default search action
Eric Laermans
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j9]Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans:
Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. IEEE Access 9: 44928-44949 (2021) - [j8]Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans:
COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic. IEEE Access 9: 121916-121929 (2021) - [c9]Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans:
A phishing Mitigation Solution using Human Behaviour and Emotions that Influence the Success of Phishing Attacks. UMAP (Adjunct Publication) 2021: 345-350
2010 – 2019
- 2017
- [j7]Eli De Poorter, Tom Van Haute, Eric Laermans, Ingrid Moerman:
Benchmarking of Localization Solutions: Guidelines for the Selection of Evaluation Points. Ad Hoc Networks 59: 86-96 (2017) - [j6]Vasilis Maglogiannis, Dries Naudts, Adnan Shahid, Spilios Giannoulis, Eric Laermans, Ingrid Moerman:
Cooperation Techniques between LTE in Unlicensed Spectrum and Wi-Fi towards Fair Spectral Efficiency. Sensors 17(9): 1994 (2017) - [c8]Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans:
Phishing Attacks Root Causes. CRiSIS 2017: 187-202 - 2016
- [j5]Selvakumar Ulaganathan, Ivo Couckuyt, Tom Dhaene, Joris Degroote, Eric Laermans:
Performance study of gradient-enhanced Kriging. Eng. Comput. 32(1): 15-34 (2016) - [c7]Selvakumar Ulaganathan, Ivo Couckuyt, Tom Dhaene, Eric Laermans, Joris Degroote:
A hybrid sequential sampling based metamodelling approach for high dimensional problems. CEC 2016: 1917-1923 - 2015
- [j4]Frank Vanheel, Jo Verhaevert, Eric Laermans, Ingrid Moerman, Piet Demeester:
Pseudo-3D RSSI-based WSN localization algorithm using linear regression. Wirel. Commun. Mob. Comput. 15(9): 1342-1354 (2015) - [c6]Selvakumar Ulaganathan, Ivo Couckuyt, Dirk Deschrijver, Eric Laermans, Tom Dhaene:
A Matlab Toolbox for Kriging Metamodelling. ICCS 2015: 2708-2713 - 2014
- [c5]Selvakumar Ulaganathan, Ivo Couckuyt, Tom Dhaene, Eric Laermans, Joris Degroote:
On the use of gradients in kriging surrogate models. WSC 2014: 2692-2701 - 2011
- [j3]Frank Vanheel, Jo Verhaevert, Eric Laermans, Ingrid Moerman, Piet Demeester:
Automated linear regression tools improve RSSI WSN localization in multipath indoor environment. EURASIP J. Wirel. Commun. Netw. 2011: 38 (2011) - [j2]Karel Crombecq, Eric Laermans, Tom Dhaene:
Efficient space-filling and non-collapsing sequential design strategies for simulation-based modeling. Eur. J. Oper. Res. 214(3): 683-696 (2011) - [c4]Frank Vanheel, Jo Verhaevert, Eric Laermans, Ingrid Moerman, Piet Demeester:
A linear regression based cost function for WSN localization. SoftCOM 2011: 1-5 - 2010
- [j1]Dirk Gorissen, Ivo Couckuyt, Eric Laermans, Tom Dhaene:
Multiobjective global surrogate modeling, dealing with the 5-percent problem. Eng. Comput. 26(1): 81-98 (2010)
2000 – 2009
- 2009
- [c3]Dirk Gorissen, Ivo Couckuyt, Eric Laermans, Tom Dhaene:
Pareto-Based Multi-output Metamodeling with Active Learning. EANN 2009: 389-400 - [c2]Ivo Couckuyt, Dirk Gorissen, Hamed Rouhani, Eric Laermans, Tom Dhaene:
Evolutionary Regression Modeling with Active Learning: An Application to Rainfall Runoff Modeling. ICANNGA 2009: 548-558 - 2005
- [c1]Sofie Van Hoecke, Wouter Haerick, Gregory De Jans, Filip De Turck, Eric Laermans, Bart Dhoedt, Piet Demeester:
Design and Implementation of a Secure Media Content Delivery Broker Architecture. ISWS 2005: 3-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint