P.H. Hartel
40 records found
1
Authored
Investigating sentence severity with judicial open data
A case study on sentencing high-tech crime in the Dutch criminal justice system
Open data promotes transparency and accountability as everyone can analyse it. Law enforcement and the judiciary are increasingly making data available, to increase trust and confidence in the criminal justice system. Due to privacy legislation, judicial open data — like court ...
HeadPrint
Detecting anomalous communications through header-based application fingerprinting
Passive application fingerprinting is a technique to detect anomalous outgoing connections. By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of ...
Putting the privacy paradox to the test
Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
Research shows that people's use of computers and mobile phones is often characterized by a privacy paradox: Their self-reported concerns about their online privacy appear to be in contradiction with their often careless online behaviors. Earlier research into the privacy para ...
On the anatomy of social engineering attacks
A literature-based dissection of successful attacks
Physical Location of Smart Key Activators
A Building Security Penetration Test
DECANTeR
DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting
We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprin ...
Towards the normalization of cybercrime victimization
A routine activities analysis of cybercrime in Europe
Through the eye of the PLC
Semantic security monitoring for industrial processes
Training students to steal
A practical assignment in computer security education
Practical courses in information security provide students with first-hand knowledge of technical security mechanisms and their weaknesses. However, teaching students only the technical side of information security leads to a generation of students that emphasize digital solut ...