Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tim Vermeiren is active.

Publication


Featured researches published by Tim Vermeiren.


workshop on information security applications | 2004

Improving the performance of signature-based network intrusion detection sensors by multi-threading

Bart Haagdorens; Tim Vermeiren; Marnix Goossens

Signature-based Network Intrusion Detection System (NIDS) sensors match network packets against a pre-configured set of intrusion signatures. Current implementations of NIDS sensors employ only a single thread of execution and as a consequence benefit very little from multi-processor hardware platforms. A multi-threaded sensor would allow more efficient and scalable exploitation of these multi-processor machines. We present in detail a number of novel designs for a multi-threaded NIDS sensor and provide performance evaluation figures for a number of multi-threaded implementations of the popular open-source Snort system.


global communications conference | 2004

Introducing security services in DSL access and edge networks

Tim Vermeiren; Eric Frans Elisa Borghs; Michiel Pelt; Sorin Miclea; Bart Haagdorens

Current DSL access and edge networks are typically deployed to offer best-effort high speed Internet access to small office and home environments. Future DSL access and edge networks will offer an evolution to higher bandwidth in the last mile. They will also be used by telecom operators to increase their average revenue per user by offering new services (such as security services) to the end users. In the brand range of advanced security services, we selected a service mix formed by a firewall and a network intrusion detection system for a feasibility study of their introduction in the future access and edge network. The study focuses on the relation between the complexity of the service and available computational technologies in the access and edge network. The evaluation results indicate that moderate complexity security services can be considered for integration. High complexity security services are unlikely to be deployed in the access and edge network.


Archive | 2005

Zapping agent with improved latency

Tim Vermeiren; Eric Frans Elisa Borghs; Sig Harold Badt


Archive | 2004

System comprising a terminal system, an access multiplexer and a network

François Fredricx; Tim Gyselings; Tim Vermeiren; Hans Maurice Felix Corneel Dequeker; Peter Vandaele; Paul Henri Marie Cautereels; Patrick Albert Paul Renaux; Lajos Kiss


Archive | 2003

Interpretation system for interpreting reflectometry information

Tim Vermeiren; Tom Bostoen; Leonard Pierre Van Biesen; Frank Louage; P. Boets


Archive | 2006

Access nodes for giving a client device access to an internet network

Paul Henri Marie Cautereels; Michael Andries Thomas Beck; Tim Vermeiren; Hans Maurice Felix Corneel Dequeker; Tim Gyselings


Archive | 2006

Network unit for exchanging a signal with priority, fragmentation and/or aggregation information

Tim Vermeiren; Eric Frans Elisa Borghs


Archive | 2005

Method for encoding a multimedia content

Tim Vermeiren; Eric Frans Elisa Borghs; Sig Harold Badt


Archive | 2005

Network unit for exchanging a signal

Tim Vermeiren; Eric Frans Elisa Borghs


Archive | 2004

Abknallendmittel mit verbesserter Latenz Abknallendmittel with improved latency

Tim Vermeiren; Eric Frans Elisa Borghs; Sig Harold Badt

Collaboration


Dive into the Tim Vermeiren's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge