1. 2017
  2. Voltage Control in Distributed Generation under Measurement Falsification Attacks

    Ma, M., Teixeira, A. M. H., van den Berg, J. & Palensky, P. 1 Jul 2017 In : IFAC-PapersOnline. 50, 1, p. 8379-8384 6 p.

    Research output: Scientific - peer-reviewArticle

  3. Applying Bayesian game theory to analyse cyber risks of bank transaction systems

    Van Der Veeken, P., Van Schooten, S., Shinde, R., Dunnewind, M. & Van Den Berg, J. 28 Apr 2017 Proceedings of International Conference on Computing, Analytics and Security Trends, CAST 2016. IEEE, p. 84-89 6 p. 7914945

    Research output: Scientific - peer-reviewConference contribution

  4. A Social Cyber Contract Theory Model for Understanding National Cyber Strategies

    Bierens, R., Klievink, B. & van den Berg, J. 2017 Proceedings of International Conference on Electronic Government 2017. Springer, p. 166-176 (Lecture Notes in Computer Science; vol. 10428)

    Research output: Scientific - peer-reviewConference contribution

  5. Gebrek aan cyber security bedreigt autonoom rijdende auto

    Leenstra, H., van den Berg, J. & van Wee, B. 2017 In : Verkeerskunde: vaktijdschrift over verkeer en vervoer. 1, p. 8-16

    Research output: ProfessionalArticle

  6. 2016
  7. A risk evaluation approach for authorization decisions in social pervasive applications

    Ali-Eldin, A., van den Berg, J. & Ali, H. A. 1 Oct 2016 In : Computers & Electrical Engineering. 55, p. 59-72 14 p.

    Research output: Scientific - peer-reviewArticle

  8. Cyber Weapons: a Profiling Framework

    Maathuis, C., Pieters, W. & van den Berg, J. 2016 Proceedings of International conference on cyber conflict: Protecting the future. IEEE

    Research output: Scientific - peer-reviewConference contribution

  9. 2015
  10. A learning model for enhancing the student¿s control in educational process using Web 2.0 personal learning environments

    Rahimi, E., van den Berg, J. & Veen, W. 2015 In : British Journal of Educational Technology. 2015, 4, p. 780-792 13 p.

    Research output: Scientific - peer-reviewArticle

  11. An adaptive trustworthiness modelling approach for ubiquitous software systems

    Ali-Eldin, A., van den Berg, J. & Daskapan, S. 2015 In : International Journal of Information Security and Privacy. 8, 4, p. 44-60 17 p.

    Research output: Scientific - peer-reviewArticle

  12. Cyber security: hoe beveiligen we de cyberspace?

    van den Berg, J. 2015 Yearbook of the Koninklijke Maatschappij voor Natuurkunde. Den Haag: Koninklijke Maatschappij voor Natuurkunde, p. 93-102 168 p.

    Research output: ScientificChapter

  13. Facilitating student-driven constructing of learning environments using Web 2.0 personal learning environments

    Rahimi, E., van den Berg, J. & Veen, W. 2015 In : Computers & Education. 81, p. 235-246 12 p.

    Research output: Scientific - peer-reviewArticle

Previous 1 2 3 4 5 6 7 8 9 Next

ID: 136400