The persuasion and security awareness experiment: reducing the success of social engineering attacks JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel Journal of experimental criminology 11, 97-115, 2015 | 159 | 2015 |
Spear phishing in organisations explained JW Bullee, L Montoya, M Junger, P Hartel Information & Computer Security 25 (5), 593-613, 2017 | 94 | 2017 |
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018 | 91 | 2018 |
How effective are social engineering interventions? A meta-analysis JW Bullee, M Junger Information & Computer Security 28 (5), 801-830, 2020 | 43 | 2020 |
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention JW Bullée, L Montoya, M Junger, PH Hartel Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 107-114, 2016 | 40 | 2016 |
Social engineering JW Bullée, M Junger The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849-875, 2020 | 21 | 2020 |
Tangible modelling to elicit domain knowledge: an experiment and focus group D Ionita, R Wieringa, JW Bullee, A Vasenev Conceptual Modeling: 34th International Conference, ER 2015, Stockholm …, 2015 | 20 | 2015 |
Argumentation-based security requirements elicitation: The next round D Ionita, JW Bullee, RJ Wieringa 2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014 | 18 | 2014 |
Experimental social engineering: Investigation and prevention JW Bullee | 14 | 2017 |
Investigating the usability and utility of tangible modelling of socio-technical architectures D Ionita, R Wieringa, JW Bullee, A Vasenev University of Twente, Enschede, Netherlands, 2015 | 5 | 2015 |
Regression Nodes: Extending attack trees with data from social sciences JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel 2015 Workshop on Socio-Technical Aspects in Security and Trust, 17-23, 2015 | 4 | 2015 |
Technology-supported risk estimation by predictive assessment of socio-technical security L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ... Trespass Project, 2015 | 4 | 2015 |
First Steps to Improve Cybersecurity Behaviour–a Virtual Reality Experience L Klooster, R Van Delden, JW Bullée Proceedings of the 17th European Conference on Game-Based Learning: ECGBL, 2023 | 3 | 2023 |
Social engineering: digitale fraude en misleiding JW Bullée, M Junger Justitiele Verkenningen 46 (2), 2020 | 3 | 2020 |
Physical location of smart key activators–a building security penetration test JW Bullee, L Montoya, M Junger, P Hartel Journal of Corporate Real Estate 20 (2), 138-151, 2018 | 3 | 2018 |
Detection of leadership in informal (small) groups based on CCTV information JW Bullée University of Twente, 2013 | 2 | 2013 |
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies JWH Bullee, M Junger Justitiële verkenningen 46 (2), 92-110, 2020 | 1 | 2020 |
Het succes van social engineering JW Bullée, L Montoya, M Junger, P Hartel Tijdschrift voor veiligheid 17 (1-2), 40-53, 2018 | 1 | 2018 |
Does trainer gender make a difference when delivering phishing training? A new experimental design to capture bias A Palheiros Da Silva, W Mbaka, J Mayer, JW Bullee, K Tuma Proceedings of the 28th International Conference on Evaluation and …, 2024 | | 2024 |
Nieuwe vormen van oplichting en fraude C Meerts, W Huisman, J Rooyakkers, M Weulen Kranenbarg, R Roks, ... Boom juridisch, 2020 | | 2020 |