Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2015
  • 2013
  • 2011

Author

  • Lorena Montoya
2019

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)
2018

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
210 Downloads (Pure)

Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats

Le, A., Chen, Y., Chai, K. K., Vasenev, A. & Montoya, L., 1 Sep 2018, In : Mobile networks & applications. 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
103 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
93 Downloads (Pure)

Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach

Ceccarelli, A., Zoppi, T., Vasenev, A., Mori, M., Ionita, D., Montoya, L. & Bondavalli, A., Oct 2018, In : ACM Transactions on Cyber-Physical Systems. 3, 2, 24 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
26 Downloads (Pure)
2015

Modelling urban crime through workforce size: a test of the activity support concept

Montoya, L., 2015, In : Environment and planning. Part B: Planning and design. 42, 3, p. 399-414 40 p.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
13 Downloads (Pure)

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

31 Citations (Scopus)
2013

Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

How 'Digital' is Traditional Crime?

Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)

Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit

Junger, M., Montoya, L., Hartel, P. H. & Karemaker, M., Jan 2013, Enschede: Centre for Telematics and Information Technology (CTIT). (CTIT Technical Report Series; no. TR-CTIT-13-07)

Research output: Book/ReportReportOther research output

File
167 Downloads (Pure)

Modus operandi study of information and communication technology (ICT) facilitated crime

Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
93 Downloads (Pure)

Offenders in a digitized society

Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

The TREsPASS project

Montoya, L., Oct 2013, ICTOpen2013. Netherlands: ICTOPEN, p. 1-1 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
58 Downloads (Pure)
2011
64 Downloads (Pure)

Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko

Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.

Research output: Contribution to journalArticleAcademic

Effect of Land Use and Transportation Infrastructure on Residential Burglary

Montoya, L., 2011, p. 20-20. 1 p.

Research output: Contribution to conferencePaper

File
138 Downloads (Pure)

Elements at risk

Kingma, N., McCall, M. K. & Montoya, L., 2011, Multi-hazard risk assessment. van Westen, C. J., Alkema, D., Damen, M. C. J., Kerle, N. & Kingma, N. C. (eds.). Enschede: UNU - ITC DGIM, p. 401-443 43 p. (Distance Education Course Guide Book).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

5 Downloads (Pure)