Searched for: author%3A%22Pieters%2C+W.%22
(21 - 33 of 33)

Pages

document
Chockalingam, S. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author), van Gelder, P.H.A.J.M. (author)
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a...
conference paper 2017
document
Fichtner, L.V.E. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author)
In the cybersecurity community it is common to think of security as a design feature for systems and infrastructures that may be difficult to balance with other requirements. What is less studied is how security requirements come about, for which reasons, and what their influence is on the actions the system facilitates. Security is for example...
conference paper 2016
document
Pieters, W. (author), Barendse, Jeroen (author), Ford, Margaret (author), Heath, Claude P R (author), Probst, Christian W. (author), Verbij, Ruud (author)
The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of navigation makes it easier to motivate and...
journal article 2016
document
Probst, Christian W. (author), Willemson, Jan (author), Pieters, W. (author)
The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are caused by the strategic behaviour of adversaries...
journal article 2016
document
Gollmann, D. (author), Herley, C. (author), Koenig, V. (author), Pieters, W. (author), Sasse, M.A. (author)
Report from Dagstuhl seminar 14491. This report documents the program and the outcomes of Dagstuhl Seminar 14491 “Socio-Technical Security Metrics”. In the domain of safety, metrics inform many decisions, from the height of new dikes to the design of nuclear plants. We can state, for example, that the dikes should be high enough to guarantee...
journal article 2015
document
Pieters, W. (author), Hadžiosmanovi?, D. (author), Dechesne, F. (author)
onceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by...
journal article 2015
document
Van der Voort, M. (author), Pieters, W. (author), Consoli, L. (author)
In the past decades, computers have become more and more involved in society by the rise of ubiquitous systems, increasing the number of interactions between humans and IT systems. At the same time, the technology itself is getting more complex, enabling devices to act in a way that previously only humans could, based on developments in the...
journal article 2015
document
Pieters, W. (author), Hadziosmanovic, D. (author), Dechesne, F (author)
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by...
journal article 2015
document
Arnold, F. (author), Pieters, W. (author), Stoelinga, M.I.A. (author)
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Thus, penetration testing has so far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost...
conference paper 2013
document
Pieters, W. (author), Padget, J. (author), Dechesne, F. (author), Dignum, V. (author), Aldewereld, H.M. (author)
Security policies in organisations typically take the form of obligations for the employees. However, it is often unclear what the purpose of such obligations is, and how these can be integrated in the operational processes of the organisation. This can result in policies that may be either too strong or too weak, leading to unnecessary...
conference paper 2013
document
Pieters, W. (author), Arnold, F. (author), Stoelinga, M.I.A. (author)
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Therefore, penetration testing has thus far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost...
report 2013
document
Pieters, W. (author), Banescu, S.E. (author), Posea, S. (author)
We know that several chemicals can be combined to form explosives. Therefore, we do not want these to end up in airplanes together. Similarly, in the architecture of complex systems, it is often possible to combine the results of several system services to acquire illegitimate benefits or disrupt operation. For example, in what is called...
conference paper 2012
document
Pieters, W. (author), Popkema, M. (author), Broekhans, B. (author), Dijkstra, A. (author), Boersma, K. (author), Alberts, G. (author)
book chapter 2009
Searched for: author%3A%22Pieters%2C+W.%22
(21 - 33 of 33)

Pages