• 690 Citaten
19972019
Als u wijzigingen in Pure hebt gemaakt, zullen deze hier binnenkort zichtbaar zijn.

Onderzoeksoutput 1997 2019

Filter
Conferentiebijdrage
2019
2 Citaties (Scopus)
1 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (redactie). Springer, blz. 113-125 13 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intelligent buildings
Intrusion detection
Intrusion Detection
Automation
Semantics
1 Downloads (Pure)

Role inference + anomaly detection = situational awareness in bacnet networks

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 6 jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (redactie). Cham: Springer, blz. 461-481 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11543 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intelligent buildings
Situational Awareness
Anomaly Detection
Intrusion detection
Network protocols

Using provenance for secure data fusion in cooperative systems

Bertolissi, C., den Hartog, J. & Zannone, N., 28 mei 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, Inc, blz. 185-194 10 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Data fusion
Access control
2018
1 Citaat (Scopus)
3 Downloads (Pure)

Feature selection for anomaly detection in vehicular ad hoc networks

Le, V. H., den Hartog, J. & Zannone, N., 1 jan 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. de Leon, A. S. S., Novais, P., Battiato, S., Sarigiannidis, P., Obaidat, M. S., Obaidat, M. S., Callegari, C., van Sinderen, M. & Lorenz, P. (redactie). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., blz. 481-491 11 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Vehicular ad hoc networks
Feature extraction
Information use
Communication
Accidents
2017
3 Downloads (Pure)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 2017, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, blz. 289-294 6 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Cryptography
Control systems
Telecommunication networks
4 Citaties (Scopus)
3 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, blz. 13-24 10 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Specifications
Monitoring
Intrusion detection
Control systems
Formal specification
2016
10 Citaties (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, blz. 324-333 10 blz. 7527785

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Loss prevention
Engines
Feedback
2 Citaties (Scopus)

An authorization service for collaborative situation awareness

Egner, A. I., Luu, D. M., den Hartog, J. & Zannone, N., 9 mrt 2016, CODASPY '16 Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, blz. 136-138 3 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaties (Scopus)
1 Downloads (Pure)

A policy framework for data fusion and derived data control

den Hartog, J. & Zannone, N., 11 mrt 2016, ABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. New York: Association for Computing Machinery, Inc, blz. 47-57 11 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Data fusion
Electric fuses
Access control
Processing
1 Citaat (Scopus)
1 Downloads (Pure)

Collaborative access decisions: why has my decision not been enforced?

den Hartog, J. I. & Zannone, N., 2016, Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Ray, I., Singh Gaur, M., Conti, M., Sanghi, D. & Kamakoti, V. (redactie). Dordrecht: Springer, blz. 109-130 22 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10063 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Specifications
Feedback
Collaborative Systems
Justification
Social Networks
3 Citaties (Scopus)
2 Downloads (Pure)

Data governance and transparency for collaborative systems

Mahmudlu, R., den Hartog, J. & Zannone, N., 2016, Data and Applications Security and Privacy. Springer, blz. 199-216 18 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Collaborative Systems
Governance
Transparency
Requirements
Access Control
13 Citaties (Scopus)
18 Downloads (Pure)

Reading between the fields: practical, effective intrusion detection for industrial control systems

den Hartog, J., Etalle, S. & Yüksel, O. S., 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery, Inc, blz. 2063-2070

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Control systems
Telecommunication networks
Semantics
1 Downloads (Pure)

Towards creating believable decoy project folders for detecting data theft

Thaler, S., den Hartog, J. & Petkovic, M., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer, blz. 161-169 9 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Markov processes
User Studies
Data-driven
Markov chain
Attack
4 Citaties (Scopus)
4 Downloads (Pure)

Towards useful anomaly detection for back office networks

den Hartog, J., Etalle, S. & Yüksel, O. S., 24 nov 2016, Information Systems Security 12th International Conference, ICISS 2016 Jaipur, India, December 16–20, 2016 Proceedings. Cham: Springer, blz. 509-520

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Feature extraction
Experiments
2015
24 Citaties (Scopus)
3 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., den Hartog, J. I., Ranise, S. & Zannone, N., 2015, Principles of Security and Trust (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11-18 April, 2015. Proceedings). Focardi, R. & Myters, A. (redactie). Dordrecht: Springer, blz. 115-134 (Lecture Notes in Computer Science; vol. 9036).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Surface mount technology
Access control
XML
Markup languages
Specifications
48 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). blz. 1-23

