| The persuasion and security awareness experiment: reducing the success of social engineering attacks JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel Journal of experimental criminology 11 (1), 97-115, 2015 | 167 | 2015 |
| Spear phishing in organisations explained JW Bullee, L Montoya, M Junger, P Hartel Information & Computer Security 25 (5), 593-613, 2017 | 116 | 2017 |
| On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018 | 109 | 2018 |
| How effective are social engineering interventions? A meta-analysis JW Bullee, M Junger Information and Computer Security 28 (5), 801-830, 2020 | 62 | 2020 |
| Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention JW Bullée, L Montoya, M Junger, PH Hartel Singapore Cyber Security R&D Conference, SG-CRC 2016, 107-114, 2016 | 44 | 2016 |
| Social engineering JW Bullée, M Junger The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849-875, 2020 | 24 | 2020 |
| Tangible modelling to elicit domain knowledge: an experiment and focus group D Ionita, R Wieringa, JW Bullee, A Vasenev International Conference on Conceptual Modeling, 558-565, 2015 | 20 | 2015 |
| Argumentation-based security requirements elicitation: The next round D Ionita, JW Bullee, RJ Wieringa 2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014 | 19 | 2014 |
| Experimental social engineering: Investigation and prevention JW Bullee | 14 | 2017 |
| First steps to improve cybersecurity Behaviour–a virtual reality experience L Klooster, R Van Delden, JW Bullée 17th European Conference on Games Based Learning, ECGBL 2023, 226-343, 2023 | 6 | 2023 |
| Investigating the usability and utility of tangible modelling of socio-technical architectures D Ionita, R Wieringa, JW Bullee, A Vasenev University of Twente, Enschede, Netherlands, 2015 | 6 | 2015 |
| Social engineering JW Bullée, M Junger The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1-28, 2019 | 5 | 2019 |
| Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies JWH Bullee, M Junger Justitiële verkenningen 46 (2), 92-110, 2020 | 4 | 2020 |
| Regression Nodes: Extending attack trees with data from social sciences JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel 2015 Workshop on Socio-Technical Aspects in Security and Trust, 17-23, 2015 | 4 | 2015 |
| Technology-supported risk estimation by predictive assessment of socio-technical security L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ... Trespass Project, 2015 | 4 | 2015 |
| Physical location of smart key activators–a building security penetration test JW Bullee, L Montoya, M Junger, P Hartel Journal of Corporate Real Estate 20 (2), 138-151, 2018 | 3 | 2018 |
| Detection of leadership in informal (small) groups based on CCTV information JW Bullée University of Twente, 2013 | 2 | 2013 |
| An Ontological Model of the Phishing Attack Process Í Oliveira, G Wagner, G Amaral, TP Sales, JW Bullée, M Junger, ... International Conference on Business Process Modeling, Development and …, 2025 | 1 | 2025 |
| Cybersecurity on the Move: Investigating the Efficacy of a Movable Escape Room as an Educational Tool for Healthcare Employees L Koning, JW Bullee Proceedings of the European Conference on Games-based Learning 18 (1), 525-533, 2024 | 1 | 2024 |
| Does trainer gender make a difference when delivering phishing training? A new experimental design to capture bias A Palheiros Da Silva, W Mbaka, J Mayer, JW Bullee, K Tuma Proceedings of the 28th International Conference on Evaluation and …, 2024 | 1 | 2024 |