Search

Your search keyword '"Pieters, W."' showing total 358 results

Search Constraints

Start Over You searched for: Author "Pieters, W." Remove constraint Author: "Pieters, W."
358 results on '"Pieters, W."'

Search Results

3. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

4. Bias and noise in security risk assessments, an empirical study on the information position and confidence of security professionals

5. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

8. Security at the end of the tunnel: The anatomy of VPN mental models among experts and non-experts in a corporate context

10. Hoe maak je je organisatie weerbaar?

11. Individual preferences in security risk decision making: an exploratory study under security professionals

12. Philosophy of security engineering

13. Vraag hackers om in te breken

14. Biases in security risk management: Do security professionals follow prospect theory in their decisions?

15. Investigating the effect of security and privacy on IoT device purchase behaviour

16. Philosophy of security engineering

17. Risk personalization: Governing uncertain collective risk through individual decisions

18. An adversarial risk analysis framework for cybersecurity

19. Safe-by-design in engineering: An overview and comparative analysis of engineering disciplines

20. Bayesian network model to distinguish between intentional attacks and accidental technical failures: A case study of floodgates

21. Individual preferences in security risk decision making: an exploratory study under security professionals

22. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

23. Investigating the effect of security and privacy on IoT device purchase behaviour

24. The cyber insurance landscape

25. Mitigating cyberattack related domino effects in process plants via ICS segmentation

26. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

27. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

28. Effectiveness fettered by bureaucracy: Why surveillance technology is not evaluated

29. Risk Personalization: Governing Uncertain Collective Risk Through Individual Decisions

30. Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated

31. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

32. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

33. Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures

35. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

37. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

38. CYBECO: Supporting cyber-insurance from a behavioural choice perspective

39. An Adversarial Risk Analysis Framework for Cybersecurity

40. Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures

42. Developing a Cyber Operations Computational Ontology

43. Assement Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

44. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

48. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

49. Developing a Cyber Operations Computational Ontology

50. Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment

Catalog

Books, media, physical & digital resources