1. 2018
  2. Het succes van social engineering

    Bullée, J. W., Montoya, L., Junger, M. & Hartel, P. 2018 In : Tijdschrift voor Veiligheid. 17, 1-2, p. 40-53 14 p.

    Research output: ProfessionalArticle

  3. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    Bullée, J. W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P. 2018 In : Journal of Investigative Psychology and Offender Profiling. p. 20-45 26 p.

    Research output: Scientific - peer-reviewArticle

  4. Physical Location of Smart Key Activators: A Building Security Penetration Test

    Bullée, J. W., Montoya Morales, L., Junger, M. & Hartel, P. 2018 In : Journal of Corporate Real Estate. 20, 2, p. 138-151 14 p.

    Research output: Scientific - peer-reviewArticle

  5. 2017
  6. DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T., Caselli, M., Everts, M., Hartel, P., Hofstede, R., Jonker, W. & Peter, A. 2017 Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. New York, NY: Association for Computing Machinery (ACM), Vol. Part F132521, p. 373-386 14 p.

    Research output: Scientific - peer-reviewConference contribution

  7. How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M. 2017 Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Scientific - peer-reviewConference contribution

  8. Spear Phishing in Organisations Explained

    Bullee, J. W., Montoya, L., Junger, M. & Hartel, P. 2017 In : Information and Computer Security. 25, 5, p. 593-613 21 p.

    Research output: Scientific - peer-reviewArticle

  9. Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe

    Junger, M., Montoya, L., Hartel, P. & Heydari, M. 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2017. Piscataway, NJ: IEEE, p. 1-8 8 p.

    Research output: Scientific - peer-reviewConference contribution

  10. 2016
  11. Reliably determining data leakage in the presence of strong attackers

    Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W. & Hartel, P. H. 1 Dec 2016 Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: ACM DL, p. 484-495 12 p.

    Research output: Scientific - peer-reviewConference contribution

  12. 2015
  13. Publicly Verifiable Private Aggregation of Time-Series Data

    Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H. & Jonker, W. 1 Aug 2015 10th International Conference on Availability, Reliability and Security, ARES 2015. IEEE, p. 50-59 10 p.

    Research output: Scientific - peer-reviewConference contribution

  14. Regression nodes: Extending attack trees with data from social sciences

    Bullee, J. W. H., Montoya Morales, A. L., Pieters, W., Junger, M. & Hartel, P. H. 2015 Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Bella, G. & Lenzine, G. (eds.). Piscataway: IEEE Society, p. 17-23 7 p.

    Research output: Scientific - peer-reviewConference contribution

Previous 1 2 Next

ID: 194943