Jerry den Hartog
Orcid: 0009-0001-3846-9045Affiliations:
- Eindhoven University of Technology, Netherlands
According to our database1,
Jerry den Hartog
authored at least 77 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on venus.tue.nl
-
on orcid.org
On csauthors.net:
Bibliography
2024
Demonstration of new attacks on three healthcare network protocols in a lab environment.
J. Comput. Virol. Hacking Tech., June, 2024
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications.
IEEE Trans. Emerg. Top. Comput., 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024
A Methodology to Measure the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the Secure IT Systems, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2021
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021
2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
2019
CoRR, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the IEEE International Conference of Vehicular Electronics and Safety, 2019
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
Comput. Commun., 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems.
Proceedings of the Critical Information Infrastructures Security, 2018
2017
J. Inf. Secur. Appl., 2017
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Reading between the fields: practical, effective intrusion detection for industrial control systems.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Frontiers ICT, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
2011
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reason., 2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
J. Theor. Appl. Electron. Commer. Res., 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Principles on the Security of AES against First and Second-Order Differential Power Analysis.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure <i>S</i>-Box Implementation.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
2008
Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic.
Sci. Comput. Program., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
2007
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
2005
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version).
IACR Cryptol. ePrint Arch., 2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005
2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
2003
PINPAS: A Tool for Power Analysis of Smartcards.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
Int. J. Found. Comput. Sci., 2002
2000
Metric Semantics and Full Abstractness for Action Refinement and Probabilistic Choice.
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000
1999
Fundam. Informaticae, 1999
Proceedings of the Advances in Computing Science, 1999
1998
Proceedings of the First International Workshop on Probabilistic Methods in Verification, 1998
1997
Comparative Metric Semantics for Commit in OR-Parallel Logic Programming.
Proceedings of the Logic Programming, 1997