1. 2020
  2. HeadPrint: Detecting anomalous communications through header-based application fingerprinting

    Bortolameotti, R., Van Ede, T., Continella, A., Hupperich, T., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A., 2020, SAC 2020: Proceedings of the 35th Annual ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), p. 1696-1705 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  3. Mutation testing of smart contracts at scale

    Hartel, P. & Schumi, R., 2020, Tests and Proofs - 14th International Conference, TAP 2020, held as part of STAF 2020, Proceedings. Ahrendt, W. & Wehrheim, H. (eds.). Springer Open, p. 23-42 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12165 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  4. 2019
  5. An Empirical Study into the Success of Listed Smart Contracts in Ethereum

    Hartel, P., Homoliak, I. & Reijsbergen, D., 2019, In : IEEE Access. 7, p. 177539-177555 17 p., 8919981.

    Research output: Contribution to journalArticleScientificpeer-review

  6. Crime and Online Anonymous Markets

    Hartel, P. & van Wegberg, R., 2019, International and Transnational Crime and Justice . Natarajan, M. (ed.). Cambridge University Press, p. 67-72 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  7. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources

    Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H. & Roppelt, J. C., 2019, In : Telematics and Informatics. 41, p. 55-69 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

  8. Rethinking Blockchain Security: Position Paper

    Chia, V., Hartel, P., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., van Staalduinen, M. & Szalachowski, P., 2019, 2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics. IEEE, p. 1273-1280 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  9. Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

    Barth, S., Hartel, P., Junger, M. & Montoya, L., 2019, In : IEEE Security & Privacy Magazine: building confidence in a networked world. 17, 3, p. 8-16 9 p.

    Research output: Contribution to journalArticleScientificpeer-review

  10. Victim-aware adaptive covert channels

    Bortolameotti, R., van Ede, T., Continella, A., Everts, M., Jonker, W., Hartel, P. & Peter, A., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 450-471 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  11. 2018
  12. Computer science

    Hartel, P. & Junger, M., 2018, Routledge Handbook of Crime Science. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1st ed. Routledge - Taylor & Francis Group, p. 179-189 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

  13. Het succes van social engineering

    Bullée, J. W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor Veiligheid. 17, 1-2, p. 40-53 14 p.

    Research output: Contribution to journalArticleProfessional

Previous 1 2 3 Next

ID: 194943