Achieving a consensual definition of phishing based on a systematic review of the literature EEH Lastdrager Crime Science 3, 1-10, 2014 | 190 | 2014 |
How effective is anti-phishing training for children? E Lastdrager, IC Gallardo, P Hartel, M Junger Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 229-239, 2017 | 128 | 2017 |
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts A Noroozian, ET Rodriguez, E Lastdrager, T Kasama, M van Eeten, ... IEEE Euro S&P, 2021 | 19 | 2021 |
Protecting Home Networks From Insecure IoT Devices E Lastdrager, C Hesselman, J Jansen, M Davids IEEE NOMS, 2020 | 15 | 2020 |
From Fishing to Phishing EEH Lastdrager University of Twente, 2018 | 8 | 2018 |
Applying the Lost-Letter Technique to Assess IT Risk Behaviour EEH Lastdrager, AL Montoya Morales, PH Hartel, M Junger Socio-Technical Aspects in Security and Trust (STAST), 2013 Third Workshop …, 2013 | 6 | 2013 |
Securing Patient Information in Medical Databases E Lastdrager University of Twente, 2011 | 5 | 2011 |
Characterising attacks targeting low-cost routers: a MikroTik case study (Extended) JM Ceron, C Scholten, A Pras, E Lastdrager, J Santanna arXiv preprint arXiv:2011.01685, 2020 | 4 | 2020 |
Apate: Anti-Phishing Analysing and Triaging Environment (Poster) EEH Lastdrager, PH Hartel, M Junger IEEE Computer Society, 2015 | 2* | 2015 |
Consistency of Network Traffic Repositories: An Overview E Lastdrager, A Pras IFIP International Conference on Autonomous Infrastructure, Management and …, 2009 | 2 | 2009 |
Consistency analysis of network traffic repositories E Lastdrager, A Pras Meeting of the European Network of Universities and Companies in Information …, 2009 | 1 | 2009 |
A testbed to evaluate quantum-safe cryptography in DNSSEC C Schutijser, E Lastdrager, R Koning, C Hesselman DNS and Internet Naming Research Directions (DINR), 2024 | | 2024 |
Repeat victimization in cyber space M Junger, S Wachs, C Broekman, EEH Lastdrager Congres Cybercrime: Understanding patterns and developments in cybercrime …, 2014 | | 2014 |
Stealing “lost” USB keys E Lastdrager, L Montoya, P Hartel, M Junger | | 2013 |
4.4 Theme 4: Prevention, Detection, Response and Recovery G Stringhini, F Gassmann, M Junger, E Lastdrager, M Sirivianos, S Wachs Cybersafety Threats–from Deception to Aggression, 152, 0 | | |