Search concepts
|
Selected filters |
Search results
-
Cost-effectiveness of Security Measures: A model-based Framework
Pieters, W., Probst, C. W., Lukszo, Z. & Montoya, L., Jan 2014, Approaches and Processes for Managing the Economics of Information Systems. Tsiakis, T., Kargidis, T. & Katsaros, P. (eds.). Hershey, PA: IGI Global, p. 139-156 18 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
8 Citations (Scopus)2 Downloads (Pure) -
Het succes van social engineering
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Online social sports networks as crime facilitators
Stottelaar, B., Senden, J. & Montoya, L., Jun 2014, In : Crime science. 3, 8, p. 1-20 20 p.Research output: Contribution to journal › Article › Academic › peer-review
File6 Citations (Scopus)68 Downloads (Pure) -
On the anatomy of social engineering attacks: A literature-based dissection of successful attacks
Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile7 Citations (Scopus)101 Downloads (Pure) -
Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools
Vasenev, A., Montoya, L. & Ionita, D., 2017, Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings. Lau, E. T., chai, M. K. K., Chen, Y., Jung, O., Leung, V. C. M., Yang, K., Bessler, S., Loo, J. & Nakayama, T. (eds.). Springer, p. 243-249 6 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 203).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File -
Priming and warnings are not effective to prevent social engineering attacks
Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.Research output: Contribution to journal › Article › Academic › peer-review
44 Citations (Scopus)1 Downloads (Pure) -
Spear phishing in organisations explained
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus)1 Downloads (Pure) -
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach
Ceccarelli, A., Zoppi, T., Vasenev, A., Mori, M., Ionita, D., Montoya, L. & Bondavalli, A., Oct 2018, In : ACM Transactions on Cyber-Physical Systems. 3, 2, 24 p., 18.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile5 Citations (Scopus)34 Downloads (Pure) -
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe
Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEEResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
4 Citations (Scopus) -
TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster)
Pieters, W., Hadziosmanovic, D., Lenin, A., Montoya, L. & Willemson, J., May 2014, 35th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile44 Downloads (Pure)