1. 2019
  2. Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures

    Chockalingam, S., Pieters, W., Teixeira, A. M. H., Khakzad, N. & van Gelder, P., Mar 2019, Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers: Graphical Models for Security. Pym, D., Fila, B. & Cybenko, G. (eds.). Springer, p. 31-50 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. An Adversarial Risk Analysis Framework for Cybersecurity

    Rios Insua, D., Couce-Vieira, A., Rubio, J. A., Pieters, W., Labunets, K. & G. Rasines, D., 2019, In : Risk Analysis.

    Research output: Contribution to journalArticleScientificpeer-review

  4. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Gustafson, S. S. (ed.). Institute of Electrical and Electronics Engineers Inc., Vol. 2019-October. p. 438-443 6 p. 8599729

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. 2018
  6. Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology

    Cayford, M., Pieters, W. & Hijzen, C., 10 Nov 2018, In : Intelligence and National Security. 33, 7, p. 999-1021 23 p.

    Research output: Contribution to journalArticleScientificpeer-review

  7. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

    van der Wagen, W. & Pieters, W., Nov 2018, In : European Journal of Criminology.

    Research output: Contribution to journalArticleScientificpeer-review

  8. On security singularities

    Pieters, W., 28 Aug 2018, New Security Paradigms Workshop, NSPW 2018 Proceedings. Association for Computing Machinery (ACM)

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  9. Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment

    Molin, E., Meeuwisse, K., Pieters, W. & Chorus, C., 1 Aug 2018, In : Computers and Security. 77, p. 65-78 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  10. The effectiveness of surveillance technology: What intelligence officials are saying

    Cayford, M. & Pieters, W., 15 Mar 2018, In : Information Society. 34, 2, p. 88-103 16 p.

    Research output: Contribution to journalArticleScientificpeer-review

  11. A computational ontology for cyber operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 1 Jan 2018, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Josang, A. (ed.). IARIA / Curran Associates INc., Vol. 2018-June. p. 278-287 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. Consent and privacy

    Custers, B., Dechesne, F., Pieters, W., Schermer, B. & van der Hof, S., 2018, The Routledge Handbook of the Ethics of Consent. Schaber, P. & Müller, A. (eds.). Routledge, p. 247-258 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

Previous 1 2 3 4 5 6 7 Next

ID: 157186