关注
Elmer Lastdrager
Elmer Lastdrager
Research Engineer, SIDN Labs
在 sidn.nl 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Achieving a consensual definition of phishing based on a systematic review of the literature
EEH Lastdrager
Crime Science 3, 1-10, 2014
1792014
How effective is anti-phishing training for children?
E Lastdrager, IC Gallardo, P Hartel, M Junger
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 229-239, 2017
1222017
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts
A Noroozian, ET Rodriguez, E Lastdrager, T Kasama, M van Eeten, ...
IEEE Euro S&P, 2021
152021
Protecting Home Networks From Insecure IoT Devices
E Lastdrager, C Hesselman, J Jansen, M Davids
IEEE NOMS, 2020
142020
From Fishing to Phishing
EEH Lastdrager
University of Twente, 2018
82018
Applying the Lost-Letter Technique to Assess IT Risk Behaviour
EEH Lastdrager, AL Montoya Morales, PH Hartel, M Junger
Socio-Technical Aspects in Security and Trust (STAST), 2013 Third Workshop …, 2013
62013
Securing Patient Information in Medical Databases
E Lastdrager
University of Twente, 2011
52011
Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)
JM Ceron, C Scholten, A Pras, E Lastdrager, J Santanna
arXiv preprint arXiv:2011.01685, 2020
42020
Apate: Anti-Phishing Analysing and Triaging Environment (Poster)
EEH Lastdrager, PH Hartel, M Junger
IEEE Computer Society, 2015
2*2015
Consistency of Network Traffic Repositories: An Overview
E Lastdrager, A Pras
IFIP International Conference on Autonomous Infrastructure, Management and …, 2009
22009
Consistency analysis of network traffic repositories
E Lastdrager, A Pras
Meeting of the European Network of Universities and Companies in Information …, 2009
12009
A testbed to evaluate quantum-safe cryptography in DNSSEC
C Schutijser, E Lastdrager, R Koning, C Hesselman
DNS and Internet Naming Research Directions (DINR), 2024
2024
Repeat victimization in cyber space
M Junger, S Wachs, C Broekman, EEH Lastdrager
Congres Cybercrime: Understanding patterns and developments in cybercrime …, 2014
2014
Stealing “lost” USB keys
E Lastdrager, L Montoya, P Hartel, M Junger
2013
4.4 Theme 4: Prevention, Detection, Response and Recovery
G Stringhini, F Gassmann, M Junger, E Lastdrager, M Sirivianos, S Wachs
Cybersafety Threats–from Deception to Aggression, 152, 0
系统目前无法执行此操作,请稍后再试。
文章 1–15