Jerry den Hartog

Orcid: 0009-0001-3846-9045

Affiliations:
  • Eindhoven University of Technology, Netherlands


According to our database1, Jerry den Hartog authored at least 77 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Demonstration of new attacks on three healthcare network protocols in a lab environment.
J. Comput. Virol. Hacking Tech., June, 2024

Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications.
IEEE Trans. Emerg. Top. Comput., 2024

WiP: Enhancing the Comprehension of XACML Policies.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

A Methodology to Measure the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Using DNS Patterns for Automated Cyber Threat Attribution.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Actionable Cyber Threat Intelligence for Automated Incident Response.
Proceedings of the Secure IT Systems, 2022

Characterizing Building Automation System Attacks and Attackers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Similarity-Based Clustering For IoT Device Classification.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021

2020
A Matter of Life and Death: Analyzing the Security of Healthcare Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

2019
Network intrusion detection systems for in-vehicle network - Technical report.
CoRR, 2019

Using Provenance for Secure Data Fusion in Cooperative Systems.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

A Survey of Network Intrusion Detection Systems for Controller Area Network.
Proceedings of the IEEE International Conference of Vehicular Electronics and Safety, 2019

Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN.
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019

Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Security and privacy for innovative automotive applications: A survey.
Comput. Commun., 2018

Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
A white-box anomaly-based framework for database leakage detection.
J. Inf. Secur. Appl., 2017

Formal analysis of XACML policies using SMT.
Comput. Secur., 2017

Encryption in ICS networks: A blessing or a curse?
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

From System Specification to Anomaly Detection (and back).
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
A Hybrid Framework for Data Loss Prevention and Detection.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Reading between the fields: practical, effective intrusion detection for industrial control systems.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Towards Useful Anomaly Detection for Back Office Networks.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
Proceedings of the Information Systems Security - 12th International Conference, 2016

Towards Creating Believable Decoy Project Folders for Detecting Data Theft.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Data Governance and Transparency for Collaborative Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A Policy Framework for Data Fusion and Derived Data Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

An Authorization Service for Collaborative Situation Awareness.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
SAFAX - An Extensible Authorization Service for Cloud Environments.
Frontiers ICT, 2015

Understanding Perceived Trust to Reduce Regret.
Comput. Intell., 2015

Analysis of XACML Policies with SMT.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Cross-Domain Attribute Conversion for Authentication and Authorization.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Integration of Data-Minimising Authentication into Authorisation Systems.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Introducing Probabilities in Controller Strategies.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Hunting the Unknown - White-Box Database Leakage Detection.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

CollAC: Collaborative access control.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

POSTER: Analyzing Access Control Policies with SMT.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Database Anomalous Activities - Detection and Quantification.
Proceedings of the SECRYPT 2013, 2013

TRIPLEX: verifying data minimisation in communication systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A machine learning solution to assess privacy policy completeness: (short paper).
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Linking Unlinkability.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

What Websites Know About You.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reason., 2011

On-line trust perception: What really matters.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
A Flexible Architecture for Privacy-Aware Trust Management.
J. Theor. Appl. Electron. Commer. Res., 2010

Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Improving DPA by Peak Distribution Analysis.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Formal Verification of Privacy for RFID Systems.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Principles on the Security of AES against First and Second-Order Differential Power Analysis.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure <i>S</i>-Box Implementation.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

2008
Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic.
Sci. Comput. Program., 2008

An Operation-Based Metric for CPA Resistance.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Know What You Trust.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

2007
Audit-based compliance control.
Int. J. Inf. Sec., 2007

Trust and punishment.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

Privacy Policies.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version).
IACR Cryptol. ePrint Arch., 2005

Nonmonotonic Trust Management for P2P Applications.
Proceedings of the First International Workshop on Security and Trust Management, 2005

An Audit Logic for Accountability.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Functional Principles of Registry-based Service Discovery.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Link-layer jamming attacks on S-MAC.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

2004
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

A Logic for Auditing Accountability in Decentralized Systems.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

2003
PINPAS: A Tool for Power Analysis of Smartcards.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Verifying Probabilistic Programs Using a Hoare Like Logic.
Int. J. Found. Comput. Sci., 2002

2000
Metric Semantics and Full Abstractness for Action Refinement and Probabilistic Choice.
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000

1999
Full Abstractness of a Metric Semantics for Action Refinement.
Fundam. Informaticae, 1999

Verifying Probabilistic Programs Using a Hoare like Logic.
Proceedings of the Advances in Computing Science, 1999

1998
Mixing Up Nondeterminism and Probability: a preliminary report.
Proceedings of the First International Workshop on Probabilistic Methods in Verification, 1998

1997
Comparative Metric Semantics for Commit in OR-Parallel Logic Programming.
Proceedings of the Logic Programming, 1997


  Loading...