• 74 Citations
  • 5 h-Index
20122018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 74 Citations
  • 5 h-Index
  • 5 Conference contribution
  • 4 Article
  • 2 Report
  • 1 PhD Thesis - Research UT, graduation UT
Filter
Conference contribution
2016

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
250 Downloads (Pure)
2015

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group

Ionita, D., Wieringa, R. J., Bullee, J-W. & Vasenev, A., 22 Oct 2015, 34th International Conference on Conceptual Modeling, ER 2015. Johannesson, P., Li Lee, M., Liddle, S. W., Opdahl, A. L. & López, Ó. P. (eds.). Berlin: Springer, p. 558-565 8 p. (Lecture Notes in Computer Science; vol. 9381).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
2014

Argumentation-Based Security Requirements Elicitation: The Next Round

Ionita, D., Bullee, J-W. & Wieringa, R. J., 25 Aug 2014, Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, New Jersey: IEEE Computer Society, p. 7-12 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
2012

Biometric features and privacy: condemned, based upon your finger print

Bullee, J-W. & Veldhuis, R., May 2012, Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux. Enschede: Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 44-51 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
91 Downloads (Pure)