Folgen
Jan-Willem H. Bullee
Jan-Willem H. Bullee
PhD
Bestätigte E-Mail-Adresse bei utwente.nl
Titel
Zitiert von
Zitiert von
Jahr
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11, 97-115, 2015
1342015
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel
Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018
702018
Spear phishing in organisations explained
JW Bullee, L Montoya, M Junger, P Hartel
Information & Computer Security 25 (5), 593-613, 2017
602017
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
JW Bullée, L Montoya, M Junger, PH Hartel
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 107-114, 2016
262016
How effective are social engineering interventions? A meta-analysis
JW Bullee, M Junger
Information & Computer Security 28 (5), 801-830, 2020
182020
Argumentation-based security requirements elicitation: The next round
D Ionita, JW Bullee, RJ Wieringa
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
182014
Tangible modelling to elicit domain knowledge: an experiment and focus group
D Ionita, R Wieringa, JW Bullee, A Vasenev
Conceptual Modeling: 34th International Conference, ER 2015, Stockholm …, 2015
172015
Experimental social engineering: investigation and prevention
JW Bullee
132017
Social engineering
JW Bullée, M Junger
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849-875, 2020
82020
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ...
42015
Investigating the usability and utility of tangible modelling of socio-technical architectures
D Ionita, R Wieringa, JW Bullee, A Vasenev
CTIT Technical Report Series, 2015
42015
Physical location of smart key activators–a building security penetration test
JW Bullee, L Montoya, M Junger, P Hartel
Journal of Corporate Real Estate 20 (2), 138-151, 2018
32018
Regression Nodes: Extending attack trees with data from social sciences
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
2015 Workshop on Socio-Technical Aspects in Security and Trust, 17-23, 2015
32015
Social engineering: digitale fraude en misleiding
JW Bullée, M Junger
Justitiele Verkenningen 46 (2), 2020
22020
Detection of leadership in informal (small) groups based on CCTV information
JW Bullée
University of Twente, 2013
22013
Het succes van social engineering
JW Bullée, L Montoya, M Junger, P Hartel
Tijdschrift voor veiligheid 17 (1-2), 40-53, 2018
12018
Experimental social engineering
JW Bullee
Unpublished doctoral dissertation, University of Twente, Netherlands, 2017
12017
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
JWH Bullee, M Junger
Justitiële verkenningen 46 (2), 92-110, 2020
2020
Nieuwe vormen van oplichting en fraude
C Meerts, W Huisman, J Rooyakkers, M Weulen Kranenbarg, R Roks, ...
Boom juridisch, 2020
2020
Biometric features and privacy
JW Bullée, R Veldhuis
Information Theory in the Benelux and The 2rd Joint WIC/IEEE Symposium on …, 2012
2012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20