Folgen
Jerry den Hartog
Jerry den Hartog
Bestätigte E-Mail-Adresse bei tue.nl
Titel
Zitiert von
Zitiert von
Jahr
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005
1352005
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6, 133-151, 2007
1252007
Security and privacy for innovative automotive applications: A survey
J den Hartog, N Zannone
Computer Communications 132, 17-41, 2018
1192018
A machine learning solution to assess privacy policy completeness: (short paper)
E Costante, Y Sun, M Petković, J Den Hartog
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012
1192012
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu
Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005
1112005
Verifying probabilistic programs using a Hoare like logic
JI Den Hartog, EP de Vink
International journal of foundations of computer science 13 (03), 315-340, 2002
972002
Formal verification of privacy for RFID systems
M Bruso, K Chatzikokolakis, J Den Hartog
2010 23rd IEEE Computer Security Foundations Symposium, 75-88, 2010
962010
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
802005
On-line trust perception: What really matters
E Costante, J Den Hartog, M Petkovic
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
762011
Analysis of XACML policies with SMT
F Turkmen, J Den Hartog, S Ranise, N Zannone
Principles of Security and Trust: 4th International Conference, POST 2015 …, 2015
752015
Probabilistic extensions of semantical models
JI den Hartog
642002
A hybrid framework for data loss prevention and detection
E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone
2016 IEEE security and privacy workshops (SPW), 324-333, 2016
552016
A probabilistic Hoare-style logic for game-based cryptographic proofs
R Corin, J Den Hartog
International Colloquium on Automata, Languages, and Programming, 252-263, 2006
552006
Formal analysis of XACML policies using SMT
F Turkmen, J den Hartog, S Ranise, N Zannone
Computers & Security 66, 185-203, 2017
532017
Improving DPA by peak distribution analysis
J Pan, JGJ Van Woudenberg, JI Den Hartog, MF Witteman
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
522011
What websites know about you: Privacy policy analysis using information extraction
E Costante, J den Hartog, M Petković
International Workshop on Data Privacy Management, 146-159, 2012
462012
From system specification to anomaly detection (and back)
D Fauri, DR dos Santos, E Costante, J den Hartog, S Etalle, S Tonetta
Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017
442017
PINPAS: a tool for power analysis of smartcards
J den Hartog, J Verschuren, E de Vink, J de Vos, W Wiersma
Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003
402003
A white-box anomaly-based framework for database leakage detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
Journal of Information Security and Applications 32, 27-46, 2017
382017
Reading between the fields: practical, effective intrusion detection for industrial control systems
Ö Yüksel, J Den Hartog, S Etalle
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2063-2070, 2016
352016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20