juan-Luis García-Mendoza, Jorge Ángel González Ordiano, Luis N. Zúñiga-Morales, Rubén Sánchez-Rivero, José Emilio Quíroz-Ibarra, Pedro Antonio Santander-Molina, Jan van den Berg, Davide Buscaldi:
Towards Automatic Principles of Persuasion Detection Using Machine Learning Approach. IWAIPR 2023: 155-166 - [c38]Vitali Herrera-Semenets, Lázaro Bustio-Martínez, Raudel Hernández-León, Jan van den Berg:
A Decision Tree Induction Algorithm for Efficient Rule Evaluation Using Shannon's Expansion. MICAI (1) 2023: 241-252 - 2022
- [j21]Vitali Herrera-Semenets, Raudel Hernández-León, Jan van den Berg:
A fast instance reduction algorithm for intrusion detection scenarios. Comput. Electr. Eng. 101: 107963 (2022) - [c37]Vitali Herrera-Semenets, Raudel Hernández-León, Lázaro Bustio-Martínez, Jan van den Berg:
Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection. MICAI (2) 2022: 316-327 - 2021
- [j20]Vitali Herrera-Semenets, Lázaro Bustio-Martínez, Raudel Hernández-León, Jan van den Berg:
A multi-measure feature selection algorithm for efficacious intrusion detection. Knowl. Based Syst. 227: 107264 (2021)
2010 – 2019
- 2018
- [j19]Vitali Herrera-Semenets, Osvaldo Andrés Pérez-García, Raudel Hernández-León, Jan van den Berg, Christian Doerr:
A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers. Expert Syst. Appl. 95: 272-279 (2018) - [c36]Clara Maathuis, Wolter Pieters, Jan van den Berg:
Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations. MILCOM 2018: 1-6 - 2017
- [c35]Maarten Aertsen, Maciej Korczynski, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Jan van den Berg:
No domain left behind: is Let's Encrypt democratizing encryption? ANRW 2017: 48-54 - [c34]Raymond Bierens, Bram Klievink, Jan van den Berg:
A Social Cyber Contract Theory Model for Understanding National Cyber Strategies. EGOV 2017: 166-176 - 2016
- [j18]Amr Ali Eldin, Jan van den Berg, Hesham Arafat Ali:
A risk evaluation approach for authorization decisions in social pervasive applications. Comput. Electr. Eng. 55: 59-72 (2016) - [c33]Clara Maathuis, Wolter Pieters, Jan van den Berg:
Cyber weapons: a profiling framework. CyCon U.S. 2016: 94-101 - [i2]Maarten Aertsen, Maciej Korczynski, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Jan van den Berg:
No domain left behind: is Let's Encrypt democratizing encryption? CoRR abs/1612.03005 (2016) - 2015
- [j17]Ebrahim Rahimi, Jan van den Berg, Wim Veen:
A learning model for enhancing the student's control in educational process using Web 2.0 personal learning environments. Br. J. Educ. Technol. 46(4): 780-792 (2015) - [j16]Ebrahim Rahimi, Jan van den Berg, Wim Veen:
Facilitating student-driven constructing of learning environments using Web 2.0 personal learning environments. Comput. Educ. 81: 235-246 (2015) - 2014
- [j15]Amr Ali Eldin, Jan van den Berg, Semir Daskapan:
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems. Int. J. Inf. Secur. Priv. 8(4): 44-61 (2014) - [j14]Mohsen Davarynejad, Jan van den Berg, Jafar Rezaei:
Evaluating center-seeking and initialization bias: The case of particle swarm and gravitational search algorithms. Inf. Sci. 278: 802-821 (2014) - [j13]Wolter Pieters, Zofia Lukszo, Dina Hadziosmanovic, Jan van den Berg:
Reconciling Malicious and Accidental Risk in Cyber Security. J. Internet Serv. Inf. Secur. 4(2): 4-26 (2014) - [c32]Potchara Pruksasri, Jan van den Berg, Wout Hofman, Yao-Hua Tan:
Data concealing of supply chain transactions using the Distributed Trust Backbone. ICITST 2014: 151-156 - [c31]Amr Ali Eldin, Jan van den Berg:
A Self-disclosure Framework for Social Mobile Applications. NTMS 2014: 1-5 - 2013
- [j12]Jan van den Berg, Uzay Kaymak, Rui Jorge Almeida:
Conditional Density Estimation Using Probabilistic Fuzzy Systems. IEEE Trans. Fuzzy Syst. 21(5): 869-882 (2013) - 2012
- [j11]Roel Bosma, Jan van den Berg, Uzay Kaymak, Henk Udo, Johan Verreth:
