Search

Your search keyword '"Pieters W"' showing total 179 results

Search Constraints

Start Over You searched for: Author "Pieters W" Remove constraint Author: "Pieters W" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
179 results on '"Pieters W"'

Search Results

1. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

2. Bias and noise in security risk assessments, an empirical study on the information position and confidence of security professionals

3. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

6. Security at the end of the tunnel: The anatomy of VPN mental models among experts and non-experts in a corporate context

7. Security at the end of the tunnel: The anatomy of VPN mental models among experts and non-experts in a corporate context

8. Investigating the effect of security and privacy on IoT device purchase behaviour

9. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

11. Biases in security risk management: Do security professionals follow prospect theory in their decisions?

12. Philosophy of security engineering

13. Risk personalization: Governing uncertain collective risk through individual decisions

15. An adversarial risk analysis framework for cybersecurity

16. Safe-by-design in engineering: An overview and comparative analysis of engineering disciplines

17. Bayesian network model to distinguish between intentional attacks and accidental technical failures: A case study of floodgates

18. Individual preferences in security risk decision making: an exploratory study under security professionals

19. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

20. Investigating the effect of security and privacy on IoT device purchase behaviour

22. Biases in security risk management: Do security professionals follow prospect theory in their decisions?

23. Philosophy of security engineering

24. Safe-by-design in engineering: An overview and comparative analysis of engineering disciplines

25. Risk personalization: Governing uncertain collective risk through individual decisions

27. Bayesian network model to distinguish between intentional attacks and accidental technical failures: A case study of floodgates

28. Investigating the effect of security and privacy on IoT device purchase behaviour

29. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

30. An adversarial risk analysis framework for cybersecurity

31. Philosophy of security engineering

32. Safe-by-design in engineering: An overview and comparative analysis of engineering disciplines

34. Investigating the effect of security and privacy on IoT device purchase behaviour

35. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

36. An adversarial risk analysis framework for cybersecurity

37. Biases in security risk management: Do security professionals follow prospect theory in their decisions?

38. Individual preferences in security risk decision making: an exploratory study under security professionals

39. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

40. Investigating the effect of security and privacy on IoT device purchase behaviour

41. The cyber insurance landscape

42. Mitigating cyberattack related domino effects in process plants via ICS segmentation

43. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

44. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

45. Effectiveness fettered by bureaucracy: Why surveillance technology is not evaluated

46. Risk Personalization: Governing Uncertain Collective Risk Through Individual Decisions

47. Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated

48. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

49. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

50. The cyber insurance landscape

Catalog

Books, media, physical & digital resources