Export 32 results:
Author [ Title(Desc)] Type Year
Filters: Author is W. Pieters  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Pieters W., Dechesne F..  2017.  Adversarial risks in social experiments with new technologies. Experimentation beyond the laboratory: new perspectives on technology.
Probst C.W, Willemson J., Pieters W..  2016.  The Attack Navigator (Invited). Graphical Models for Security - Revised Selected Papers. 9390:1–17.
Stoelinga M.IA, Pieters W..  2013.  Attack navigator vindt en verhelpt zwakke plekken. Bits en chips. 4
Pieters W., Davarynejad M..  2015.  Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), Wroclaw, Poland. 8872:201–215.
Pieters W., Probst C.W, Lukszo S., Montoya L..  2014.  Cost-effectiveness of Security Measures: A model-based Framework. Approaches and Processes for Managing the Economics of Information Systems. :139–156.
Ionita D., Hartel P.H, Pieters W., Wieringa R.J.  2013.  Current established risk assessment methodologies and tools.
Pieters W., Hadziosmanović D., Dechesne F..  2014.  Cyber Security as Social Experiment. NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, Victoria, BC, Canada. :15–24.
Fichtner L., Pieters W., Texeira A..  2016.  Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures. New Security Paradigms Workshop (NSPW), Colorado, USA.
Bleikertz S., Mastelic T., Pape S., Pieters W., Dimkov T..  2013.  Defining the cloud battlefield - supporting security assessments by cloud customers. International Conference on Cloud Engineering (IC2E 2013), Redwood City, CA. :78–87.
Pieters W..  2013.  Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, Bristol, United Kingdom. :39–44.
Herley C., Pieters W..  2015.  "If you were attacked, you'd be sorry": Counterfactuals as security arguments. New Security Paradigm Workshop (NSPW), Twente, Netherlands. :1–12.
Chockalingam S., Hadziosmanović D., Pieters W., Texeira A., van Gelder P..  2016.  Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. 11th International Conference on Critical Information Infrastructures Security (CRITIS), Paris, France.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2013.  Obligations to enforce prohibitions: on the adequacy of security policies. SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey. :54–61.
Pieters W., Lukszo Z., Hadziosmanović D., van den Berg J..  2014.  Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security. 4:4–26.
Bullee J.H, Montoya L., Pieters W., Junger M., Hartel P.H.  2015.  Regression Nodes: Extending attack trees with data from social sciences. Workshop on Socio-Technical Aspects in Security and Trust (STAST), Verona, Italy.