BibTeX records: Marianne Junger

download as .bib file

@article{DBLP:journals/compsec/MeursCCJA24,
  author       = {Tom Meurs and
                  Edward J. Cartwright and
                  Anna Cartwright and
                  Marianne Junger and
                  Abhishta Abhishta},
  title        = {Deception in double extortion ransomware attacks: An analysis of profitability
                  and credibility},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103670},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103670},
  doi          = {10.1016/J.COSE.2023.103670},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MeursCCJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HoheiselCSJ23,
  author       = {Raphael Hoheisel and
                  Guido van Capelleveen and
                  Dipti K. Sarmah and
                  Marianne Junger},
  title        = {The development of phishing during the {COVID-19} pandemic: An analysis
                  of over 1100 targeted domains},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103158},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103158},
  doi          = {10.1016/J.COSE.2023.103158},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HoheiselCSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MeursCCJHTA23,
  author       = {Tom Meurs and
                  Edward J. Cartwright and
                  Anna Cartwright and
                  Marianne Junger and
                  Raphael Hoheisel and
                  Erik Tews and
                  Abhishta Abhishta},
  title        = {Ransomware Economics: {A} Two-Step Approach To Model Ransom Paid},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona,
                  Spain, November 15-17, 2023},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/eCrime61234.2023.10485506},
  doi          = {10.1109/ECRIME61234.2023.10485506},
  timestamp    = {Thu, 18 Apr 2024 20:24:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MeursCCJHTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/BarthJJ22,
  author       = {Susanne Barth and
                  Menno D. T. de Jong and
                  Marianne Junger},
  title        = {Lost in privacy? Online privacy from a cybersecurity expert perspective},
  journal      = {Telematics Informatics},
  volume       = {68},
  pages        = {101782},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tele.2022.101782},
  doi          = {10.1016/J.TELE.2022.101782},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tele/BarthJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MeursJTA22,
  author       = {Tom Meurs and
                  Marianne Junger and
                  Erik Tews and
                  Abhishta Abhishta},
  title        = {Ransomware: How attacker's effort, victim characteristics and context
                  influence ransom requested, payment and financial loss},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142138},
  doi          = {10.1109/ECRIME57793.2022.10142138},
  timestamp    = {Tue, 20 Jun 2023 14:12:59 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MeursJTA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpc/BarthIJHJ21,
  author       = {Susanne Barth and
                  Dan Ionita and
                  Menno D. T. de Jong and
                  Pieter H. Hartel and
                  Marianne Junger},
  title        = {Privacy Rating: {A} User-Centered Approach for Visualizing Data Handling
                  Practices of Online Services},
  journal      = {{IEEE} Trans. Prof. Commun.},
  volume       = {64},
  number       = {4},
  pages        = {354--373},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPC.2021.3110617},
  doi          = {10.1109/TPC.2021.3110617},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpc/BarthIJHJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BulleeJ20,
  author       = {Jan{-}Willem Bullee and
                  Marianne Junger},
  title        = {How effective are social engineering interventions? {A} meta-analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {801--830},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2019-0078},
  doi          = {10.1108/ICS-07-2019-0078},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BulleeJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AbhishtaHJNJ20,
  author       = {Abhishta Abhishta and
                  Wouter van Heeswijk and
                  Marianne Junger and
                  Lambert J. M. Nieuwenhuis and
                  Reinoud Joosten},
  title        = {Why would we get attacked? An analysis of attacker's aims behind DDoS
                  attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {3--22},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.003},
  doi          = {10.22667/JOWUA.2020.06.30.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AbhishtaHJNJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BarthHJM19,
  author       = {Susanne Barth and
                  Pieter H. Hartel and
                  Marianne Junger and
                  Lorena Montoya},
  title        = {Teaching Empirical Social-Science Research to Cybersecurity Students:
                  The Case of {\textbackslash}"Thinking Like a Thief{\textbackslash}"},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {8--16},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888781},
  doi          = {10.1109/MSEC.2018.2888781},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BarthHJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/BarthJJHR19,
  author       = {Susanne Barth and
                  Menno D. T. de Jong and
                  Marianne Junger and
                  Pieter H. Hartel and
                  Janina C. Roppelt},
  title        = {Putting the privacy paradox to the test: Online privacy and security
                  behaviors among users with technical knowledge, privacy awareness,
                  and financial resources},
  journal      = {Telematics Informatics},
  volume       = {41},
  pages        = {55--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tele.2019.03.003},
  doi          = {10.1016/J.TELE.2019.03.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tele/BarthJJHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/AbhishtaJJN19,
  author       = {Abhishta Abhishta and
                  Marianne Junger and
                  Reinoud Joosten and
                  Lambert J. M. Nieuwenhuis},
  editor       = {Igor V. Kotenko and
                  Costin Badica and
                  Vasily Desnitsky and
                  Didier El Baz and
                  Mirjana Ivanovic},
  title        = {A Note on Analysing the Attacker Aims Behind DDoS Attacks},
  booktitle    = {Intelligent Distributed Computing XIII, 13th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg,
                  Russia, 7-9 October, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {868},
  pages        = {255--265},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32258-8\_30},
  doi          = {10.1007/978-3-030-32258-8\_30},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/AbhishtaJJN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbhishtaJJN19,
  author       = {Abhishta Abhishta and
                  Marianne Junger and
                  Reinoud Joosten and
                  Lambert J. M. Nieuwenhuis},
  title        = {Victim Routine Influences the Number of DDoS Attacks: Evidence from
                  Dutch Educational Network},
  booktitle    = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San
                  Francisco, CA, USA, May 19-23, 2019},
  pages        = {242--247},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SPW.2019.00052},
  doi          = {10.1109/SPW.2019.00052},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AbhishtaJJN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BenensonJOS19,
  author       = {Zinaida Benenson and
                  Marianne Junger and
                  Daniela Oliveira and
                  Gianluca Stringhini},
  title        = {Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar
                  19302)},
  journal      = {Dagstuhl Reports},
  volume       = {9},
  number       = {7},
  pages        = {117--154},
  year         = {2019},
  url          = {https://doi.org/10.4230/DagRep.9.7.117},
  doi          = {10.4230/DAGREP.9.7.117},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BenensonJOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbsn/WachsWHWVJ18,
  author       = {Sebastian Wachs and
                  Helen C. Whittle and
                  Catherine Hamilton{-}Giachritsis and
                  Karsten D. Wolf and
                  Alexander T. Vazsonyi and
                  Marianne Junger},
  title        = {Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying:
                  Evidence from Four Countries},
  journal      = {Cyberpsychology Behav. Soc. Netw.},
  volume       = {21},
  number       = {2},
  pages        = {91--98},
  year         = {2018},
  url          = {https://doi.org/10.1089/cyber.2016.0733},
  doi          = {10.1089/CYBER.2016.0733},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbsn/WachsWHWVJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/JungerMO17,
  author       = {Marianne Junger and
                  Lorena Montoya and
                  F.{-}J. Overink},
  title        = {Priming and warnings are not effective to prevent social engineering
                  attacks},
  journal      = {Comput. Hum. Behav.},
  volume       = {66},
  pages        = {75--87},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.chb.2016.09.012},
  doi          = {10.1016/J.CHB.2016.09.012},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/JungerMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BulleeMJH17,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  title        = {Spear phishing in organisations explained},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {593--613},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0009},
  doi          = {10.1108/ICS-03-2017-0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/JungerMHH17,
  author       = {Marianne Junger and
                  Lorena Montoya and
                  Pieter H. Hartel and
                  Maliheh Heydari},
  title        = {Towards the normalization of cybercrime victimization: {A} routine
                  activities analysis of cybercrime in europe},
  booktitle    = {2017 International Conference On Cyber Situational Awareness, Data
                  Analytics And Assessment (Cyber SA), London, United Kingdom, June
                  19-20, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CyberSA.2017.8073391},
  doi          = {10.1109/CYBERSA.2017.8073391},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/JungerMHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/LastdragerGHJ17,
  author       = {Elmer Lastdrager and
                  In{\'{e}}s Carvajal Gallardo and
                  Pieter H. Hartel and
                  Marianne Junger},
  title        = {How Effective is Anti-Phishing Training for Children?},
  booktitle    = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017,
                  Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {229--239},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/lastdrager},
  timestamp    = {Wed, 19 Jul 2017 17:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/LastdragerGHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Telephone-based social engineering attacks: An experiment testing
                  the success and time decay of an intervention},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {107--114},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-107},
  doi          = {10.3233/978-1-61499-617-0-107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/BulleeMPJH15,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Wolter Pieters and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Regression Nodes: Extending Attack Trees with Data from Social Sciences},
  booktitle    = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2015, Verona, Italy, July 13, 2015},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/STAST.2015.11},
  doi          = {10.1109/STAST.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/BulleeMPJH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MontoyaJH13,
  author       = {Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  title        = {How "Digital" is Traditional Crime?},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {31--37},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.12},
  doi          = {10.1109/EISIC.2013.12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/MontoyaJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/LastdragerMHJ13,
  author       = {Elmer Lastdrager and
                  Lorena Montoya and
                  Pieter H. Hartel and
                  Marianne Junger},
  title        = {Applying the Lost-Letter Technique to Assess {IT} Risk Behaviour},
  booktitle    = {Third Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2013, New Orleans, LA, USA, June 29, 2013},
  pages        = {2--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/STAST.2013.15},
  doi          = {10.1109/STAST.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/LastdragerMHJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics