Searched for: author%3A%22Booij%2C+T.M.%22
(1 - 4 of 4)
document
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, E. (author), Moustafa, N. (author), Hartog, F.T.H.D. (author)
article 2022
document
Bijmans, H.L.J. (author), Booij, T.M. (author), Schwedersky1, A. (author), Nedgabat, A.B. (author), van Wegberg, R. (author)
Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking victims into disclosing these on fraudulent websites. But, how do these kits impact the phishing landscape? And, how often are they used? We leverage the use...
conference paper 2021
document
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, H.B. (author), Moustafa, N. (author), den Hartor, F.T.H. (author)
The Internet of Things (IoT) is reshaping our connected world due to the proliferation of the availability of small devices connected to the Internet and their communication technologies. Therefore, the study and research towards intrusion detection in the IoT domain has a lot of significance. Network intrusion datasets are fundamental for this...
article 2021
document
Booij, T.M. (author), Verburgh, T. (author), Falconieri, F. (author), van Wegberg, R.S. (author)
Dark net markets are a competitive environment. As these anonymous markets enable criminals to trade illicit goods or services, this causes vendors to operate under pseudonyms, rather than real-world identities. The constant battle between market admins and law enforcement makes the typical lifespan of a market two years. When a market...
conference paper 2021
Searched for: author%3A%22Booij%2C+T.M.%22
(1 - 4 of 4)