Two methodologies for physical penetration testing using social engineering T Dimkov, A Van Cleeff, W Pieters, P Hartel Proceedings of the 26th annual computer security applications conference …, 2010 | 98 | 2010 |
Portunes: representing attack scenarios spanning through the physical, digital and social domain T Dimkov, W Pieters, P Hartel Automated Reasoning for Security Protocol Analysis and Issues in the Theory …, 2010 | 72 | 2010 |
Security policy alignment: A formal approach W Pieters, T Dimkov, D Pavlovic IEEE Systems Journal 7 (2), 275-287, 2012 | 41 | 2012 |
Training students to steal: a practical assignment in computer security education T Dimkov, W Pieters, P Hartel Proceedings of the 42nd ACM technical symposium on computer science …, 2011 | 34 | 2011 |
Privacy penetration testing: How to establish trust in your cloud provider CW Probst, MA Sasse, W Pieters, T Dimkov, E Luysterborg, M Arnaud European Data Protection: In Good Health?, 251-265, 2012 | 21 | 2012 |
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations T Dimkov, W Pieters, P Hartel Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 20 | 2010 |
Defining the cloud battlefield-supporting security assessments by cloud customers S Bleikertz, T Mastelic, S Pape, W Pieters, T Dimkov 2013 IEEE International Conference on Cloud Engineering (IC2E), 78-87, 2013 | 19 | 2013 |
Alignment of organizational security policies--theory and practice T Dimkov | 18 | 2012 |
Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations T Dimkov, W Pieters, P Hartel 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010 | 12 | 2010 |
Inability of existing security models to cope with data mobility in dynamic organizations T Dimkov, Q Tang, PH Hartel Centre for Telematics and Information Technology (CTIT), 2008 | 6 | 2008 |
Realizing security requirements with physical properties: A case study on paper voting A van Cleeff, T Dimkov, W Pieters, R Wieringa Proceedings of the International Conference on IT Convergence and Security …, 2012 | 5 | 2012 |
A structured semantic domain for smart contracts S Bleikertz, A Lochbihler, O Marić, S Meier, M Schmalz, RG Veprek Computer Security Foundations poster session (CSF 2019), https://www. canton …, 2019 | 2 | 2019 |
Physical Penetration Testing: A Whole New Story in Penetration Testing T Dimkov, W Pieters Centre for Telematics and Information Technology (CTIT), 2011 | 2 | 2011 |
Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain T Dimkov, W Pieters, PH Hartel Centre for Telematics and Information Technology (CTIT), 2009 | 2 | 2009 |
Portunes: analyzing multi-domain insider threats T Dimkov, W Pieters, PH Hartel Centre for Telematics and Information Technology (CTIT), 2010 | 1 | 2010 |
The key-free society T Dimkov Living the ICT future, 28-29, 2009 | | 2009 |
Free Article T Dimkov, W Pieters | | |
Defining the Cloud Battlefield S Bleikertz, T Mastelic, W Pieters, S Pape, T Dimkov, LLP Deloitte | | |