Search concepts
|
Selected filters |
Search results
-
Cost-effectiveness of Security Measures: A model-based Framework
Pieters, W., Probst, C. W., Lukszo, Z. & Montoya, L., Jan 2014, Approaches and Processes for Managing the Economics of Information Systems. Tsiakis, T., Kargidis, T. & Katsaros, P. (eds.). Hershey, PA: IGI Global, p. 139-156 18 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
8 Citations (Scopus)2 Downloads (Pure) -
Modelling urban crime through workforce size: a test of the activity support concept
Montoya, L., 2015, In : Environment and planning. Part B: Planning and design. 42, 3, p. 399-414 40 p.Research output: Contribution to journal › Article › Academic › peer-review
3 Citations (Scopus) -
Online social sports networks as crime facilitators
Stottelaar, B., Senden, J. & Montoya, L., Jun 2014, In : Crime science. 3, 8, p. 1-20 20 p.Research output: Contribution to journal › Article › Academic › peer-review
File6 Citations (Scopus)68 Downloads (Pure) -
Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools
Vasenev, A., Montoya, L. & Ionita, D., 2017, Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings. Lau, E. T., chai, M. K. K., Chen, Y., Jung, O., Leung, V. C. M., Yang, K., Bessler, S., Loo, J. & Nakayama, T. (eds.). Springer, p. 243-249 6 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 203).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File -
Priming and warnings are not effective to prevent social engineering attacks
Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.Research output: Contribution to journal › Article › Academic › peer-review
44 Citations (Scopus)1 Downloads (Pure) -
Regression Nodes: Extending attack trees with data from social sciences
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
Spear phishing in organisations explained
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus)1 Downloads (Pure) -
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.Research output: Book/Report › Report › Professional
Open AccessFile14 Downloads (Pure) -
The persuasion and security awareness experiment: reducing the success of social engineering attacks
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.Research output: Contribution to journal › Article › Academic › peer-review
31 Citations (Scopus) -
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe
Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEEResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
4 Citations (Scopus) -
TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster)
Pieters, W., Hadziosmanovic, D., Lenin, A., Montoya, L. & Willemson, J., May 2014, 35th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile44 Downloads (Pure)