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Compliance
Industry

Cross-domain attribute conversion for authentication and authorization

Thaler, S., Den Hartog, J., Ayed, D., Sommer, D. & Hitchens, M., 16 okt 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Institute of Electrical and Electronics Engineers, blz. 652-659 8 blz. 7299976

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Authentication
Terminology
Ontology
Animals

Introducing probabilities in controller strategies

Hartog, den, J. I. & Matteucci, J., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers): 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomarti, J., Lupu, E., Posegga, J., Aldini, A., Martonelli, F. & Suri, N. (redactie). Berlin: Springer, blz. 233-249 (Lecture Notes in Computer Science; vol. 8872).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Controllers
Specifications
2014
10 Citaties (Scopus)
91 Downloads (Pure)

CollAC: Collaborative access control

Damen, S., Hartog, den, J. I. & Zannone, N., 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS 2014, Minneapolis MN, USA, May 19-23, 2014). Institute of Electrical and Electronics Engineers, blz. 142-149

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Access control
Decision making
10 Citaties (Scopus)
5 Downloads (Pure)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (redactie). Springer, blz. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Industry
3 Citaties (Scopus)

Integration of data-minimising authentication into authorisation systems

Ayed, D., Bichsel, P., Camenisch, J. & Hartog, den, J. I., 2014, Trust and Trustworthy Computing (7th International Conference, TRUST 2014, Heraklion, Crete, June 30-July 2, 2014. Proceedings). Holz, T. & Ioannidis, S. (redactie). Berlin: Springer, blz. 179-187 (Lecture Notes in Computer Science; vol. 8564).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Authentication
Information systems
2013
7 Citaties (Scopus)

Linking unlinkability

Brusò, M., Chatzikokolakis, K., Etalle, S. & Hartog, den, J. I., 2013, Trustworthy Global Computing (7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers). Palamidessi, C. & Ryan, M. D. (redactie). Berlin: Springer, blz. 129-144 (Lecture Notes in Computer Science; vol. 8191).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

privacy
voting
event
lack
literature
8 Citaties (Scopus)
11 Downloads (Pure)

What websites know about you : privacy policy analysis using information extraction

Costante, E., Hartog, den, J. I. & Petkovic, M., 2013, Data Privacy Management and Autonomous Spontaneous Security (7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers). Di Pietro, R., Herranz, J., Damiani, E. & State, R. (redactie). Berlin: Springer, blz. 146-159 (Lecture Notes in Computer Science; vol. 7731).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Information analysis
Data privacy
Websites
Internet
2012
27 Citaties (Scopus)

A machine learning solution to assess privacy policy completeness

Costante, E., Sun, Y., Petkovic, M. & Hartog, den, J. I., 2012, Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES co-located with CCS 2012), October 15, 2012, Raleigh NC, USA. Association for Computing Machinery, Inc, blz. 91-96

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Learning systems
Data privacy
Websites
2011
20 Citaties (Scopus)
1 Downloads (Pure)

Improving DPA by peak distribution analysis

Pan, J., Woudenberg, van, J. G. J., Hartog, den, J. I. & Witteman, M. F., 2011, Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers). Biryukov, A., Gong, G. & Stinson, D. R. (redactie). Berlin: Springer, blz. 241-261 (Lecture Notes in Computer Science; vol. 6544).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Smart cards
Electric power utilization
Experiments
Side channel attack
4 Citaties (Scopus)
67 Downloads (Pure)

My private cloud overview : a trust, privacy and security infrastructure for the cloud

Chadwick, D. W., Lievens, S. F., Hartog, den, J. I., Pashalidis, A. & Alhadeff, J., 2011, Proceedings of the 4th IEEE International Conference on Cloud Computing (CLOUD 2011, Washington DC, USA, July 4-9, 2011). IEEE Computer Society, blz. 752-753

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
privacy
infrastructure
legal agreement
management
audit
17 Citaties (Scopus)
802 Downloads (Pure)

On-line trust perception: what really matters

Costante, E., Hartog, den, J. I. & Petkovic, M., 2011, Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust (STAST'11, Milan, Italy, September 8, 2011). Institute of Electrical and Electronics Engineers, blz. 52-59

