1. 2020
  2. Mitigating cyberattack related domino effects in process plants via ICS segmentation

    Arief, R., Khakzad, N. & Pieters, W., 1 Apr 2020, In : Journal of Information Security and Applications. 51, 9 p., 102450.

    Research output: Contribution to journalArticleScientificpeer-review

  3. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

    Maathuis, C., Pieters, W. & van den Berg, J., 2020, (Accepted/In press) In : Defence Technology. 23 p.

    Research output: Contribution to journalArticleScientificpeer-review

  4. 2019
  5. Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures

    Chockalingam, S., Pieters, W., Teixeira, A. M. H., Khakzad, N. & van Gelder, P., Mar 2019, Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers: Graphical Models for Security. Pym, D., Fila, B. & Cybenko, G. (eds.). Springer, p. 31-50 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11086 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  6. An Adversarial Risk Analysis Framework for Cybersecurity

    Rios Insua, D., Couce-Vieira, A., Rubio, J. A., Pieters, W., Labunets, K. & G. Rasines, D., 2019, In : Risk Analysis.

    Research output: Contribution to journalArticleScientificpeer-review

  7. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Gustafson, S. S. (ed.). Institute of Electrical and Electronics Engineers (IEEE), Vol. 2019-October. p. 438-443 6 p. 8599729

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  8. Everything-as-a-hack: Claims-making for access to digital and social resources

    Pieters, W., 2019, New Security Paradigms Workshop, NSPW 2019 - Proceedings. Association for Computing Machinery (ACM), p. 92-102 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  9. Wanting it all – public perceptions of the effectiveness, cost, and privacy of surveillance technology

    Cayford, M., Pieters, W. & van Gelder, P. H. A. J. M., 2019, In : Journal of Information, Communication and Ethics in Society.

    Research output: Contribution to journalArticleScientificpeer-review

  10. 2018
  11. Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology

    Cayford, M., Pieters, W. & Hijzen, C., 10 Nov 2018, In : Intelligence and National Security. 33, 7, p. 999-1021 23 p.

    Research output: Contribution to journalArticleScientificpeer-review

  12. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

    van der Wagen, W. & Pieters, W., Nov 2018, In : European Journal of Criminology.

    Research output: Contribution to journalArticleScientificpeer-review

  13. On security singularities

    Pieters, W., 28 Aug 2018, New Security Paradigms Workshop, NSPW 2018 Proceedings. Association for Computing Machinery (ACM)

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Previous 1 2 3 4 5 6 7 Next

ID: 157186