Publications

Export 73 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is P  [Clear All Filters]
2013
Stoelinga M.IA, Pieters W..  2013.  Attack navigator vindt en verhelpt zwakke plekken. Bits en chips. 4
Ionita D., Hartel P.H, Pieters W., Wieringa R.J.  2013.  Current established risk assessment methodologies and tools.
Bleikertz S., Mastelic T., Pape S., Pieters W., Dimkov T..  2013.  Defining the cloud battlefield - supporting security assessments by cloud customers. International Conference on Cloud Engineering (IC2E 2013), Redwood City, CA. :78–87.
Bleikertz S., Mastelic T., Pape S., Pieters W., Dimkov T..  2013.  Defining the cloud battlefield - supporting security assessments by cloud customers. International Conference on Cloud Engineering (IC2E 2013), Redwood City, CA. :78–87.
Pieters W..  2013.  Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, Bristol, United Kingdom. :39–44.
Ivanova M.G, Probst C.W, Hansen R.R, Kammüller F..  2013.  Externalizing Behaviour for Analysing System Models. Journal of Internet Services and Information Security. 3:52–62.
Kammüller F., Probst C.W.  2013.  Invalidating policies using structural information. IEEE Security and Privacy Workshops (SPW 2013), San Francisco, CA. :76–81.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2013.  Obligations to enforce prohibitions: on the adequacy of security policies. SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey. :54–61.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2013.  Obligations to enforce prohibitions: on the adequacy of security policies. SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey. :54–61.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory. 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia. :49–54.
Arnold F., Pieters W., Stoelinga M.IA.  2013.  Quantitative penetration testing with item response theory (extended version).
Probst C.W, Hansen R.R.  2013.  Reachability-based impact as a measure for insiderness. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4:38–48.
Prakken H., Ionita D., Wieringa R.J.  2013.  Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.
Pieters W..  2013.  On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology. 15:195–208.
2014
Kammüller F., Probst C.W.  2014.  Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis. IEEE Security and Privacy Workshops (SPW), San Jose, California. :229–235.
Pieters W., Probst C.W, Lukszo S., Montoya L..  2014.  Cost-effectiveness of Security Measures: A model-based Framework. Approaches and Processes for Managing the Economics of Information Systems. :139–156.
Pieters W., Probst C.W, Lukszo S., Montoya L..  2014.  Cost-effectiveness of Security Measures: A model-based Framework. Approaches and Processes for Managing the Economics of Information Systems. :139–156.
Pieters W., Hadziosmanović D., Dechesne F..  2014.  Cyber Security as Social Experiment. NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, Victoria, BC, Canada. :15–24.
Kordy B.K, Piètre-Cambacédès L., Schweitzer P..  2014.  DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review. 13-14:1–38.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2014.  Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications. to appear:1–14.
Pieters W., Padget J., Dechesne F., Dignum V., Aldewereld H..  2014.  Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications. to appear:1–14.
Dechesne F., Hadziosmanović D., Pieters W..  2014.  Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy. 12:59–66.
Kammüller F., Probst C.W.  2014.  Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 5:59–79.
Probst C.W, Hansen R.R.  2014.  Model-based Abstraction of Data Provenance. 6th USENIX Workshop on the Theory and Practice of Provenance, Cologne, Germany. :Article3.
Boender J., Ivanova M.G, Kammüller F., Primierio G..  2014.  Modeling Human Behaviour with Higher Order Logic: Insider Threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :31–39.

Pages