No photo of Hugo Jonker

Hugo Jonker

dr. ir.

20172019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Hugo Jonker is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 4 Conference article in proceeding
  • 3 Chapter
  • 1 Article

ÆGIS: Smart Shielding of Smart Contracts

Ferreira Torres, C., Baden, M., Norvill, R. & Jonker, H., 6 Nov 2019, CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY: Association for Computing Machinery (ACM), p. 2589-2591 3 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • Fingerprint Surface-Based Detection of Web Bot Detectors

    Jonker, H., Krumnow, B. & Vlot, G., 15 Sep 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Cham: Springer, p. 586-605 20 p. (Lecture Notes in Computer Science (LNCS), Vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications

    Ferreira Torres, C. & Jonker, H. L., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). 1 ed. Springer, Vol. 11099. p. 60-80 21 p. (Lecture Notes in Computer Science book series).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • Analysing Privacy Analyses

    Bella, G., Butin, D. & Jonker, H., 2017, Proceedings of the 1st Italian Conference on Cybersecurity: ITASEC17. Armando, A., Baldoni, R. & Focardi, R. (eds.). Aachen: CEUR-WS.org, p. 19-28 10 p. (CEUR Workshop Proceedings, Vol. 1816).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingAcademicpeer-review

    Open Access

    A Security Perspective on Publication Metrics

    Jonker, H. & Mauw, S., 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers. Stajano, F., Anderson, J., Christianson, B. & Matyáš, V. (eds.). Cham: Springer International Publishing AG, p. 186-200 15 p. (Security and Cryptology, Vol. 10476). (Lecture Notes in Computer Science; No. 10476).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingAcademicpeer-review

    Activities

    • 2 Invited talk
    • 1 Participating in OR organising an event

    Shepherd - an automatic and large-scale study of website login security

    Hugo Jonker (Invited speaker)
    18 Nov 2019

    Activity: Talk or presentation typesInvited talkAcademic

    Tijd voor digitale veiligheid

    Hugo Jonker (Organiser)
    9 May 201910 May 2019

    Activity: Participating in or organising an event typesParticipating in OR organising an eventAcademic

    AVG en UPLOADFILTERS: goed bestuur of censuur?

    Hugo Jonker (Speaker)
    21 May 2019

    Activity: Talk or presentation typesInvited talkAcademic

    Press / Media

    De hackbaarheid van een patiënt

    Hugo Jonker

    25/04/19

    1 Media contribution

    Press/Media: Expert CommentPopular

    How come there's no digital voting in the Netherlands?,

    Hugo Jonker

    15/03/17

    1 Media contribution

    Press/MediaPopular

    Waarom stemmen we nog met potlood en papier?

    Hugo Jonker

    8/03/17

    1 Media contribution

    Press/MediaPopular

    Epilepsy patient assaulted

    Hugo Jonker

    18/12/16

    1 Media contribution

    Press/MediaPopular