Filter
Conference contribution

Search results

  • 2020

    HeadPrint: Detecting anomalous communications through header-based application fingerprinting

    Bortolameotti, R., Van Ede, T., Continella, A., Hupperich, T., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A., 2020, SAC 2020: Proceedings of the 35th Annual ACM Symposium on Applied Computing. Association for Computing Machinery (ACM), p. 1696-1705 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    49 Downloads (Pure)
  • Mutation testing of smart contracts at scale

    Hartel, P. & Schumi, R., 2020, Tests and Proofs - 14th International Conference, TAP 2020, held as part of STAF 2020, Proceedings. Ahrendt, W. & Wehrheim, H. (eds.). SpringerOpen, p. 23-42 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12165 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    11 Citations (Scopus)
  • 2019

    Rethinking Blockchain Security: Position Paper

    Chia, V., Hartel, P., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., van Staalduinen, M. & Szalachowski, P., 2019, 2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics. IEEE, p. 1273-1280 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    File
    14 Citations (Scopus)
    224 Downloads (Pure)
  • Victim-aware adaptive covert channels

    Bortolameotti, R., van Ede, T., Continella, A., Everts, M., Jonker, W., Hartel, P. & Peter, A., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, Vol. 304. p. 450-471 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • 2017

    DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T., Caselli, M., Everts, M., Hartel, P., Hofstede, R., Jonker, W. & Peter, A., 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. New York, NY: Association for Computing Machinery (ACM), Vol. Part F132521. p. 373-386 14 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    27 Citations (Scopus)
    160 Downloads (Pure)
  • How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M., 2017, Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    73 Downloads (Pure)
  • Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe

    Junger, M., Montoya, L., Hartel, P. & Heydari, M., 2017, International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2017. Piscataway, NJ: IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    20 Citations (Scopus)
  • 2015

    Regression nodes: Extending attack trees with data from social sciences

    Bullee, JWH., Montoya Morales, AL., Pieters, W., Junger, M. & Hartel, P. H., 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Bella, G. & Lenzine, G. (eds.). Piscataway: IEEE Society, p. 17-23 7 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • 2014

    Through the eye of the PLC: Semantic security monitoring for industrial processes

    Hadziosmanovic, D., Sommer, R., Zambon, E. & Hartel, P., 2014, ACSAC'14 : Proceedings of the 30th Annual Computer Security Applications Conference. New York: Association for Computing Machinery (ACM), p. 126-135 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    150 Citations (Scopus)