Link-layer jamming attacks on S-MAC YW Law, P Hartel, J den Hartog, P Havinga Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005 | 137 | 2005 |
Audit-based compliance control JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini International Journal of Information Security 6, 133-151, 2007 | 126 | 2007 |
Security and privacy for innovative automotive applications: A survey J den Hartog, N Zannone Computer Communications 132, 17-41, 2018 | 122 | 2018 |
A machine learning solution to assess privacy policy completeness: (short paper) E Costante, Y Sun, M Petković, J Den Hartog Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012 | 122 | 2012 |
A logic for auditing accountability in decentralized systems R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005 | 112 | 2005 |
Verifying probabilistic programs using a Hoare like logic JI Den Hartog, EP de Vink International journal of foundations of computer science 13 (03), 315-340, 2002 | 101 | 2002 |
Formal verification of privacy for RFID systems M Bruso, K Chatzikokolakis, J Den Hartog 2010 23rd IEEE Computer Security Foundations Symposium, 75-88, 2010 | 96 | 2010 |
An audit logic for accountability JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005 | 81 | 2005 |
On-line trust perception: What really matters E Costante, J Den Hartog, M Petkovic 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011 | 76 | 2011 |
Analysis of XACML policies with SMT F Turkmen, J Den Hartog, S Ranise, N Zannone Principles of Security and Trust: 4th International Conference, POST 2015 …, 2015 | 75 | 2015 |
Probabilistic extensions of semantical models JI den Hartog | 66 | 2002 |
A hybrid framework for data loss prevention and detection E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone 2016 IEEE security and privacy workshops (SPW), 324-333, 2016 | 59 | 2016 |
A probabilistic Hoare-style logic for game-based cryptographic proofs R Corin, J Den Hartog International Colloquium on Automata, Languages, and Programming, 252-263, 2006 | 57 | 2006 |
Formal analysis of XACML policies using SMT F Turkmen, J den Hartog, S Ranise, N Zannone Computers & Security 66, 185-203, 2017 | 53 | 2017 |
Improving DPA by peak distribution analysis J Pan, JGJ Van Woudenberg, JI Den Hartog, MF Witteman Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011 | 52 | 2011 |
What websites know about you: Privacy policy analysis using information extraction E Costante, J den Hartog, M Petković International Workshop on Data Privacy Management, 146-159, 2012 | 47 | 2012 |
From system specification to anomaly detection (and back) D Fauri, DR dos Santos, E Costante, J den Hartog, S Etalle, S Tonetta Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017 | 45 | 2017 |
PINPAS: a tool for power analysis of smartcards J den Hartog, J Verschuren, E de Vink, J de Vos, W Wiersma Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003 | 41 | 2003 |
A white-box anomaly-based framework for database leakage detection E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy Journal of Information Security and Applications 32, 27-46, 2017 | 40 | 2017 |
Reading between the fields: practical, effective intrusion detection for industrial control systems Ö Yüksel, J Den Hartog, S Etalle Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2063-2070, 2016 | 37 | 2016 |