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Websites
Health
Internet
2010
41 Citaties (Scopus)
2 Downloads (Pure)

Formal verification of privacy for RFID systems

Bruso, M., Chatzikokolakis, K. & Hartog, den, J. I., 2010, Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10, Edinburgh, UK, July 17-19, 2010). IEEE Computer Society, blz. 75-88

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Radio frequency identification (RFID)
Network protocols
Formal verification
7 Citaties (Scopus)
1 Downloads (Pure)

Principles on the security of AES against first and second-order differential power analysis

Lu, J., Pan, J. & Hartog, den, J. I., 2010, Applied Cryptography and Network Security (8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings). Zhou, J. & Yung, M. (redactie). Berlin: Springer, blz. 168-185 (Lecture Notes in Computer Science; vol. 6123).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Cryptography
10 Citaties (Scopus)

Towards static flow-based declassification for legacy and untrusted programs

Pontes Soares Rocha, B., Bandhakavi, S., Hartog, den, J. I., Winsborough, W. H. & Etalle, S., 2010, Proceedings IEEE Symposium on Security and Privacy (SP, Oakland CA, USA, May 16-19, 2010). Institute of Electrical and Electronics Engineers, blz. 93-108

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Static analysis
2009
1 Citaat (Scopus)

Know what you trust: Analyzing and designing trust policies with Scoll

Spiessens, F., Hartog, den, J. I. & Etalle, S., 2009, Formal Aspects in Security and Trust (5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008. Revised Selected Papers). Degano, P., Guttman, J. & Martinelli, F. (redactie). Berlin: Springer, blz. 129-142 (Lecture Notes in Computer Science; vol. 5491).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

19 Citaties (Scopus)
109 Downloads (Pure)

You cannot hide behind the mask : power analysis on a provably secure S-box implementation

Pan, J., Hartog, den, J. I. & Lu, J., 2009, Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers ). Youm, H. Y. & Yung, M. (redactie). Berlin: Springer, blz. 178-192 (Lecture Notes in Computer Science; vol. 5932).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Masks
Formal methods
Pattern matching
Experiments
Side channel attack
2008
4 Citaties (Scopus)
1 Downloads (Pure)

An operation-based metric for CPA resistance

Pan, J., Hartog, den, J. I. & Vink, de, E. P., 2008, Proceedings of the IFIP TC-11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC’08, Milano, Italy, September 7-10, 2008). Jajodia, S., Samarati, P. & Cimato, S. (redactie). Boston: Springer, blz. 429-443 (IFIP Conference Proceedings; vol. 278).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Hardware
Experiments
Side channel attack
2007

Trust and punishment

Etalle, S., Hartog, den, J. I. & Marsh, S., 2007, Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems (Autonomics 2007, Rome, Italy, October 28-30, 2007). Davide, F. (redactie). Association for Computing Machinery, Inc, (ACM International Conference Proceeding Series; vol. 302).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Trust management
Punishment
Management system
Management techniques
Roads
2006
30 Citaties (Scopus)

A probabilistic Hoare-style logic for game-based cryptographic proofs

Corin, R. J. & Hartog, den, J. I., 2006, Automata, Languages and Programming (Proceedings 33rd International Colloquium, ICALP 2006, Venice, Italy, July 9-16, 2006), Part II. Bugliesi, M., Preneel, B., Sassone, V. & Wegener, I. (redactie). Springer, blz. 252-263 (Lecture Notes in Computer Science; vol. 4052).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Semantics
19 Citaties (Scopus)

Nonmonotonic trust management for P2P applications

Czenko, M., Tran, H., Doumen, J. M., Etalle, S., Hartel, P. H. & Hartog, den, J. I., 2006, Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005). Mauw, S., Isarny, V. & Cremers, C. (redactie). blz. 113-130 (Electronic Notes in Theoretical Computer Science; vol. 157(3)).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2005
25 Citaties (Scopus)

A logic for auditing accountability in decentralized systems

Corin, R. J., Etalle, S., Hartog, den, J. I., Lenzini, G. & Staicu, I. S., 2005, Formal Aspects in Security and Trust (Proceedings IFIP TC1 WG1.7 Workshop, FAST, Toulouse, France, August 26-27, 2004). Dimitrakos, T. & Martinelli, F. (redactie). Boston: Springer, blz. 187-201 15 blz. (IFIP International Federation for Information Processing (IFIPAICT); vol. 173).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Flavors
Compliance
43 Citaties (Scopus)

An audit logic for accountability

Cederquist, J. G., Corin, R. J., Dekker, M. A. C., Etalle, S. & Hartog, den, J. I., 2005, Policies for Distributed Systems and Networks 2006 (Proceedings 6th IEEE International Workshop, POLICY 2005, Stockholm, Sweden, June 6-8, 2005). IEEE Computer Society, blz. 34-43

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Functional principles of registry-based service discovery

Sundramoorthy, V., Tan, C., Hartel, P. H., Hartog, den, J. I. & Scholten, J., 2005, Proceedings 30th Annual IEEE Conference on Local Computer Networks (LCN'05, Sydney, Australia, November 15-17, 2005). New York: IEEE Computer Society, blz. 209-217

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Network protocols
Network layers
Ubiquitous computing
Formal verification
58 Citaties (Scopus)
1 Downloads (Pure)

Link-layer jamming attacks on S-MAC

Law, Y. W., Hartel, P. H., Hartog, den, J. I. & Havinga, P. J. M., 2005, Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN 2005) 31 January - 2 Februari 2005, Istanbul, Turkey. IEEE Computer Society, blz. 217-225

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Jamming
Telecommunication links
Semantics
11 Citaties (Scopus)

Virtual analysis and reduction of side-channel vulnerabilities of smartcards

Hartog, den, J. I. & Vink, de, E. P., 2005, Formal Aspects in Security and Trust (Proceedings IFIP TC1 WG1.7 Workshop, FAST, Toulouse, France, August 26-27, 2004). Dimitrakos, T. & Martinelli, F. (redactie). Boston: Kluwer Academic Publishers, blz. 85-98

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2003
11 Citaties (Scopus)

PINPAS: a tool for power analysis of smartcards

Hartog, den, J. I., Vink, de, E. P., Verschuren, J. H. S., Vos, de, J. & Wiersma, W. T., 2003, Security and Privacy in the Age of Uncertainty (Proceedings IFIP TC11 18th International Conference on Information Security, SEC2003, Athens Greece, May 26-28, 2003). Gritzalis, D., De Capitani di Vimercati, S., Samarati, P. & Katsikas, S. K. (redactie). Kluwer, blz. 453-457 (IFIP Conference Proceedings; vol. 250).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2001
10 Citaties (Scopus)

Metric semantics and full abstractness for action refinement and probabilistic choice

Hartog, den, J. I., Vink, de, E. P. & Bakker, de, J. W., 2001, Proceedings of The First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology (MFCSIT2000, Cork, Ireland, July 20-21, 2000). Hurley, T., Mac an Airchinnigh, M., Schellekens, M. & Seda, A. (redactie). blz. 72-99 (Electronic Notes in Theoretical Computer Science; vol. 40).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1999
6 Citaties (Scopus)

Verifying probabilistic programs using a Hoare like logic

Hartog, den, J. I., 1999, Advances in Computing Science - ASIAN'99 (Proceedings 5th Asian Computing Science Conference, Phuket, Thailand, December 10-12, 1999). Thiagarajan, P. S. & Yap, R. (redactie). Springer, blz. 790- (Lecture Notes in Computer Science; vol. 1742).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Semantics
1998
19 Citaties (Scopus)

Mixing up nondeterminism and probability : a preliminary report

Hartog, den, J. I. & Vink, de, E. P., 1998, Proceedings of the 1st International Workshop on Probabilistic Methods in Verification (PROBMIV '98, Indianapolis IN, USA, June 19-20, 1998; satellite event to the 13th International IEEE Symposium on Logic in Computer Science, LICS '98). Baier, C. (redactie). blz. 88-110 (Electronic Notes in Theoretical Computer Science; vol. 22).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1997

Comparative metric semantics for commit in or-parallel logic programming

Todoran, E., Hartog, den, J. I. & Vink, de, E. P., 1997, Logic Programming (Proceedings of the International Symposium, ILPS'97, Port Washington NY, USA, October 13-16, 1997), MIT Press Series in Logic Programming. Maluszynski, J. (redactie). Cambridge MA: MIT Press, blz. 101-115

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review