Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2015
  • 2011

Author

  • Lorena Montoya
2019

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)
2018

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
210 Downloads (Pure)

Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats

Le, A., Chen, Y., Chai, K. K., Vasenev, A. & Montoya, L., 1 Sep 2018, In : Mobile networks & applications. 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
103 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
93 Downloads (Pure)

Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach

Ceccarelli, A., Zoppi, T., Vasenev, A., Mori, M., Ionita, D., Montoya, L. & Bondavalli, A., Oct 2018, In : ACM Transactions on Cyber-Physical Systems. 3, 2, 24 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
26 Downloads (Pure)
2017

Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools

Vasenev, A., Montoya, L. & Ionita, D., 2017, Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings. Lau, E. T., chai, M. K. K., Chen, Y., Jung, O., Leung, V. C. M., Yang, K., Bessler, S., Loo, J. & Nakayama, T. (eds.). Springer, p. 243-249 6 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 203).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
159 Downloads (Pure)

Priming and warnings are not effective to prevent social engineering attacks

Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

40 Citations (Scopus)
1 Downloads (Pure)

Spear phishing in organisations explained

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)
1 Downloads (Pure)

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe

Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2015

Modelling urban crime through workforce size: a test of the activity support concept

Montoya, L., 2015, In : Environment and planning. Part B: Planning and design. 42, 3, p. 399-414 40 p.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
13 Downloads (Pure)

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

31 Citations (Scopus)
2011
64 Downloads (Pure)

Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko

Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.

Research output: Contribution to journalArticleAcademic

Effect of Land Use and Transportation Infrastructure on Residential Burglary

Montoya, L., 2011, p. 20-20. 1 p.

Research output: Contribution to conferencePaper

File
138 Downloads (Pure)

Elements at risk

Kingma, N., McCall, M. K. & Montoya, L., 2011, Multi-hazard risk assessment. van Westen, C. J., Alkema, D., Damen, M. C. J., Kerle, N. & Kingma, N. C. (eds.). Enschede: UNU - ITC DGIM, p. 401-443 43 p. (Distance Education Course Guide Book).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

5 Downloads (Pure)