Wolter Pieters
Orcid: 0000-0003-3985-4452Affiliations:
- Delft University of Technology, Netherlands
According to our database1,
Wolter Pieters
authored at least 70 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2023
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures.
J. Inf. Secur. Appl., June, 2023
2022
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates.
Cybersecur., 2021
Comput. Secur., 2021
2020
Wanting it all - public perceptions of the effectiveness, cost, and privacy of surveillance technology.
J. Inf. Commun. Ethics Soc., 2020
Mitigating cyberattack related domino effects in process plants via ICS segmentation.
J. Inf. Secur. Appl., 2020
Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review.
IEEE Access, 2020
2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
2018
The effectiveness of surveillance technology: What intelligence officials are saying.
Inf. Soc., 2018
Secure or usable computers? Revealing employees' perceptions and trade-offs by means of a discrete choice experiment.
Comput. Secur., 2018
Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018
2017
Inf. Soc., 2017
Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG's.
Ethics Inf. Technol., 2017
Proceedings of the Secure IT Systems, 2017
2016
Sci. Eng. Ethics, 2016
Cybersecurity as a <i>Politikum</i>: implications of security discourses for infrastructures.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
Proceedings of the 2016 International Conference on Cyber Conflict, 2016
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications.
Proceedings of the Critical Information Infrastructures Security, 2016
2015
J. Inf. Secur. Appl., 2015
Refining the ethics of computer-made decisions: a classification of moral mediation by ubiquitous machines.
Ethics Inf. Technol., 2015
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the Practice of Enterprise Modeling, 2015
Proceedings of the Graphical Models for Security - Second International Workshop, 2015
2014
J. Internet Serv. Inf. Secur., 2014
IEEE Secur. Priv., 2014
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
2012
A move in the security measurement stalemate: elo-style ratings to quantify vulnerability.
Proceedings of the New Security Paradigms Workshop, 2012
Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the European Data Protection: In Good Health?, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization.
Inf. Secur. Tech. Rep., 2011
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting.
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011
2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Data Protection in a Profiled World, 2010
2009
J. Inf. Commun. Ethics Soc., 2009
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the Foundations of Security Analysis and Design V, 2008
2007
Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands.
J. Inf. Commun. Ethics Soc., 2007
2006
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the Social Inclusion: Societal and Organizational Implications for Information Systems, 2006
2005
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005