- document
- Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, E. (author), Moustafa, N. (author), Hartog, F.T.H.D. (author) article 2022
- document
-
Bijmans, H.L.J. (author), Booij, T.M. (author), Schwedersky1, A. (author), Nedgabat, A.B. (author), van Wegberg, R. (author)Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking victims into disclosing these on fraudulent websites. But, how do these kits impact the phishing landscape? And, how often are they used? We leverage the use...conference paper 2021
- document
-
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, H.B. (author), Moustafa, N. (author), den Hartor, F.T.H. (author)The Internet of Things (IoT) is reshaping our connected world due to the proliferation of the availability of small devices connected to the Internet and their communication technologies. Therefore, the study and research towards intrusion detection in the IoT domain has a lot of significance. Network intrusion datasets are fundamental for this...article 2021
- document
-
Booij, T.M. (author), Verburgh, T. (author), Falconieri, F. (author), van Wegberg, R.S. (author)Dark net markets are a competitive environment. As these anonymous markets enable criminals to trade illicit goods or services, this causes vendors to operate under pseudonyms, rather than real-world identities. The constant battle between market admins and law enforcement makes the typical lifespan of a market two years. When a market...conference paper 2021