Jerry den Hartog
Jerry den Hartog
E-mail megerősítve itt: tue.nl
Hivatkozott rá
Hivatkozott rá
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6, 133-151, 2007
A machine learning solution to assess privacy policy completeness: (short paper)
E Costante, Y Sun, M Petković, J Den Hartog
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012
Security and privacy for innovative automotive applications: A survey
J den Hartog, N Zannone
Computer Communications 132, 17-41, 2018
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu
Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005
Formal verification of privacy for RFID systems
M Bruso, K Chatzikokolakis, J Den Hartog
2010 23rd IEEE Computer Security Foundations Symposium, 75-88, 2010
Verifying probabilistic programs using a Hoare like logic
JI Den Hartog, EP de Vink
International journal of foundations of computer science 13 (03), 315-340, 2002
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
On-line trust perception: What really matters
E Costante, J Den Hartog, M Petkovic
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
Analysis of XACML policies with SMT
F Turkmen, J Den Hartog, S Ranise, N Zannone
Principles of Security and Trust: 4th International Conference, POST 2015 …, 2015
Probabilistic extensions of semantical models
JI den Hartog
A probabilistic Hoare-style logic for game-based cryptographic proofs
R Corin, J Den Hartog
International Colloquium on Automata, Languages, and Programming, 252-263, 2006
A hybrid framework for data loss prevention and detection
E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone
2016 IEEE security and privacy workshops (SPW), 324-333, 2016
Improving DPA by peak distribution analysis
J Pan, JGJ Van Woudenberg, JI Den Hartog, MF Witteman
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
Formal analysis of XACML policies using SMT
F Turkmen, J den Hartog, S Ranise, N Zannone
Computers & Security 66, 185-203, 2017
What websites know about you: Privacy policy analysis using information extraction
E Costante, J den Hartog, M Petković
International Workshop on Data Privacy Management, 146-159, 2012
From system specification to anomaly detection (and back)
D Fauri, DR dos Santos, E Costante, J den Hartog, S Etalle, S Tonetta
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
PINPAS: a tool for power analysis of smartcards
J den Hartog, J Verschuren, E de Vink, J de Vos, W Wiersma
Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003
A white-box anomaly-based framework for database leakage detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
Journal of Information Security and Applications 32, 27-46, 2017
Nonmonotonic trust management for P2P applications
M Czenko, H Tran, J Doumen, S Etalle, P Hartel, J den Hartog
Electronic Notes in Theoretical Computer Science 157 (3), 113-130, 2006
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20