1. 2019
  2. Crime and Online Anonymous Markets

    Hartel, P. & van Wegberg, R., 2019, International and Transnational Crime and Justice . Natarajan, M. (ed.). Cambridge University Press, p. 67-72 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  3. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources

    Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H. & Roppelt, J. C., 2019, In : Telematics and Informatics. 41, p. 55-69 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

  4. Rethinking Blockchain Security: Position Paper

    Chia, V., Hartel, P., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., van Staalduinen, M. & Szalachowski, P., 2019, 2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics. IEEE, p. 1273-1280 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

    Barth, S., Hartel, P., Junger, M. & Montoya, L., 2019, In : IEEE Security & Privacy Magazine: building confidence in a networked world. 17, 3, p. 8-16 9 p.

    Research output: Contribution to journalArticleScientificpeer-review

  6. 2018
  7. Computer science

    Hartel, P. & Junger, M., 2018, Routledge Handbook of Crime Science. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1st ed. Routledge, p. 179-189 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientific

  8. Het succes van social engineering

    Bullée, J. W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor Veiligheid. 17, 1-2, p. 40-53 14 p.

    Research output: Contribution to journalArticleProfessional

  9. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    Bullée, J. W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., 2018, In : Journal of Investigative Psychology and Offender Profiling. p. 20-45 26 p.

    Research output: Contribution to journalArticleScientificpeer-review

  10. Physical Location of Smart Key Activators: A Building Security Penetration Test

    Bullée, J. W., Montoya Morales, L., Junger, M. & Hartel, P., 2018, In : Journal of Corporate Real Estate. 20, 2, p. 138-151 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  11. 2017
  12. DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T., Caselli, M., Everts, M., Hartel, P., Hofstede, R., Jonker, W. & Peter, A., 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. New York, NY: Association for Computing Machinery (ACM), Vol. Part F132521. p. 373-386 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  13. How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M., 2017, Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 3 Next

ID: 194943