Wolter Pieters

Orcid: 0000-0003-3985-4452

Affiliations:
  • Delft University of Technology, Netherlands


According to our database1, Wolter Pieters authored at least 70 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures.
J. Inf. Secur. Appl., June, 2023

2022
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates.
Cybersecur., 2021

Investigating the effect of security and privacy on IoT device purchase behaviour.
Comput. Secur., 2021

2020
Wanting it all - public perceptions of the effectiveness, cost, and privacy of surveillance technology.
J. Inf. Commun. Ethics Soc., 2020

Mitigating cyberattack related domino effects in process plants via ICS segmentation.
J. Inf. Secur. Appl., 2020

Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review.
IEEE Access, 2020

2019
An Adversarial Risk Analysis Framework for Cybersecurity.
CoRR, 2019

Everything-as-a-hack: claims-making for access to digital and social resources.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

2018
The effectiveness of surveillance technology: What intelligence officials are saying.
Inf. Soc., 2018

Secure or usable computers? Revealing employees' perceptions and trade-offs by means of a discrete choice experiment.
Comput. Secur., 2018

On Security Singularities.
Proceedings of the New Security Paradigms Workshop, 2018

Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

2017
Beyond individual-centric privacy: Information technology in social systems.
Inf. Soc., 2017

Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG's.
Ethics Inf. Technol., 2017

Bayesian Network Models in Cyber Security: A Systematic Review.
Proceedings of the Secure IT Systems, 2017

2016
Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.
Sci. Eng. Ethics, 2016

The Navigation Metaphor in Security Economics.
IEEE Secur. Priv., 2016

Cybersecurity as a <i>Politikum</i>: implications of security discourses for infrastructures.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Understanding Bifurcation of Slow Versus Fast Cyber-Attackers.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Cyber weapons: a profiling framework.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
Effectiveness of qualitative and quantitative security obligations.
J. Inf. Secur. Appl., 2015

Refining the ethics of computer-made decisions: a classification of moral mediation by ubiquitous machines.
Ethics Inf. Technol., 2015

Regression Nodes: Extending Attack Trees with Data from Social Sciences.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

"If you were attacked, you'd be sorry": Counterfactuals as security arguments.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Using Value Models for Business Risk Analysis in e-Service Networks.
Proceedings of the Practice of Enterprise Modeling, 2015

The Attack Navigator.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

2014
Reconciling Malicious and Accidental Risk in Cyber Security.
J. Internet Serv. Inf. Secur., 2014

Experimenting with Incentives: Security in Pilots for Future Grids.
IEEE Secur. Priv., 2014

Socio-Technical Security Metrics (Dagstuhl Seminar 14491).
Dagstuhl Reports, 2014

Cyber Security as Social Experiment.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Security Policy Alignment: A Formal Approach.
IEEE Syst. J., 2013

Obligations to enforce prohibitions: on the adequacy of security policies.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

Defining "The Weakest Link" Comparative Security in Complex Systems of Systems.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Quantitative penetration testing with item response theory.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
A move in the security measurement stalemate: elo-style ratings to quantify vulnerability.
Proceedings of the New Security Paradigms Workshop, 2012

Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider.
Proceedings of the European Data Protection: In Good Health?, 2012

2011
The (Social) Construction of Information Security.
Inf. Soc., 2011

Representing Humans in System Security Models: An Actor-Network Approach.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization.
Inf. Secur. Tech. Rep., 2011

Secure Architectures in the Cloud (Dagstuhl Seminar 11492).
Dagstuhl Reports, 2011

Training students to steal: a practical assignment in computer security education.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Reducing normative conflicts in information security.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting.
Proceedings of the International Conference on IT Convergence and Security, 2011

Security and Privacy in the Clouds: A Bird's Eye View.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
Anonymity in Voting Revisited.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Benefits of Location-Based Access Control: A Literature Study.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Laptop theft: a case study on the effectiveness of security mechanisms in open organizations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Two methodologies for physical penetration testing using social engineering.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Verifiability of Electronic Voting: Between Confidence and Trust.
Proceedings of the Data Protection in a Profiled World, 2010

2009
Vulnerabilities and responsibilities: dealing with monsters in computer security.
J. Inf. Commun. Ethics Soc., 2009

The Precautionary Principle in a World of Digital Dependencies.
Computer, 2009

Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond.
Proceedings of the E-Voting and Identity, Second International Conference, 2009

Data Is Key: Introducing the Data-Based Access Control Paradigm.
Proceedings of the Data and Applications Security XXIII, 2009

Security Implications of Virtualization: A Literature Study.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment.
Proceedings of the Foundations of Security Analysis and Design V, 2008

2007
Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands.
J. Inf. Commun. Ethics Soc., 2007

2006
Acceptance of Voting Technology: Between Confidence and Trust.
Proceedings of the Trust Management, 4th International Conference, 2006

Internet Voting: A Conceptual Challenge to Democracy.
Proceedings of the Social Inclusion: Societal and Organizational Implications for Information Systems, 2006

2005
Statically checking confidentiality via dynamic labels.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

RIES - Internet Voting in Action.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Provable anonymity.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005


  Loading...