Elmer Lastdrager
Elmer Lastdrager
Research Engineer, SIDN Labs
Geverifieerd e-mailadres voor sidn.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Achieving a consensual definition of phishing based on a systematic review of the literature
EEH Lastdrager
Crime Science 3 (1), 9, 2014
842014
How effective is anti-phishing training for children?
E Lastdrager, IC Gallardo, P Hartel, M Junger
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 229-239, 2017
292017
Applying the Lost-Letter Technique to Assess IT Risk Behaviour
EEH Lastdrager, AL Montoya Morales, PH Hartel, M Junger
Socio-Technical Aspects in Security and Trust (STAST), 2013 Third Workshop …, 2013
42013
Securing Patient Information in Medical Databases
E Lastdrager
University of Twente, 2011
32011
From Fishing to Phishing
EEH Lastdrager
University of Twente, 2018
22018
Supertargets do exist in cyber space
M Junger, C Broekman, S Wachs, E Lastdrager, P Hartel
Manuscript in voorbereiding, 2014
22014
Consistency of Network Traffic Repositories: An Overview
E Lastdrager, A Pras
IFIP International Conference on Autonomous Infrastructure, Management and …, 2009
22009
Protecting Home Networks From Insecure IoT Devices
E Lastdrager, C Hesselman, J Jansen, M Davids
IEEE NOMS, 2020
12020
Consistency analysis of network traffic repositories
E Lastdrager, A Pras
Meeting of the European Network of Universities and Companies in Information …, 2009
12009
Apate: Anti-Phishing Analysing and Triaging Environment (Poster)
EEH Lastdrager, PH Hartel, M Junger
IEEE Computer Society, 2015
2015
Repeat victimization in cyber space
M Junger, S Wachs, C Broekman, EEH Lastdrager
2014
Stealing “lost” USB keys
E Lastdrager, L Montoya, P Hartel, M Junger
2013
4.4 Theme 4: Prevention, Detection, Response and Recovery
G Stringhini, F Gassmann, M Junger, E Lastdrager, M Sirivianos, S Wachs
Cybersafety Threats–from Deception to Aggression, 152, 0
Een onderzoek naar de redenen van effectiviteit van phishing emails
L Mol, EEH Lastdrager, M Junger, JM Heerkens
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–14