Search

Your search keyword '"Pieters, W. (author)"' showing total 64 results

Search Constraints

Start Over You searched for: Author "Pieters, W. (author)" Remove constraint Author: "Pieters, W. (author)"
64 results on '"Pieters, W. (author)"'

Search Results

1. Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

2. Individual preferences in security risk decision making: an exploratory study under security professionals

3. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

4. Investigating the effect of security and privacy on IoT device purchase behaviour

5. Individual preferences in security risk decision making: an exploratory study under security professionals

6. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

7. Investigating the effect of security and privacy on IoT device purchase behaviour

8. Risk Personalization: Governing Uncertain Collective Risk Through Individual Decisions

9. Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated

10. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

11. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

12. Risk Personalization: Governing Uncertain Collective Risk Through Individual Decisions

13. Effectiveness fettered by bureaucracy–why surveillance technology is not evaluated

14. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: A scoping review

15. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

16. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

17. CYBECO: Supporting cyber-insurance from a behavioural choice perspective

18. An Adversarial Risk Analysis Framework for Cybersecurity

19. Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures

20. Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

21. CYBECO: Supporting cyber-insurance from a behavioural choice perspective

22. An Adversarial Risk Analysis Framework for Cybersecurity

23. Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures

24. Developing a Cyber Operations Computational Ontology

25. Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment

26. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

27. Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology

28. The effectiveness of surveillance technology: What intelligence officials are saying

29. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

30. Developing a Cyber Operations Computational Ontology

31. Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment

32. The effectiveness of surveillance technology: What intelligence officials are saying

33. Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology

34. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

35. The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory

36. Bayesian Network Models in Cyber Security: A Systematic Review

37. Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG’s

38. Beyond individual-centric privacy: Information technology in social systems

39. Beyond individual-centric privacy: Information technology in social systems

40. Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG’s

41. Bayesian Network Models in Cyber Security: A Systematic Review

42. Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures

43. The attack navigator

44. The Navigation Metaphor in Security Economics

45. The Navigation Metaphor in Security Economics

46. Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures

47. The attack navigator

48. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

49. Socio-technical security metrics

50. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Catalog

Books, media, physical & digital resources