Search

Your search keyword '"Pieters W"' showing total 360 results

Search Constraints

Start Over You searched for: Author "Pieters W" Remove constraint Author: "Pieters W"
360 results on '"Pieters W"'

Search Results

3. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

4. Bias and noise in security risk assessments, an empirical study on the information position and confidence of security professionals

5. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

9. Security at the end of the tunnel: The anatomy of VPN mental models among experts and non-experts in a corporate context

10. Hoe maak je je organisatie weerbaar?

11. Individual preferences in security risk decision making: an exploratory study under security professionals

12. Philosophy of security engineering

13. Vraag hackers om in te breken

14. Biases in security risk management: Do security professionals follow prospect theory in their decisions?

15. Investigating the effect of security and privacy on IoT device purchase behaviour

16. Philosophy of security engineering

17. Risk personalization: Governing uncertain collective risk through individual decisions

18. An adversarial risk analysis framework for cybersecurity

19. Safe-by-design in engineering: An overview and comparative analysis of engineering disciplines

20. Bayesian network model to distinguish between intentional attacks and accidental technical failures: A case study of floodgates

21. Individual preferences in security risk decision making: an exploratory study under security professionals

22. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

23. Investigating the effect of security and privacy on IoT device purchase behaviour

25. The cyber insurance landscape

26. Mitigating cyberattack related domino effects in process plants via ICS segmentation

27. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

28. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

29. Effectiveness fettered by bureaucracy: Why surveillance technology is not evaluated

30. Risk Personalization: Governing Uncertain Collective Risk Through Individual Decisions

31. Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated

32. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

33. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

35. Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures

37. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

39. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

40. CYBECO: Supporting cyber-insurance from a behavioural choice perspective

41. An Adversarial Risk Analysis Framework for Cybersecurity

42. Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures

46. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

47. Assement Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

48. Developing a Cyber Operations Computational Ontology

Catalog

Books, media, physical & digital resources