Publications

Export 137 results:
Author Title [ Type(Asc)] Year
Journal Article
Feng Y., Zhang L..  2013.  A tighter bound for the self-stabilization time in Herman's algorithm. Information processing letters. 113:486–488.
Pieters W..  2013.  On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology. 15:195–208.
Gollmann D., Herley C., Koenig V., Pieters W., Sasse M.A.  2015.  Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports. 4:1–28.
Pieters W., Hadziosmanović D., Dechesne F..  2015.  Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
Pieters W., Hadziosmanović D., Dechesne F..  2016.  Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics. N/A
Lenzini G., Mauw S., Ouchani S..  2015.  Security analysis of socio-technical physical systems. Computers & Electrical Engineering. online
Pieters W., Lukszo Z., Hadziosmanović D., van den Berg J..  2014.  Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security. 4:4–26.
Probst C.W, Hansen R.R.  2013.  Reachability-based impact as a measure for insiderness. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4:38–48.
Arnold F., Pieters W., Stoelinga M.IA.  2014.  Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security. 9:118–127.
Kordy B., Pouly M., Schweitzer P..  2016.  Probabilistic reasoning with graphical security models. Information sciences. 342:111–131.
Junger M., Morales A.LMontoya, Overink F.J.  2017.  Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior. 66:75–87.
Bullee J.H, Montoya L., Pieters W., Junger M., Hartel P.H.  2015.  The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology. 11:97–115.
Pieters W., Barendse J., Ford M., Heath C.PR, Probst C.W, Verbij R..  2016.  The Navigation Metaphor in Security Economics. IEEE Security & Privacy. 14:14–21.

Pages