Search

Your search keyword '"Hartel, P.H. (author)"' showing total 23 results

Search Constraints

Start Over You searched for: Author "Hartel, P.H. (author)" Remove constraint Author: "Hartel, P.H. (author)"
23 results on '"Hartel, P.H. (author)"'

Search Results

1. Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases

2. Investigating sentence severity with judicial open data: A case study on sentencing high-tech crime in the Dutch criminal justice system

3. Investigating sentence severity with judicial open data: A case study on sentencing high-tech crime in the Dutch criminal justice system

4. HeadPrint: Detecting anomalous communications through header-based application fingerprinting

5. HeadPrint: Detecting anomalous communications through header-based application fingerprinting

6. An Empirical Study into the Success of Listed Smart Contracts in Ethereum

7. Rethinking Blockchain Security: Position Paper

8. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources

9. Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of 'Thinking Like a Thief'

10. An Empirical Study into the Success of Listed Smart Contracts in Ethereum

11. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources

12. Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of 'Thinking Like a Thief'

13. Rethinking Blockchain Security: Position Paper

14. Computer science

15. Physical Location of Smart Key Activators: A Building Security Penetration Test

16. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

17. Computer science

18. Physical Location of Smart Key Activators: A Building Security Penetration Test

19. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

20. DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

21. How Effective is Anti-Phishing Training for Children?

22. How Effective is Anti-Phishing Training for Children?

23. DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

Catalog

Books, media, physical & digital resources