Searched for: subject%3A%22Security%22
(1 - 10 of 10)
document
Chaal, M. (author), Ren, X. (author), Bahootoroody, A. (author), Basnet, Sunil (author), Bolbot, Victor (author), Banda, Osiris A.Valdez (author), van Gelder, P.H.A.J.M. (author)
The safety and reliability of autonomous ships are critical for the successful realization of an autonomous maritime ecosystem. Research and collaboration between governments, industry, and academia are vital in achieving this goal. This paper conducts a bibliometric review of the research on the risk, safety, and reliability of autonomous ships...
review 2023
document
de Wit, J.J. (author), Pieters, Wolter (author), van Gelder, P.H.A.J.M. (author)
Professionals working in both the physical and cybersecurity domain need to assess and evaluate security risks. As information on risks in general and security risks in particular is often imperfect and intractable, these professionals are facing a challenge in judging both likelihood and consequences, but how much do their existing...
journal article 2023
document
de Wit, J.J. (author), Pieters, Wolter (author), Jansen, S.J.T. (author), van Gelder, P.H.A.J.M. (author)
Security professionals play a decisive role in security risk decision making, with important implications for security in organisations and society. Because of this subjective input in security understanding possible biases in this process is paramount. In this paper, well known biases as observed and described in prospect theory are studied in...
journal article 2021
document
de Wit, J.J. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author)
Risk assessments in the (cyber) security domain are often, if not always, based on subjective expert judgement. For the first time, to the best of our knowledge, the individual preferences of professionals from the security domain are studied. In on online survey they are asked to mention, rate and rank their preferences when assessing a...
conference paper 2021
document
van Gelder, P.H.A.J.M. (author), Taebi, B. (author), van Ommen, J.R. (author), van de Poel, I.R. (author), Asveld, L. (author), Balkenende, R. (author), Hollmann, F. (author), van Kampen, E. (author), Krebbers, R.J. (author), de Lange, J. (author), Terwel, K.C. (author), Visser, Eelco (author)
In this paper, we provide an overview of how Safe-by-Design is conceived and applied in practice in a large number of engineering disciplines. We discuss the differences, commonalities, and possibilities for mutual learning found in those practices and identify several ways of putting those disciplinary outlooks in perspective. The considered...
journal article 2021
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), van Gelder, P.H.A.J.M. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
journal article 2021
document
Tervoort, Tom (author), Tuler de Oliveira, M. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), Olabarriaga, Silvia Delgado (author), Marquering, Henk (author)
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted by a damaging attack is increased when medical devices are used which rely on unmaintained legacy software that cannot be replaced and may have publicly known vulnerabilities. This review aims to provide insight into solutions presented in the...
journal article 2020
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, Andre M. H. (author), Khakzad, N. (author), van Gelder, P.H.A.J.M. (author)
Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In...
conference paper 2019
document
Smetsers, R.C.G.M. (author), Wolterbeek, H.T. (author), van Gelder, P.H.A.J.M. (author), Huitema, K.R. (author), van Zalen, Ed (author)
In a report issued in 2008, the Health Council of the Netherlands noted that the scientific knowledge on radiation protection was seriously in decline. This statement is still valid nowadays. It is therefore important to collate existing radiation knowledge, to make state-of-the-art expertise available to government and society and to acquire...
report 2018
document
Chockalingam, S. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author), van Gelder, P.H.A.J.M. (author)
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a...
conference paper 2017
Searched for: subject%3A%22Security%22
(1 - 10 of 10)