Searched for: author%3A%22van+Gelder%2C+P.H.A.J.M.%22
(1 - 8 of 8)
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André M.H. (author), van Gelder, P.H.A.J.M. (author)
Both intentional attacks and accidental technical failures can lead to abnormal behaviour in components of industrial control systems. In our previous work, we developed a framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two classes, including knowledge elicitation to construct the directed...
journal article 2023
document
de Wit, J.J. (author), Pieters, Wolter (author), van Gelder, P.H.A.J.M. (author)
Professionals working in both the physical and cybersecurity domain need to assess and evaluate security risks. As information on risks in general and security risks in particular is often imperfect and intractable, these professionals are facing a challenge in judging both likelihood and consequences, but how much do their existing...
journal article 2023
document
de Wit, J.J. (author), Pieters, Wolter (author), Jansen, S.J.T. (author), van Gelder, P.H.A.J.M. (author)
Security professionals play a decisive role in security risk decision making, with important implications for security in organisations and society. Because of this subjective input in security understanding possible biases in this process is paramount. In this paper, well known biases as observed and described in prospect theory are studied in...
journal article 2021
document
de Wit, J.J. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author)
Risk assessments in the (cyber) security domain are often, if not always, based on subjective expert judgement. For the first time, to the best of our knowledge, the individual preferences of professionals from the security domain are studied. In on online survey they are asked to mention, rate and rank their preferences when assessing a...
conference paper 2021
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), van Gelder, P.H.A.J.M. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
journal article 2021
document
Tervoort, Tom (author), Tuler de Oliveira, M. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), Olabarriaga, Silvia Delgado (author), Marquering, Henk (author)
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted by a damaging attack is increased when medical devices are used which rely on unmaintained legacy software that cannot be replaced and may have publicly known vulnerabilities. This review aims to provide insight into solutions presented in the...
journal article 2020
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, Andre M. H. (author), Khakzad, N. (author), van Gelder, P.H.A.J.M. (author)
Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In...
conference paper 2019
document
Chockalingam, S. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author), van Gelder, P.H.A.J.M. (author)
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a...
conference paper 2017
Searched for: author%3A%22van+Gelder%2C+P.H.A.J.M.%22
(1 - 8 of 8)