


default search action
Jerry den Hartog
Person information
- affiliation: Eindhoven University of Technology, Netherlands
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Eduardo Alvarenga, Jan R. Brands, Peter Doliwa, Jerry den Hartog, Erik Kraft, Marcel Medwed, Ventzislav Nikov, Joost Renes, Martin Rosso, Tobias Schneider
, Nikita Veshchikov:
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications. IEEE Trans. Emerg. Top. Comput. 12(2): 583-600 (2024) - [j12]Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Demonstration of new attacks on three healthcare network protocols in a lab environment. J. Comput. Virol. Hacking Tech. 20(2): 301-314 (2024) - [c61]Cristoffer Leite
, Jerry den Hartog
, Daniel Ricardo dos Santos
:
Using DNS Patterns for Automated Cyber Threat Attribution. ARES 2024: 196:1-196:11 - [c60]Martin Rosso, Luca Allodi, Emmanuele Zambon, Jerry den Hartog:
A Methodology to Measure the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal. EuroS&P Workshops 2024: 112-129 - [c59]Neil Ortiz Silva
, Martin Rosso, Emmanuele Zambon
, Jerry den Hartog
, Alvaro A. Cárdenas
:
From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures. PAM (1) 2024: 3-31 - [c58]Gelareh Hasel Mehri
, Tien-Dung Le
, Bram C. M. Cappers
, Jerry den Hartog
, Nicola Zannone
:
WiP: Enhancing the Comprehension of XACML Policies. SACMAT 2024 - 2023
- [c57]Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos, Elisa Costante:
Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents. IEEE Big Data 2023: 2999-3008 - [c56]Cristoffer Leite
, Jerry den Hartog
, Paul Koster
:
A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control. SACMAT 2023: 7-18 - 2022
- [c55]Martino Tommasini, Martin Rosso, Emmanuele Zambon, Luca Allodi, Jerry den Hartog:
Characterizing Building Automation System Attacks and Attackers. EuroS&P Workshops 2022: 139-149 - [c54]Cristoffer Leite
, Jerry den Hartog, Daniel Ricardo dos Santos, Elisa Costante:
Actionable Cyber Threat Intelligence for Automated Incident Response. NordSec 2022: 368-385 - [c53]Xi Qin, Martin Rosso, Alvaro A. Cárdenas, Sandro Etalle, Jerry den Hartog, Emmanuele Zambon:
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network. SP (Workshops) 2022: 243-250 - 2021
- [c52]Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Similarity-Based Clustering For IoT Device Classification. COINS 2021: 1-7 - 2020
- [c51]Guillaume Dupont, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
A Matter of Life and Death: Analyzing the Security of Healthcare Networks. SEC 2020: 355-369
2010 – 2019
- 2019
- [c50]Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. DIMVA 2019: 461-481 - [c49]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis
:
Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN. ICCVE 2019: 1-6 - [c48]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis
:
A Survey of Network Intrusion Detection Systems for Controller Area Network. ICVES 2019: 1-6 - [c47]Clara Bertolissi, Jerry den Hartog, Nicola Zannone
:
Using Provenance for Secure Data Fusion in Cooperative Systems. SACMAT 2019: 185-194 - [i4]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis:
Network intrusion detection systems for in-vehicle network - Technical report. CoRR abs/1905.11587 (2019) - 2018
- [j11]Van Huynh Le, Jerry den Hartog, Nicola Zannone
:
Security and privacy for innovative automotive applications: A survey. Comput. Commun. 132: 17-41 (2018) - [c46]Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems. CRITIS 2018: 113-125 - [c45]Van Huynh Le, Jerry den Hartog, Nicola Zannone:
Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks. ICETE (1) 2018: 647-657 - 2017
- [j10]Fatih Turkmen
, Jerry den Hartog, Silvio Ranise
, Nicola Zannone
:
Formal analysis of XACML policies using SMT. Comput. Secur. 66: 185-203 (2017) - [j9]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy
:
A white-box anomaly-based framework for database leakage detection. J. Inf. Secur. Appl. 32: 27-46 (2017) - [c44]Davide Fauri, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle, Stefano Tonetta:
