Prof.dr. P.H. (Pieter) Hartel

profile

Biography

Prof Dr Pieter Hartel is head of the Cyber Security research group of the faculty of Electrical Engineering, Mathematics and Computer Science at Delft University of Technology. He also holds part time professorial positions at the    University of Twente and at   Singapore University of Technology and Design. He has 24 years of research and teaching experience in Cyber Security in the Netherlands, the UK, the US, Malaysia, and Singapore.

Teaching

He is the coordinator of the 4TU Cyber Security Master Specialisation where he teaches a course Cyber crime science with Prof Marianne Junger from the University of Twente and the Capstone courses on SocialBusiness, and Entrepreneurial skills in cyber security with Dr Victor Scholten and Dr Hanieh Khodaei from TU Delft.

Key publications

  • Distinguished Paper Award Lastdrager, E. and Carvajal Gallardo, I. and Hartel, P.H. and Junger, M. (2017) How Effective is Anti-Phishing Training for Children?  In: 13th Symposium on Usable Privacy and Security (SOUPS), 12–14 July 2017, pp. 229-240, USENIX. www.usenix.org/conference/soups2017/technical-sessions/presentation/lastdrager 
  • Bortolameotti, R. and Peter, A. and Everts, M. H. and Jonker, W.  and Hartel, P. H. (2016) Reliably determining data leakage in the presence of strong attackers In: 32nd Annual Conference on Computer Security Applications (ACSAC), 5-8 Dec 2016, pp. 484-495, ACM. DOI:10.1145/2991079.2991095
  • Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) The persuasion and security awareness experiment: reducing the success of social engineering attacks. J. of Experimental Criminology, 11 (1). pp. 97-115. DOI:10.1007/s11292-014-9222-7
  • Hadžiosmanović, D. and Sommer, R. and Zambon, Emmanuele and Hartel, P.H. (2014) Through the eye of the PLC: semantic security monitoring for industrial processes. In: Annual Computer Security Applications Conference (ACSAC), 8-12 Dec 2014, pp. 126-135. ACM. DOI:10.1145/2664243.2664277 
  • Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. DOI:10.1145/2636328

Research

His research interests include the human factor in cyber security, cyber crime, crypto markets, and block chain technology. He was the principal investigator of the recently completed 13.5M Euro EU  TREsPASS project on socio technical cyber security risk management.

Editorial board member of Crime Science - a SpringerOpen journal
Publications:   Google Scholar 
Social Networks:  LinkedIn  Twitter

publications
On the anatomy of social engineering attacks

peer reviewed : Y

Journal of Investigative Psychology and Offender Profiling (2018) 26 pages , p. 20-45

authors

  • Jan Willem Hendrik Bullée
  • Lorena Montoya
  • Wolter Pieters
  • Marianne Junger
  • Pieter Hartel
Physical Location of Smart Key Activators

peer reviewed : Y

Journal of Corporate Real Estate (2018)

authors

  • Jan-Willem Bullee
  • Lorena Montoya Morales
  • Marianne Junger
  • Pieter Hartel
How Effective is Anti-Phishing Training for Children?

peer reviewed : Y

Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017 (2017) 11 pages , p. 229-239

authors

  • Elmer Lastdrager
  • Inés Carvajal Gallardo
  • Pieter Hartel
  • Marianne Junger
Spear Phishing in Organisations Explained

peer reviewed : Y

Information and Computer Security (2017) 21 pages , p. 593-613

authors

  • Jan Willem Bullee
  • Lorena Montoya
  • Marianne Junger
  • Pieter Hartel
Towards the normalization of cybercrime victimization

peer reviewed : Y

International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2017 (2017) 8 pages , p. 1-8

authors

  • Marianne Junger
  • Lorena Montoya
  • Pieter Hartel
  • Maliheh Heydari
Reliably determining data leakage in the presence of strong attackers

peer reviewed : Y

Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (2016) 12 pages , p. 484-495

authors

  • R. Bortolameotti
  • A. Peter
  • M. H. Everts
  • Willem Jonker
  • P. H. Hartel
Publicly Verifiable Private Aggregation of Time-Series Data

peer reviewed : Y

10th International Conference on Availability, Reliability and Security, ARES 2015 (2015) 10 pages , p. 50-59

authors

  • B. G. Bakondi
  • A. Peter
  • M. H. Everts
  • P. H. Hartel
  • Willem Jonker
Regression nodes: Extending attack trees with data from social sciences

peer reviewed : Y

Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015) (2015) 7 pages , p. 17-23

authors

  • JWH Bullee
  • AL Montoya Morales
  • W Pieters
  • M. Junger
  • P.H. Hartel

editors

  • G Bella
  • G Lenzine
The persuasion and security awareness experiment: reducing the success of social engineering attacks

peer reviewed : Y

Journal of Experimental Criminology (2015) 19 pages , p. 97-115

authors

  • JWH Bullee
  • L. Montoya
  • W Pieters
  • M. Junger
  • P.H. Hartel
Through the eye of the PLC: semantic security monitoring for industrial processes

peer reviewed : Y

ACSAC'14 Proceedings of the 30th Annual Computer Security Applications Conference, New Orleans, LA, USA (2014) 10 pages , p. 126-135

authors

  • D. Hadziosmanovic
  • R. Sommer
  • E. Zambon
  • P. H. Hartel
subjects
2018 - Capstone Cyber Security
2017 - Capstone Cyber Security
2017 - Capstone Cyber Security
ancillary activities
-Wet medew. Niet-TUD - Universiteit Twente

2017-01-15 - 2019-01-15

Onderwijs