The persuasion and security awareness experiment: reducing the success of social engineering attacks JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel Journal of experimental criminology 11, 97-115, 2015 | 134 | 2015 |
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018 | 70 | 2018 |
Spear phishing in organisations explained JW Bullee, L Montoya, M Junger, P Hartel Information & Computer Security 25 (5), 593-613, 2017 | 60 | 2017 |
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention JW Bullée, L Montoya, M Junger, PH Hartel Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 107-114, 2016 | 26 | 2016 |
How effective are social engineering interventions? A meta-analysis JW Bullee, M Junger Information & Computer Security 28 (5), 801-830, 2020 | 18 | 2020 |
Argumentation-based security requirements elicitation: The next round D Ionita, JW Bullee, RJ Wieringa 2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014 | 18 | 2014 |
Tangible modelling to elicit domain knowledge: an experiment and focus group D Ionita, R Wieringa, JW Bullee, A Vasenev Conceptual Modeling: 34th International Conference, ER 2015, Stockholm …, 2015 | 17 | 2015 |
Experimental social engineering: investigation and prevention JW Bullee | 13 | 2017 |
Social engineering JW Bullée, M Junger The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849-875, 2020 | 8 | 2020 |
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ... | 4 | 2015 |
Investigating the usability and utility of tangible modelling of socio-technical architectures D Ionita, R Wieringa, JW Bullee, A Vasenev CTIT Technical Report Series, 2015 | 4 | 2015 |
Physical location of smart key activators–a building security penetration test JW Bullee, L Montoya, M Junger, P Hartel Journal of Corporate Real Estate 20 (2), 138-151, 2018 | 3 | 2018 |
Regression Nodes: Extending attack trees with data from social sciences JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel 2015 Workshop on Socio-Technical Aspects in Security and Trust, 17-23, 2015 | 3 | 2015 |
Social engineering: digitale fraude en misleiding JW Bullée, M Junger Justitiele Verkenningen 46 (2), 2020 | 2 | 2020 |
Detection of leadership in informal (small) groups based on CCTV information JW Bullée University of Twente, 2013 | 2 | 2013 |
Het succes van social engineering JW Bullée, L Montoya, M Junger, P Hartel Tijdschrift voor veiligheid 17 (1-2), 40-53, 2018 | 1 | 2018 |
Experimental social engineering JW Bullee Unpublished doctoral dissertation, University of Twente, Netherlands, 2017 | 1 | 2017 |
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies JWH Bullee, M Junger Justitiële verkenningen 46 (2), 92-110, 2020 | | 2020 |
Nieuwe vormen van oplichting en fraude C Meerts, W Huisman, J Rooyakkers, M Weulen Kranenbarg, R Roks, ... Boom juridisch, 2020 | | 2020 |
Biometric features and privacy JW Bullée, R Veldhuis Information Theory in the Benelux and The 2rd Joint WIC/IEEE Symposium on …, 2012 | | 2012 |