From System Specification to Anomaly Detection (and back). CPS-SPC@CCS 2017: 13-24 - [c43]Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle:
Encryption in ICS networks: A blessing or a curse? SmartGridComm 2017: 289-294 - 2016
- [c42]Jerry den Hartog, Nicola Zannone
:
A Policy Framework for Data Fusion and Derived Data Control. ABAC@CODASPY 2016: 47-57 - [c41]Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone
:
An Authorization Service for Collaborative Situation Awareness. CODASPY 2016: 136-138 - [c40]Stefan Thaler, Jerry den Hartog, Milan Petkovic:
Towards Creating Believable Decoy Project Folders for Detecting Data Theft. DBSec 2016: 161-169 - [c39]Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone
:
Data Governance and Transparency for Collaborative Systems. DBSec 2016: 199-216 - [c38]Jerry den Hartog, Nicola Zannone
:
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? ICISS 2016: 109-130 - [c37]Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Towards Useful Anomaly Detection for Back Office Networks. ICISS 2016: 509-520 - [c36]Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Reading between the fields: practical, effective intrusion detection for industrial control systems. SAC 2016: 2063-2070 - [c35]Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone
:
A Hybrid Framework for Data Loss Prevention and Detection. IEEE Symposium on Security and Privacy Workshops 2016: 324-333 - 2015
- [j8]Elisa Costante, Jerry den Hartog, Milan Petkovic:
Understanding Perceived Trust to Reduce Regret. Comput. Intell. 31(2): 327-347 (2015) - [j7]Samuel Paul Kaluvuri, Alexandru Ionut Egner, Jerry den Hartog, Nicola Zannone
:
SAFAX - An Extensible Authorization Service for Cloud Environments. Frontiers ICT 2: 9 (2015) - [c34]Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens
:
Cross-Domain Attribute Conversion for Authentication and Authorization. ARES 2015: 652-659 - [c33]Fatih Turkmen
, Jerry den Hartog, Silvio Ranise
, Nicola Zannone
:
Analysis of XACML Policies with SMT. POST 2015: 115-134 - 2014
- [c32]Fatih Turkmen
, Jerry den Hartog, Nicola Zannone
:
POSTER: Analyzing Access Control Policies with SMT. CCS 2014: 1508-1510 - [c31]Stan Damen, Jerry den Hartog, Nicola Zannone
:
CollAC: Collaborative access control. CTS 2014: 142-149 - [c30]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy
:
Hunting the Unknown - White-Box Database Leakage Detection. DBSec 2014: 243-259 - [c29]Jerry den Hartog, Ilaria Matteucci
:
Introducing Probabilities in Controller Strategies. DPM/SETOP/QASA 2014: 233-249 - [c28]Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog:
Integration of Data-Minimising Authentication into Authorisation Systems. TRUST 2014: 179-187 - 2013
- [c27]Meilof Veeningen, Mayla Brusò, Jerry den Hartog, Nicola Zannone
:
TRIPLEX: verifying data minimisation in communication systems. CCS 2013: 1415-1418 - [c26]Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:
Database Anomalous Activities - Detection and Quantification. SECRYPT 2013: 603-608 - 2012
- [c25]Elisa Costante, Jerry den Hartog, Milan Petkovic:
What Websites Know About You. DPM/SETOP 2012: 146-159 - [c24]Mayla Brusò, Konstantinos Chatzikokolakis, Sandro Etalle, Jerry den Hartog:
Linking Unlinkability. TGC 2012: 129-144 - [c23]Elisa Costante, Yuanhao Sun, Milan Petkovic, Jerry den Hartog:
A machine learning solution to assess privacy policy completeness: (short paper). WPES 2012: 91-96 - 2011
- [j6]Lujo Bauer, Sandro Etalle, Jerry den Hartog, Luca Viganò:
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning". J. Autom. Reason. 46(3-4): 223-224 (2011) - [c22]David W. Chadwick
, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff:
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. IEEE CLOUD 2011: 752-753 - [c21]Elisa Costante, Jerry den Hartog, Milan Petkovic:
On-line trust perception: What really matters. STAST 2011: 52-59 - 2010
- [j5]Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone
:
A Flexible Architecture for Privacy-Aware Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2): 77-96 (2010) - [c20]Jiqiang Lu, Jing Pan, Jerry den Hartog:
Principles on the Security of AES against First and Second-Order Differential Power Analysis. ACNS 2010: 168-185 - [c19]Mayla Brusò, Konstantinos Chatzikokolakis, Jerry den Hartog:
Formal Verification of Privacy for RFID Systems. CSF 2010: 75-88 - [c18]Jing Pan, Jasper G. J. van Woudenberg, Jerry den Hartog, Marc F. Witteman:
Improving DPA by Peak Distribution Analysis. Selected Areas in Cryptography 2010: 241-261 - [c17]Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle:
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. IEEE Symposium on Security and Privacy 2010: 93-108
2000 – 2009
- 2009
- [c16]Jing Pan, J. I. den Hartog, Jiqiang Lu:
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation. WISA 2009: 178-192 - 2008
- [j4]Jerry den Hartog:
Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. Sci. Comput. Program. 74(1-2): 52-63 (2008) - [c15]Fred Spiessens, Jerry den Hartog, Sandro Etalle:
Know What You Trust. Formal Aspects in Security and Trust 2008: 129-142 - [c14]Jing Pan, J. I. den Hartog, Erik P. de Vink:
An Operation-Based Metric for CPA Resistance. SEC 2008: 429-443 - 2007
- [j3]J. G. Cederquist
, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007) - [c13]Sandro Etalle, Jerry den Hartog, Stephen Marsh:
Trust and punishment. Autonomics 2007: 5 - [p1]Marnix Dekker, Sandro Etalle, Jerry den Hartog:
Privacy Policies. Security, Privacy, and Trust in Modern Data Management 2007: 383-397 - 2006
- [c12]Ricardo Corin, Jerry den Hartog:
A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. ICALP (2) 2006: 252-263 - 2005
- [c11]Yee Wei Law, Pieter H. Hartel, Jerry den Hartog, Paul J. M. Havinga:
Link-layer jamming attacks on S-MAC. EWSN 2005: 217-225 - [c10]Vasughi Sundramoorthy, Pieter H. Hartel
, Jerry den Hartog, Hans Scholten, C. Tan:
Functional Principles of Registry-based Service Discovery. LCN 2005: 209-217 - [c9]J. G. Cederquist
, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. POLICY 2005: 34-43 - [c8]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel
, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. STM 2005: 113-130 - [i3]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. CoRR abs/cs/0502091 (2005) - [i2]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. CoRR abs/cs/0510061 (2005) - [i1]Ricardo Corin, Jerry den Hartog:
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version). IACR Cryptol. ePrint Arch. 2005: 467 (2005) - 2004
- [c7]Jerry den Hartog, Erik P. de Vink:
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. Formal Aspects in Security and Trust 2004: 85-98 - [c6]Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu:
A Logic for Auditing Accountability in Decentralized Systems. Formal Aspects in Security and Trust 2004: 187-201 - 2003
- [c5]Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, W. Wiersma:
PINPAS: A Tool for Power Analysis of Smartcards. SEC 2003: 453-457 - 2002
- [j2]Jerry den Hartog, Erik P. de Vink:
Verifying Probabilistic Programs Using a Hoare Like Logic. Int. J. Found. Comput. Sci. 13(3): 315-340 (2002) - 2000
- [c4]Jerry den Hartog, Erik P. de Vink, J. W. de Bakker:
Metric Semantics and Full Abstractness for Action Refinement and Probabilistic Choice. MFCSIT 2000: 72-99
1990 – 1999
- 1999
- [j1]Jerry den Hartog, Erik P. de Vink, J. W. de Bakker:
Full Abstractness of a Metric Semantics for Action Refinement. Fundam. Informaticae 40(4): 335-382 (1999) - [c3]Jerry den Hartog:
Verifying Probabilistic Programs Using a Hoare like Logic. ASIAN 1999: 113-125 - 1998
- [c2]Jerry den Hartog, Erik P. de Vink:
Mixing Up Nondeterminism and Probability: a preliminary report. PROBMIV 1998: 88-110 - 1997
- [c1]Eneia Todoran, Jerry den Hartog, Erik P. de Vink:
Comparative Metric Semantics for Commit in OR-Parallel Logic Programming. ILPS 1997: 101-115
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint