Follow
Elmer Lastdrager
Elmer Lastdrager
Research Engineer, SIDN Labs
Verified email at sidn.nl - Homepage
Title
Cited by
Cited by
Year
Achieving a consensual definition of phishing based on a systematic review of the literature
EEH Lastdrager
Crime Science 3, 1-10, 2014
1672014
How effective is anti-phishing training for children?
E Lastdrager, IC Gallardo, P Hartel, M Junger
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 229-239, 2017
1102017
Protecting Home Networks From Insecure IoT Devices
E Lastdrager, C Hesselman, J Jansen, M Davids
IEEE NOMS, 2020
142020
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts
A Noroozian, ET Rodriguez, E Lastdrager, T Kasama, M van Eeten, ...
IEEE Euro S&P, 2021
122021
From Fishing to Phishing
EEH Lastdrager
University of Twente, 2018
72018
Applying the Lost-Letter Technique to Assess IT Risk Behaviour
EEH Lastdrager, AL Montoya Morales, PH Hartel, M Junger
Socio-Technical Aspects in Security and Trust (STAST), 2013 Third Workshop …, 2013
52013
Securing Patient Information in Medical Databases
E Lastdrager
University of Twente, 2011
52011
Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)
JM Ceron, C Scholten, A Pras, E Lastdrager, J Santanna
arXiv preprint arXiv:2011.01685, 2020
42020
Apate: Anti-Phishing Analysing and Triaging Environment (Poster)
EEH Lastdrager, PH Hartel, M Junger
IEEE Computer Society, 2015
2*2015
Consistency of Network Traffic Repositories: An Overview
E Lastdrager, A Pras
IFIP International Conference on Autonomous Infrastructure, Management and …, 2009
22009
Consistency analysis of network traffic repositories
E Lastdrager, A Pras
Meeting of the European Network of Universities and Companies in Information …, 2009
12009
Repeat victimization in cyber space
M Junger, S Wachs, C Broekman, EEH Lastdrager
Congres Cybercrime: Understanding patterns and developments in cybercrime …, 2014
2014
Stealing “lost” USB keys
E Lastdrager, L Montoya, P Hartel, M Junger
2013
4.4 Theme 4: Prevention, Detection, Response and Recovery
G Stringhini, F Gassmann, M Junger, E Lastdrager, M Sirivianos, S Wachs
Cybersafety Threats–from Deception to Aggression, 152, 0
The system can't perform the operation now. Try again later.
Articles 1–14