1. 2019
  2. The Impact of User Location on Cookie Notices: (Inside and Outside of the European Union)

    Van Eijk, R., Asghari, H., Winter, P. & Narayanan, A., May 2019, IEEE Security & Privacy Workshop on Technology and Consumer Protection (ConPro '19). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. 2018
  4. Responsibility for Data Protection in a Networked World: On the Question of the Controller, ‘Effective and Complete Protection’ and Its Application to Data Access Rights in Europe

    Mahieu, R., Van Hoboken, J. & Asghari, H., Oct 2018, In : Social Science Research Network (online). 37 p.

    Research output: Contribution to journalArticleScientific

  5. Collectively exercising the right of access: individual effort, societal effect

    Asghari, H., Mahieu, R. & van Eeten, M., 13 Jul 2018, In : Internet Policy Review. 7, 3, 23 p.

    Research output: Contribution to journalArticleScientificpeer-review

  6. Time-use in Automated Vehicles and Daily Activity Schedules: A Focus Group Study

    Pudane, B., Rataj, M., Molin, E., Mouter, N., Asghari, H., van Cranenburgh, S. & Chorus, C., 2018, hEART 2018: 7th Symposium of the European Association for Research in Transportation, 5-7 September, Athens, Greece. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer

    Lone, Q., Luckie, M., Korczyński, M., Asghari, H., Javed, M. & Van Eeten, M., 2018, TMA 2018 - Proceedings of the 2nd Network Traffic Measurement and Analysis Conference. Casas, P. (ed.). Institute of Electrical and Electronics Engineers Inc., 8 p. 8506499

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  8. 2017
  9. The Right of Access as a Tool for Privacy Governance: Findings from Individual Requests & Proposal for a Crowd-sourced Dataset of Privacy Practices

    Asghari, H., Mahieu, R., Mittal, P. & Greenstadt, R., 18 Jul 2017, Proceedings of 17th Privacy Enhancing Technologies Symposium. p. 1-2

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications

    Bisogni, F., Asghari, H. & van Eeten, M., 27 Jun 2017, Proceedings of 16th Annual Workshop on the Economics of Information Security 2017. 29 p. 54

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. 2016
  12. A Time-dependent SIS-model for Long-term Computer Worm Evolution

    Märtens, M., Asghari, H., van Eeten, M. & Van Mieghem, P., 2016, IEEE Conference on Communications and Network Security 2016. Piscataway, NJ: IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 3 Next

ID: 94636