A generic methodology for developing fuzzy decision models. Expert Syst. Appl. 39(1): 1200-1210 (2012) - [j10]AliReza Soroush, Ardeshir Bahreininejad, Jan van den Berg:
A hybrid customer prediction system based on multiple forward stepwise logistic regression mode. Intell. Data Anal. 16(2): 265-278 (2012) - [c30]Johannes de Vries, Hans Hoogstraaten, Jan van den Berg, Semir Daskapan:
Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis. CyberSecurity 2012: 54-61 - [c29]Olga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters:
Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information. CyberSecurity 2012: 103-112 - [c28]Mohsen Davarynejad, Zary Forghany, Jan van den Berg:
Mass-Dispersed Gravitational Search Algorithm for Gene Regulatory Network Model Parameter Identification. SEAL 2012: 62-72 - [p2]Mohsen Davarynejad, Jos L. M. Vrancken, Jan van den Berg, Carlos A. Coello Coello:
A Fitness Granulation Approach for Large-Scale Structural Design Optimization. Variants of Evolutionary Algorithms for Real-World Applications 2012: 245-280 - 2011
- [j9]Roel Bosma, Uzay Kaymak, Jan van den Berg, Henk Udo, Johan Verreth:
Using fuzzy logic modelling to simulate farmers' decision-making on diversification and integration in the Mekong Delta, Vietnam. Soft Comput. 15(2): 295-310 (2011) - [c27]Mohsen Davarynejad, Jelmer van Ast, Jos L. M. Vrancken, Jan van den Berg:
Evolutionary value function approximation. ADPRL 2011: 151-155 - [c26]Mohsen Davarynejad, Jafar Rezaei, Jos L. M. Vrancken, Jan van den Berg, Carlos A. Coello Coello:
Accelerating convergence towards the optimal pareto front. IEEE Congress on Evolutionary Computation 2011: 2107-2114 - [c25]Maarten Janssen, Jan van den Berg, Mohsen Davarynejad, Vincent Marchau:
Towards an Enterprise Information Subsystem for Measuring (Perceived) Landside Accessibility of Airports. CENTERIS (2) 2011: 72-81 - [c24]Mohsen Davarynejad, Andreas Hegyi, Jos L. M. Vrancken, Jan van den Berg:
Motorway ramp-metering control with queuing consideration using Q-learning. ITSC 2011: 1652-1658 - [c23]Mohsen Davarynejad, Yubin Wang, Jos L. M. Vrancken, Jan van den Berg:
Multi-phase time series models for motorway flow forecasting. ITSC 2011: 2033-2038 - 2010
- [j8]Mohsen Davarynejad, Chang Wook Ahn, Jos L. M. Vrancken, Jan van den Berg, Carlos A. Coello Coello:
Evolutionary hidden information detection by granulation-based fitness approximation. Appl. Soft Comput. 10(3): 719-729 (2010) - [j7]Semir Daskapan, Jan van den Berg, Amr Ali Eldin:
Towards a trustworthy short-range mobile payment system. Int. J. Inf. Technol. Manag. 9(3): 317-336 (2010) - [j6]Nees Jan van Eck, Ludo Waltman, Rommert Dekker, Jan van den Berg:
A comparison of two techniques for bibliometric mapping: Multidimensional scaling and VOS. J. Assoc. Inf. Sci. Technol. 61(12): 2405-2416 (2010) - [c22]Guido van Heck, Jan van den Berg, Mohsen Davarynejad, J. H. Ron van Duin, Björn Roskott:
Improving Inventory Management Performance Using a Process-Oriented Measurement Framework. CENTERIS (1) 2010: 279-288 - [c21]Itamar Sharon, Michel dos Santos Soares, Joseph Barjis, Jan van den Berg, Jos L. M. Vrancken:
A Decision Framework for Selecting a Suitable Software Development Process. ICEIS (3) 2010: 34-43 - [c20]Mohsen Davarynejad, Sobhan Davarynejad, Jos L. M. Vrancken, Jan van den Berg:
Granular value-function approximation for road network traffic control. ICNSC 2010: 14-19 - [i1]Nees Jan van Eck, Ludo Waltman, Rommert Dekker, Jan van den Berg:
A comparison of two techniques for bibliometric mapping: Multidimensional scaling and VOS. CoRR abs/1003.2551 (2010)
2000 – 2009
- 2009
- [j5]Vincent Wiegel, Jan van den Berg:
Combining Moral Theory, Modal Logic and Mas to Create Well-Behaving Artificial Agents. Int. J. Soc. Robotics 1(3): 233-242 (2009) - [c19]Guido van Heck, Itamar Sharon, Paulus Kampert, Jan van den Berg:
Introducing Electronic Child Records: Balancing Personal Interests, System Perfomance, and Social Values. CSE (4) 2009: 568-575 - [p1]Amr Ali Eldin, Semir Daskapan, Jan van den Berg:
Privacy Automation in Context-Aware Services. Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability 2009: 295-309 - 2008
- [j4]Jos L. M. Vrancken, Jan van den Berg, Michel dos Santos Soares:
Human factors in system reliability: lessons learnt from the Maeslant storm surge barrier in The Netherlands. Int. J. Crit. Infrastructures 4(4): 418-429 (2008) - [c18]Roland Jeurissen, Jan van den Berg:
Optimized index tracking using a hybrid genetic algorithm. IEEE Congress on Evolutionary Computation 2008: 2327-2334 - [c17]Peter den Brok, Ingrid Mulder, Jan van den Berg:
All the Way to Living Independently: Reflections on a Design Case. ICCHP 2008: 1001-1007 - [c16]Semir Daskapan, Indira Nurtanti, Jan van den Berg:
Improving trust valuation for file sharing in P2P networks. SMC 2008: 2063-2068 - 2006
- [j3]Nees Jan van Eck, Ludo Waltman, Jan van den Berg, Uzay Kaymak:
Visualizing the computational intelligence field [Application Notes]. IEEE Comput. Intell. Mag. 1(4): 6-10 (2006) - [c15]Nees Jan van Eck, Ludo Waltman, Jan van den Berg, Uzay Kaymak:
Visualizing the WCCI 2006 Knowledge Domain. FUZZ-IEEE 2006: 1671-1678 - [c14]Nees Jan van Eck, Flavius Frasincar, Jan van den Berg:
Visualizing Concept Associations Using Concept Density Maps. IV 2006: 270-275 - 2005
- [c13]Nees Jan van Eck, Ludo Waltman, Jan van den Berg:
A Novel Algorithm for Visualizing Concept Associations. BNAIC 2005: 397-398 - [c12]Nees Jan van Eck, Ludo Waltman, Jan van den Berg:
A Novel Algorithm for Visualizing Concept Associations. DEXA Workshops 2005: 405-409 - [c11]Ludo Waltman, Uzay Kaymak, Jan van den Berg:
Fuzzy histograms: A Statistical Analysis. EUSFLAT Conf. 2005: 605-610 - [c10]Roel Bosma, Uzay Kaymak, Jan van den Berg, Henk M. J. Udo:
Fuzzy Modelling of Farmer Motivations for Integrated Farming in the Vietnamese Mekong Delta. FUZZ-IEEE 2005: 827-832 - [c9]Ludo Waltman, Uzay Kaymak, Jan van den Berg:
Maximum likelihood parameter estimation in probabilistic fuzzy classifiers. FUZZ-IEEE 2005: 1098-1103 - 2004
- [j2]Jan van den Berg, Uzay Kaymak, Willem-Max van den Bergh:
Financial markets analysis by using a probabilistic fuzzy modelling approach. Int. J. Approx. Reason. 35(3): 291-305 (2004) - [j1]C. Christiaan van der Eijk, Erik M. van Mulligen, Jan A. Kors, Barend Mons, Jan van den Berg:
Constructing an associative concept space for literature-based discovery. J. Assoc. Inf. Sci. Technol. 55(5): 436-444 (2004) - [c8]Amr Ali Eldin, Jan van den Berg, René W. Wagenaar:
A fuzzy reasoning scheme for context sharing decision making. ICEC 2004: 371-375 - [c7]Uzay Kaymak, Jan van den Berg:
On constructing probabilistic fuzzy classifiers from weighted fuzzy clustering. FUZZ-IEEE 2004: 395-400 - 2003
- [c6]Uzay Kaymak, Willem-Max van den Bergh, Jan van den Berg:
A fuzzy additive reasoning scheme for probabilistic Mamdani fuzzy systems. FUZZ-IEEE 2003: 331-336 - [c5]A. M. G. Cornelissen, Uzay Kaymak, Jan van den Berg, W. J. Koops:
Transition interval estimation to elicit membership functions in fuzzy evaluation models of animal production systems. FUZZ-IEEE 2003: 1200-1205 - 2002
- [c4]Jan van den Berg, Uzay Kaymak, Willem-Max van den Bergh:
Fuzzy classification using probability-based rule weighting. FUZZ-IEEE 2002: 991-996 - 2001
- [c3]Jan van den Berg, Willem-Max van den Bergh, Uzay Kaymak:
Probabilistic and Statistical Fuzzy Set Foundations of Competitive Exception Learning. FUZZ-IEEE 2001: 1035-1038
1990 – 1999
- 1999
- [c2]Jan van den Berg, Martijn J. Schuemie:
Information retrieval systems using an associative conceptual space. ESANN 1999: 351-356 - 1995
- [c1]Jan van den Berg, Jan C. Bioch:
Some theorems concerning the free energy of (un)constrained stochastic hopfield neural networks. EuroCOLT 1995: 298-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint