Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Marianne Junger
@article{DBLP:journals/compsec/MeursCCJA24, author = {Tom Meurs and Edward J. Cartwright and Anna Cartwright and Marianne Junger and Abhishta Abhishta}, title = {Deception in double extortion ransomware attacks: An analysis of profitability and credibility}, journal = {Comput. Secur.}, volume = {138}, pages = {103670}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103670}, doi = {10.1016/J.COSE.2023.103670}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MeursCCJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HoheiselCSJ23, author = {Raphael Hoheisel and Guido van Capelleveen and Dipti K. Sarmah and Marianne Junger}, title = {The development of phishing during the {COVID-19} pandemic: An analysis of over 1100 targeted domains}, journal = {Comput. Secur.}, volume = {128}, pages = {103158}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103158}, doi = {10.1016/J.COSE.2023.103158}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HoheiselCSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MeursCCJHTA23, author = {Tom Meurs and Edward J. Cartwright and Anna Cartwright and Marianne Junger and Raphael Hoheisel and Erik Tews and Abhishta Abhishta}, title = {Ransomware Economics: {A} Two-Step Approach To Model Ransom Paid}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023}, pages = {1--13}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/eCrime61234.2023.10485506}, doi = {10.1109/ECRIME61234.2023.10485506}, timestamp = {Thu, 18 Apr 2024 20:24:51 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MeursCCJHTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/BarthJJ22, author = {Susanne Barth and Menno D. T. de Jong and Marianne Junger}, title = {Lost in privacy? Online privacy from a cybersecurity expert perspective}, journal = {Telematics Informatics}, volume = {68}, pages = {101782}, year = {2022}, url = {https://doi.org/10.1016/j.tele.2022.101782}, doi = {10.1016/J.TELE.2022.101782}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tele/BarthJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MeursJTA22, author = {Tom Meurs and Marianne Junger and Erik Tews and Abhishta Abhishta}, title = {Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--13}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142138}, doi = {10.1109/ECRIME57793.2022.10142138}, timestamp = {Tue, 20 Jun 2023 14:12:59 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MeursJTA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpc/BarthIJHJ21, author = {Susanne Barth and Dan Ionita and Menno D. T. de Jong and Pieter H. Hartel and Marianne Junger}, title = {Privacy Rating: {A} User-Centered Approach for Visualizing Data Handling Practices of Online Services}, journal = {{IEEE} Trans. Prof. Commun.}, volume = {64}, number = {4}, pages = {354--373}, year = {2021}, url = {https://doi.org/10.1109/TPC.2021.3110617}, doi = {10.1109/TPC.2021.3110617}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpc/BarthIJHJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BulleeJ20, author = {Jan{-}Willem Bullee and Marianne Junger}, title = {How effective are social engineering interventions? {A} meta-analysis}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {801--830}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2019-0078}, doi = {10.1108/ICS-07-2019-0078}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BulleeJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AbhishtaHJNJ20, author = {Abhishta Abhishta and Wouter van Heeswijk and Marianne Junger and Lambert J. M. Nieuwenhuis and Reinoud Joosten}, title = {Why would we get attacked? An analysis of attacker's aims behind DDoS attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {3--22}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.003}, doi = {10.22667/JOWUA.2020.06.30.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AbhishtaHJNJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BarthHJM19, author = {Susanne Barth and Pieter H. Hartel and Marianne Junger and Lorena Montoya}, title = {Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of {\textbackslash}"Thinking Like a Thief{\textbackslash}"}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {8--16}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888781}, doi = {10.1109/MSEC.2018.2888781}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BarthHJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/BarthJJHR19, author = {Susanne Barth and Menno D. T. de Jong and Marianne Junger and Pieter H. Hartel and Janina C. Roppelt}, title = {Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources}, journal = {Telematics Informatics}, volume = {41}, pages = {55--69}, year = {2019}, url = {https://doi.org/10.1016/j.tele.2019.03.003}, doi = {10.1016/J.TELE.2019.03.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tele/BarthJJHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/AbhishtaJJN19, author = {Abhishta Abhishta and Marianne Junger and Reinoud Joosten and Lambert J. M. Nieuwenhuis}, editor = {Igor V. Kotenko and Costin Badica and Vasily Desnitsky and Didier El Baz and Mirjana Ivanovic}, title = {A Note on Analysing the Attacker Aims Behind DDoS Attacks}, booktitle = {Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg, Russia, 7-9 October, 2019}, series = {Studies in Computational Intelligence}, volume = {868}, pages = {255--265}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32258-8\_30}, doi = {10.1007/978-3-030-32258-8\_30}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/AbhishtaJJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AbhishtaJJN19, author = {Abhishta Abhishta and Marianne Junger and Reinoud Joosten and Lambert J. M. Nieuwenhuis}, title = {Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network}, booktitle = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {242--247}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SPW.2019.00052}, doi = {10.1109/SPW.2019.00052}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AbhishtaJJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BenensonJOS19, author = {Zinaida Benenson and Marianne Junger and Daniela Oliveira and Gianluca Stringhini}, title = {Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302)}, journal = {Dagstuhl Reports}, volume = {9}, number = {7}, pages = {117--154}, year = {2019}, url = {https://doi.org/10.4230/DagRep.9.7.117}, doi = {10.4230/DAGREP.9.7.117}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BenensonJOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbsn/WachsWHWVJ18, author = {Sebastian Wachs and Helen C. Whittle and Catherine Hamilton{-}Giachritsis and Karsten D. Wolf and Alexander T. Vazsonyi and Marianne Junger}, title = {Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries}, journal = {Cyberpsychology Behav. Soc. Netw.}, volume = {21}, number = {2}, pages = {91--98}, year = {2018}, url = {https://doi.org/10.1089/cyber.2016.0733}, doi = {10.1089/CYBER.2016.0733}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbsn/WachsWHWVJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/JungerMO17, author = {Marianne Junger and Lorena Montoya and F.{-}J. Overink}, title = {Priming and warnings are not effective to prevent social engineering attacks}, journal = {Comput. Hum. Behav.}, volume = {66}, pages = {75--87}, year = {2017}, url = {https://doi.org/10.1016/j.chb.2016.09.012}, doi = {10.1016/J.CHB.2016.09.012}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/JungerMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BulleeMJH17, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, title = {Spear phishing in organisations explained}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {593--613}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0009}, doi = {10.1108/ICS-03-2017-0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/JungerMHH17, author = {Marianne Junger and Lorena Montoya and Pieter H. Hartel and Maliheh Heydari}, title = {Towards the normalization of cybercrime victimization: {A} routine activities analysis of cybercrime in europe}, booktitle = {2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CyberSA.2017.8073391}, doi = {10.1109/CYBERSA.2017.8073391}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/JungerMHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/LastdragerGHJ17, author = {Elmer Lastdrager and In{\'{e}}s Carvajal Gallardo and Pieter H. Hartel and Marianne Junger}, title = {How Effective is Anti-Phishing Training for Children?}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {229--239}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/lastdrager}, timestamp = {Wed, 19 Jul 2017 17:13:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/LastdragerGHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {107--114}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-107}, doi = {10.3233/978-1-61499-617-0-107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/BulleeMPJH15, author = {Jan{-}Willem Bullee and Lorena Montoya and Wolter Pieters and Marianne Junger and Pieter H. Hartel}, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {Regression Nodes: Extending Attack Trees with Data from Social Sciences}, booktitle = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2015, Verona, Italy, July 13, 2015}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/STAST.2015.11}, doi = {10.1109/STAST.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/BulleeMPJH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MontoyaJH13, author = {Lorena Montoya and Marianne Junger and Pieter H. Hartel}, title = {How "Digital" is Traditional Crime?}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {31--37}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.12}, doi = {10.1109/EISIC.2013.12}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/MontoyaJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/LastdragerMHJ13, author = {Elmer Lastdrager and Lorena Montoya and Pieter H. Hartel and Marianne Junger}, title = {Applying the Lost-Letter Technique to Assess {IT} Risk Behaviour}, booktitle = {Third Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2013, New Orleans, LA, USA, June 29, 2013}, pages = {2--9}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/STAST.2013.15}, doi = {10.1109/STAST.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/LastdragerMHJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.