1. 2018
  2. Het succes van social engineering

    Bullée, J. W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor Veiligheid. 17, 1-2, p. 40-53 14 p.

    Research output: Contribution to journalArticleProfessional

  3. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    Bullée, J. W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., 2018, In : Journal of Investigative Psychology and Offender Profiling. p. 20-45 26 p.

    Research output: Contribution to journalArticleScientificpeer-review

  4. Physical Location of Smart Key Activators: A Building Security Penetration Test

    Bullée, J. W., Montoya Morales, L., Junger, M. & Hartel, P., 2018, In : Journal of Corporate Real Estate. 20, 2, p. 138-151 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  5. 2017
  6. DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T., Caselli, M., Everts, M., Hartel, P., Hofstede, R., Jonker, W. & Peter, A., 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. New York, NY: Association for Computing Machinery (ACM), Vol. Part F132521. p. 373-386 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M., 2017, Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  8. Spear Phishing in Organisations Explained

    Bullee, J. W., Montoya, L., Junger, M. & Hartel, P., 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

    Research output: Contribution to journalArticleScientificpeer-review

  9. Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe

    Junger, M., Montoya, L., Hartel, P. & Heydari, M., 2017, International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2017. Piscataway, NJ: IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. 2016
  11. Reliably determining data leakage in the presence of strong attackers

    Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W. & Hartel, P. H., 1 Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: ACM DL, p. 484-495 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. 2015
  13. Publicly Verifiable Private Aggregation of Time-Series Data

    Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H. & Jonker, W., 1 Aug 2015, 10th International Conference on Availability, Reliability and Security, ARES 2015. IEEE, p. 50-59 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  14. Regression nodes: Extending attack trees with data from social sciences

    Bullee, JWH., Montoya Morales, AL., Pieters, W., Junger, M. & Hartel, P. H., 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Bella, G. & Lenzine, G. (eds.). Piscataway: IEEE Society, p. 17-23 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 Next

ID: 194943