What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jerry den Hartog
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/eurosp
A Methodology to Measure the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal.
Martin Rosso
Luca Allodi
Emmanuele Zambon
Jerry den Hartog
2022
conf/sp
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.
Xi Qin
Martin Rosso
Alvaro A. Cárdenas
Sandro Etalle
Jerry den Hartog
Emmanuele Zambon
2022
conf/eurosp
Characterizing Building Automation System Attacks and Attackers.
Martino Tommasini
Martin Rosso
Emmanuele Zambon
Luca Allodi
Jerry den Hartog
2020
conf/sec
A Matter of Life and Death: Analyzing the Security of Healthcare Networks.
Guillaume Dupont
Daniel Ricardo dos Santos
Elisa Costante
Jerry den Hartog
Sandro Etalle
2017
journals/compsec
Formal analysis of XACML policies using SMT.
Fatih Turkmen
Jerry den Hartog
Silvio Ranise
Nicola Zannone
2017
journals/istr
A white-box anomaly-based framework for database leakage detection.
Elisa Costante
Jerry den Hartog
Milan Petkovic
Sandro Etalle
Mykola Pechenizkiy
2017
conf/ccs
From System Specification to Anomaly Detection (and back).
Davide Fauri
Daniel Ricardo dos Santos
Elisa Costante
Jerry den Hartog
Sandro Etalle
Stefano Tonetta
2016
conf/sp
A Hybrid Framework for Data Loss Prevention and Detection.
Elisa Costante
Davide Fauri
Sandro Etalle
Jerry den Hartog
Nicola Zannone
2016
conf/iciss
Towards Useful Anomaly Detection for Back Office Networks.
Ömer Yüksel
Jerry den Hartog
Sandro Etalle
2016
conf/iciss
Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
Jerry den Hartog
Nicola Zannone
2014
conf/ccs
POSTER: Analyzing Access Control Policies with SMT.
Fatih Turkmen
Jerry den Hartog
Nicola Zannone
2014
conf/esorics
Introducing Probabilities in Controller Strategies.
Jerry den Hartog
Ilaria Matteucci
2013
conf/ccs
TRIPLEX: verifying data minimisation in communication systems.
Meilof Veeningen
Mayla Brusò
Jerry den Hartog
Nicola Zannone
2012
conf/esorics
What Websites Know About You.
Elisa Costante
Jerry den Hartog
Milan Petkovic
2010
conf/sp
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.
Bruno P. S. Rocha
Sruthi Bandhakavi
Jerry den Hartog
William H. Winsborough
Sandro Etalle
2010
conf/acns
Principles on the Security of AES against First and Second-Order Differential Power Analysis.
Jiqiang Lu
Jing Pan
Jerry den Hartog
2010
conf/sacrypt
Improving DPA by Peak Distribution Analysis.
Jing Pan
Jasper G. J. van Woudenberg
Jerry den Hartog
Marc F. Witteman
2003
conf/sec
PINPAS: A Tool for Power Analysis of Smartcards.
Jerry den Hartog
Jan Verschuren
Erik P. de Vink
Jaap de Vos
W. Wiersma
Coauthors
Alvaro A. Cárdenas
(1)
Bruno P. S. Rocha
(1)
Daniel Ricardo dos Santos
(2)
Davide Fauri
(2)
Elisa Costante
(5)
Emmanuele Zambon
(3)
Erik P. de Vink
(1)
Fatih Turkmen
(2)
Guillaume Dupont
(1)
Ilaria Matteucci
(1)
Jaap de Vos
(1)
Jan Verschuren
(1)
Jasper G. J. van Woudenberg
(1)
Jerry den Hartog
(18)
Jing Pan
(2)
Jiqiang Lu
(1)
Luca Allodi
(2)
Marc F. Witteman
(1)
Martin Rosso
(3)
Martino Tommasini
(1)
Mayla Brusò
(1)
Meilof Veeningen
(1)
Milan Petkovic
(2)
Mykola Pechenizkiy
(1)
Nicola Zannone
(5)
Ömer Yüksel
(1)
Sandro Etalle
(7)
Silvio Ranise
(1)
Sruthi Bandhakavi
(1)
Stefano Tonetta
(1)
W. Wiersma
(1)
William H. Winsborough
(1)
Xi Qin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to