J. van den Berg


Personal profile

Research profile

My LIST OF MY PUBLICATIONS (version April 11 2024) contains detailed information about nearly all my publications. My research output (including my most recent articles published) can also be inspected from this TUDelft website (only output resulting from my time at TUDelft) or from this scholar.google website (also includes research output produced at other institutes).

Below a description of my topics of research is provided, grouped in 4 clusters:

I. Development of Intelligent Data Analysis (IDA) methods for Improved Decision Making

  • Theories on the combination of Probability Theory and Statistics on Fuzzy Sets like probabilistic fuzzy entropy, statistical fuzzy histograms, statistical fuzzy decision trees, statistical fuzzy information sources and, more in general, probabilistic fuzzy systems; see, e.g., our 2012 IEEE Transactions on Fuzzy Systems publication. Most of this work was executed in close cooperation with Uzay Kaymak.
  • Visualizations of Concept Relations:  attempts to construct aggregated knowledge structures (like Associative Concept Maps) representing the essential knowledge as induced from a large corpus of (un)structured information sources. For details, see the work done by Nees Jan van Eck and Ludo Waltman at www.vosviewer.com
  • Simulated Big Bounce (for a nice simulation example see here!!): is a new metaheuristic proposed by former PhD student Mohsen Davarynejad for finding the gobal optimum of complex (high-dimensional) continuous functions by balancing exploration and exploitation.
  • More recently, I co-authored, often in close cooperation with Vitali Herrera-Semenets, various papers describing new types of Machine Learning algorithms for detecting cyberspace-fraude like intrusion attempts, social engineering attempts, and more. See my recent research output.

II. Theory and Applications of Complex Systems (with emergent properties based on self-organisation at the edge of order & chaos)

  • Concerns the theory especially pioneered at the famous Sante Fe Institute concerning the paradigm of looking bottom-up instead of top down: systems consisting of many interacting components (from atoms till human beings) may show complex emergent phenomena (from temperature and pressure in gases till dynamic markets and exciting paradigm shifting research outcomes in well-performaing research communities): see e.g. my publication "Inverse Infrastructures at the Edge of Order and Chaos, an Analytic Framework", chapter 2 of Tineke Egyedi and Donna Mahos (eds.) Inverse Infrastructures: Disrupting Networks from Below, Edward Elgar, 2010. 
  • When I started in this field, I looked at generalized (recurrent) neural networks from a mathematical-physical perspective: it resulted into my PhD work (original repaired version) on "Neural Relaxation Dynamics" (a topic related to Simulated Annealing) which focused on two types of neural networks:
  • Later on, this scope broadened towards applications with other complex systems' techniques in the field of Computational Intelligence like
    • Ants Algorithms for Bankruptcy Prediction and Bond Rating;
    • Particle Swarm Algorithms for Portfolio Optimization;
    • Genetic Algorithms for Index Tracking.

III. (Information Systems) Safety, Security, Risk and Related Topics

  • Developing a holistic, socio-technical view on Cyberspace and Cybersecurity;
  • (Quantitative) modeling of all kinds of risk;
  • Cyber Security solutions for IT-infrastructures, in domains like government, transport & logistics, finance, healthcare, energy supply;
  • Trust enhancing algorithms in mobile and P2P networks;
  • Resilience enhancement of Cyber Warfare Infrastructures;
  • Threat and fraud detection in Cyberspace (see also above under IDA methods).

IV. (Other) Applications in Finance, Sustainable Development, Philosophy, Healthcare (in many cases by using IDA tools):

News Driven Financial Time Series Analysis; Scaling Laws for Operational Risk Analysis; Visual Explorations in Finance with Self Organizing Maps, Google Maps, ...; Modeling Sustainable Development and Decision Making using Fuzzy Systems; Providing Intelligent Agents with Moral Reasoning Capabilities; Privacy Enhancing Technologies for Dynamic Informed Consent Decision Making;  ICT Tools for supporting Independent Living; Workflow Management and the Electronic Patient Record for realizing Client-Centered Healthcare; Improving Business Performance by KPI-based analysis of business processes performance; Data mining for Forensics and Intrusion Detection; Towards a production environment for (mobile) Apps in the Port of Rotterdam.


Research interests

They have already been described in the four categories I to IV above.

Academic background

Having finalized my secundary school in Dordrecht (Gemeentelijk Lyceum, gymnasium-) in 1970, I studied mathematics and physics at the TUDelft while being active in the national student movement. In 1977, I received the diplome of Mathematical Engineer.

From 1977-1989, I lectured courses in mathematics, physics and computer science on institutes of higher education in Breda and Eindhoven, and mathematics and physics at the secundary school of Nampula, Mozambique.

From 1989-2006, I worked at the Econometric Institute of Erasmus University Rotterdam. There, I lectured courses in computer science and economics, and did research in many fields, especially in computational intelligence, with applications in combinatorial optimization, finance, agriculture, philosophy, bibliometrics, among others. My PhD-thesis entitled "Neural Relaxation Dynamics" (original repaired version) was finalized in 1996.

From 2006 up till now, I worked at TUDelft again, mostly on topics related to (Big) Data Analytics and/or Cyber Security. On July 9 2013, I was appointed as Full Professor Cyber Security at this university both at the faculty of EEMCS and that of TPM. A video of my inaugural lecture entitled "Real Cyber Security: Virtually Impossible?" is available here. Another, somewhat more popular talk in Dutch about Cybersecurity, I provided in Diligentia for the "Koningklijke Maatschappij voor Natuurkunde", in The Hague, on 16-2-2014. It can be viewed here.

June 2015 I have been appointed as (currently emeritus) Full Professor Cyber Security at Leiden University as well, namely at the Faculty of Governance and Global Affairs

During my academic career, I supervised - next to providing lecturers in all kind of scientific fields - around 20 students when writing their BSc-theses, more than 190 students when composing their Msc-theses, and around 20 students with their PhD-theses.

Due to my age, I'm now working as an emeritus pensionado... ;-). So, I have got time, next to other activities like writing papers, supervising research, and piano playing, to prepare for and run additional marathons. See, for example, this Rotterdam marathon website under "Mannen", where my position (number 17) is mentioned under "Super Marathon Masters/Mannen" between the five "31 times" (male) finishers. This website will soon be updsated since April 14 2024, I ran my 32th Rotterdam marathon (next to 5 non-Rotterdam marathons, among which two times in New York).

Education/Academic qualification

Doctorate, Thesis title: "Neural Relaxation Dynamics", Erasmus Universiteit Rotterdam

Award Date: 21 Jun 1996

Master's degree, Thesis title: "Variational Principles and Finite Element Methods in the Mechanics of Materials", Mathematical Engineer, Delft University of Technology

Award Date: 30 Aug 1977

External positions

(Emeritus) Professor Cyber Security, Universiteit Leiden

Jun 2015 → …

Scientific Director, Cyber Security Academy The Hague

Mar 2013Nov 2018

Lector Human Centered ICT, Hogeschool Rotterdam Instituut voor Engineering en Applied Science

Mar 2006Aug 2007

Assistent/Associate Professor ICT, Erasmus Universiteit Rotterdam

Feb 1989Aug 2006

Lecturer Mathematics and Computer Science, Fontys Hogeschool Eindhoven

Aug 1983Jan 1989

Teacher of Mathematics and Physics, Escola Secundaria de Nampula, Mozambique

Mar 1981Jan 1983

Lecturer Mathematics and Physics, Dr. Strucken Instituut of Higher Education

Aug 1977Dec 1980


  • QA75 Electronic computers. Computer science
  • Computational Intelligence, Cyber Security, Risk Management
  • Applied Mathematics
  • QC Physics
  • Statistical Mechanics


Dive into the research topics where J. van den Berg is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Towards Automatic Principles of Persuasion Detection Using Machine Learning Approach

    Bustio-Martínez, L., Herrera-Semenets, V., García-Mendoza, J-L., González-Ordiano, J. Á., Zúñiga-Morales, L., Sánchez Rivero, R., Quiróz-Ibarra, J. E., Santander-Molina, P. A., van den Berg, J. & Buscaldi, D., 2024, Progress in Artificial Intelligence and Pattern Recognition - 8th International Congress on Artificial Intelligence and Pattern Recognition, IWAIPR 2023, Proceedings. Hernández Heredia, Y., Milián Núñez, V. & Ruiz Shulcloper, J. (eds.). Cham: Springer, p. 155-166 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14335 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A Decision Tree Induction Algorithm for Efficient Rule Evaluation Using Shannon’s Expansion

    Herrera-Semenets, V., Bustio-Martínez, L., Hernández-León, R. & van den Berg, J., 2023, Advances in Computational Intelligence - 22nd Mexican International Conference on Artificial Intelligence, MICAI 2023, Proceedings: 22nd Mexican International Conference on Artificial Intelligence, MICAI 2023. Calvo, H., Martínez-Villaseñor, L. & Ponce, H. (eds.). Part I ed. Cham: Springer, p. 241-252 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14391 LNAI).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    2 Downloads (Pure)
  • A fast instance reduction algorithm for intrusion detection scenarios

    Herrera-Semenets, V., Hernández-León, R. & van den Berg, J., 2022, In: Computers and Electrical Engineering. 101, 107963.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    2 Citations (Scopus)
    555 Downloads (Pure)
  • Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection

    Herrera Semenets, V., Hernández-León, R., Bustio-Martínez, L. & van den Berg, J., 2022, Advances in Computational Intelligence 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24–29, 2022, Proceedings, Part II. Pichardo Laguna, O., Martínez-Miranda, J. & Martínez Seis, B. (eds.). Springer, p. 316-327 12 p. (Lecture Notes in Computer Science; no. 13613).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    19 Downloads (Pure)
  • A multi-measure feature selection algorithm for efficacious intrusion detection

    Herrera-Semenets, V., Bustio-Martínez, L., Hernández-León, R. & van den Berg, J., 2021, In: Knowledge-Based Systems. 227, 11 p., 107264.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    20 Citations (Scopus)
    38 Downloads (Pure)