Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Pieter Hendrik Hartel
2019
Open Access
File
1 Citation (Scopus)
66 Downloads (Pure)

Rethinking Blockchain Security: Position Paper

Chia, V., Hartel, P. H., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., Van Staalduinen, M. & Szalachowski, P., 3 Jun 2019, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, p. 1273-1280 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Victim-Aware Adaptive Covert Channels

Bortolameotti, R., van Ede, T. S., Continella, A., Everts, M. H., Jonker, W., Hartel, P. H. & Peter, A., 2019, Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohalsen, A. (eds.). p. 450-471 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 304).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2018

Computer Science

Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
23 Downloads (Pure)

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
115 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
69 Downloads (Pure)
2017

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting

Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
4 Downloads (Pure)

How Effective is Anti-Phishing Training for Children? (Distinguished Paper Award)

Lastdrager, E. E. H., Carvajal Gallardo, I. R., Hartel, P. H. & Junger, M., 14 Jul 2017, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, p. 229-239 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
22 Downloads (Pure)

Spear phishing in organisations explained

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)
1 Downloads (Pure)

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe

Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2016

Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition

Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
35 Downloads (Pure)

Reliably determining data leakage in the presence of strong attackers

Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W. & Hartel, P. H., Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: Association for Computing Machinery (ACM), p. 484-495 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
225 Downloads (Pure)
2015

Apate: Anti-Phishing Analysing and Triaging Environment (Poster)

Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
49 Downloads (Pure)

Publicly Verifiable Private Aggregation of Time-Series Data

Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H. & Jonker, W., 1 Aug 2015, 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway, NJ, USA: IEEE, p. 50-59 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

27 Citations (Scopus)
2014

A Survey of Provably Secure Searchable Encryption

Bösch, C. T., Hartel, P. H., Jonker, W. & Peter, A., Aug 2014, In : ACM computing surveys. 47, 2, p. 18:1-18:51 47 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

File
128 Citations (Scopus)
990 Downloads (Pure)

Distributed Searchable Symmetric Encryption

Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., Hartel, P. H. & Jonker, W., Jul 2014, Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014. USA: IEEE, p. 330-337 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
17 Citations (Scopus)
78 Downloads (Pure)

Privacy-Preserving Verification of Clinical Research

Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H. & Jonker, W., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Bonn: Gesellschaft für Informatik, p. 481-500 20 p. (Lecture Notes in Informatics (LNI)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
18 Downloads (Pure)

SOFIR: Securely Outsourced Forensic Image Recognition

Bösch, C. T., Peter, A., Hartel, P. H. & Jonker, W., Feb 2014, 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014. USA: IEEE, p. 2694-2698 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
95 Downloads (Pure)

Through the eye of the PLC: semantic security monitoring for industrial processes

Hadziosmanovic, D., Sommer, R., Zambon, E. & Hartel, P. H., 8 Dec 2014, ACSAC'14 Proceedings of the 30th Annual Computer Security Applications Conference. New York: Association for Computing Machinery (ACM), p. 126-135 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
58 Citations (Scopus)
121 Downloads (Pure)

TuLP:A family of lightweight message authentication codes for body sensor networks

Gong, Z., Hartel, P. H., Nikova, S. I., Tang, S-H. & Zhu, B., 1 Jan 2014, In : Journal of computer science and technology. 29, 1, p. 53-68 16 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
8 Citations (Scopus)
32 Downloads (Pure)
2013

Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Critical information infrastructures security - preface

Luiijf, E. & Hartel, P. H., Sep 2013, 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013. Berlin: Springer, p. v-vi 2 p. (Lecture Notes in Computer Science; vol. 8328).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Current established risk assessment methodologies and tools

Ionita, D., Hartel, P. H., Pieters, W. & Wieringa, R. J., 1 Sep 2013, Enschede: Centre for Telematics and Information Technology (CTIT). 131 p. (CTIT Technical Report Series; no. TR-CTIT-14-04)

Research output: Book/ReportReportProfessional

File
1428 Downloads (Pure)

Efficient privacy-enhanced familiarity-based recommender system

Jeckmans, A., Peter, A. & Hartel, P. H., Sep 2013, Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013. Berlin Heidelberg: Springer, p. 400-417 18 p. (Lecture Notes in Computer Science; vol. 8134).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
15 Citations (Scopus)
100 Downloads (Pure)

How 'Digital' is Traditional Crime?

Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
1 Downloads (Pure)

Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit

Junger, M., Montoya, L., Hartel, P. H. & Karemaker, M., Jan 2013, Enschede: Centre for Telematics and Information Technology (CTIT). (CTIT Technical Report Series; no. TR-CTIT-13-07)

Research output: Book/ReportReportOther research output

File
137 Downloads (Pure)

Modus operandi study of information and communication technology (ICT) facilitated crime

Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
86 Downloads (Pure)

Offenders in a digitized society

Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Privacy in Recommender Systems

Jeckmans, A., Beye, M., Erkin, Z., Hartel, P. H., Lagendijk, R. L. & Tang, Q., Jan 2013, Social Media Retrieval. Ramzan, N., van Zwol, R., Lee, J-S., Clüver, K. & Hua, X-S. (eds.). London: Springer, p. 263-281 19 p. (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
3 Citations (Scopus)
460 Downloads (Pure)

Situative Prävention von Cybercrime: ein chancenreicher Bekämpfungsansatz

Hartel, P. H., Nov 2013, Cybercrime - Bedrohung, Intervention, Abwehr. Wiesbaden, Germany: Bundeskriminalamt, p. 96-108 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
57 Downloads (Pure)

Wat gaan we doen tegen de cyberaanvallen?

Hartel, P. H., Berg, J. & Junger, M., 2013, In : Informatiebeveiliging. 4, 4, p. 10-11 2 p.

Research output: Contribution to journalArticleProfessional

File
54 Downloads (Pure)
2012

A Log Mining Approach for Process Monitoring in SCADA

Hadziosmanovic, D., Bolzoni, D. & Hartel, P., 2012, In : International journal of information security. 11, 4, p. 231-251 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
42 Citations (Scopus)
76 Downloads (Pure)

Challenges and opportunities in securing industrial control systems

Hadziosmanovic, D., Bolzoni, D., Etalle, S. & Hartel, P. H., Jun 2012, Proceedings of the IEEE Workshop on Complexity in Engineering, COMPENG 2012. USA: IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
20 Citations (Scopus)
74 Downloads (Pure)

Crime science: editorial statement

Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.

Research output: Contribution to journalArticleAcademic

Open Access
File
12 Downloads (Pure)

Information Security

Hartel, P. H. & Suryana Herman, N., 2012, Cyber Safety: An Introduction. Leukfeldt, E. R. & Stol, W. P. (eds.). The Hague: Eleven International Publishers, p. 281-291 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

File
42 Downloads (Pure)

Method and System of Monitoring a Data Stream

Bösch, C. T., Brinkman, R., Hartel, P. H. & Jonker, W., 20 Nov 2012, (Submitted) Patent No. P31230NL00/HSE, Priority date 20 Nov 2012

Research output: Patent

New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students

Junger, M., Ottenhof, R. H. J. & Hartel, P. H., Dec 2012, KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

File
33 Downloads (Pure)

New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students

Junger, M., Ottenhof, R. H. J. & Hartel, P. H., 2012, KLM Van Dijk: Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

File
12 Downloads (Pure)

Privacy in Online Social Networks

Beye, M., Jeckmans, A., Erkin, Z., Hartel, P. H., Lagendijk, R. & Tang, Q., Aug 2012, Computational Social Networks: Security and Privacy. Abraham, A. (ed.). London: Springer, p. 87-113 27 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
18 Citations (Scopus)
678 Downloads (Pure)

Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset

Jeckmans, A., Tang, Q. & Hartel, P. H., May 2012, International Conference on Collaboration Technologies and Systems (CTS 2012). USA: IEEE Computer Society, p. 439-446 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
23 Citations (Scopus)
106 Downloads (Pure)
File
39 Downloads (Pure)

Selective Document Retrieval from Encrypted Database

Bösch, C. T., Tang, Q., Hartel, P. H. & Jonker, W., Sep 2012, 15th International Conference on Information Security (ISC). Berlin: Springer, p. 224-241 18 p. (Lecture Notes in Computer Science; vol. 7483).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
18 Citations (Scopus)
144 Downloads (Pure)

Simple algebraic data types for C

Hartel, P. H. & Muller, H. L., Feb 2012, In : Software : practice and experience. Online pre, 2, p. 191-210 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)

Teaching Engineering students to "Think thief"

Hartel, P. H. & Junger, M., Jul 2012, Enschede: Centre for Telematics and Information Technology (CTIT). 12 p. (CTIT Technical Report Series; no. TR-CTIT-12-19)

Research output: Book/ReportReportProfessional

File
138 Downloads (Pure)

Teaching Information Security Students to "Think thief"

Hartel, P. H. & Junger, M., 2012, Enschede, The Netherlands: Universiteit Twente. 7 p. (CTIT technical report; no. 12-19)

Research output: Book/ReportReportProfessional

File
27 Downloads (Pure)