팔로우
Wolter Pieters
Wolter Pieters
Professor of Work, Organisations and Digital Technology, Radboud University Nijmegen
ru.nl의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Explanation and trust: what to tell the user in security and AI?
W Pieters
Ethics and information technology 13, 53-64, 2011
1792011
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11 (1), 97, 2015
1312015
Provable anonymity
FD Garcia, I Hasuo, W Pieters, P van Rossum
Proceedings of the 2005 ACM workshop on Formal methods in security …, 2005
1132005
Privacy and Information Technology
J van den Hoven, M Blaauw, W Pieters, M Warnier
The Stanford Encyclopedia of Philosophy (Winter 2014 Edition), 2014
892014
Security implications of virtualization: A literature study
A van Cleeff, W Pieters, RJ Wieringa
2009 International conference on computational science and engineering 3 …, 2009
872009
From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks
W van der Wagen, W Pieters
British Journal of Criminology 55 (3), 578-595, 2015
852015
Two methodologies for physical penetration testing using social engineering
T Dimkov, A Van Cleeff, W Pieters, P Hartel
Proceedings of the 26th annual computer security applications conference …, 2010
852010
Electronic Voting in the Netherlands: from early Adoption to early Abolishment
B Jacobs, W Pieters
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial …, 2009
832009
Portunes: representing attack scenarios spanning through the physical, digital and social domain
T Dimkov, W Pieters, P Hartel
Automated Reasoning for Security Protocol Analysis and Issues in the Theory …, 2011
722011
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel
Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018
692018
Integrated safety and security risk assessment methods: a survey of key characteristics and applications
S Chockalingam, D Hadžiosmanović, W Pieters, A Teixeira, P van Gelder
Critical Information Infrastructures Security: 11th International Conference …, 2017
642017
Bayesian network models in cyber security: a systematic review
S Chockalingam, W Pieters, A Teixeira, P van Gelder
Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia …, 2017
632017
Representing humans in system security models: An actor-network approach
W Pieters
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011
632011
An adversarial risk analysis framework for cybersecurity
D Rios Insua, A Couce‐Vieira, JA Rubio, W Pieters, K Labunets, ...
Risk Analysis 41 (1), 16-36, 2021
602021
RIES-internet voting in action
E Hubbers, B Jacobs, W Pieters
29th Annual International Computer Software and Applications Conference …, 2005
592005
The effectiveness of surveillance technology: What intelligence officials are saying
M Cayford, W Pieters
The Information Society 34 (2), 88-103, 2018
572018
Acceptance of voting technology: between confidence and trust
W Pieters
Trust Management: 4th International Conference, iTrust 2006, Pisa, Italy …, 2006
492006
Receipt-freeness as a special case of anonymity in epistemic logic
HL Jonker, W Pieters
IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006
482006
Benefits of location-based access control: A literature study
A Van Cleeff, W Pieters, R Wieringa
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010
452010
The precautionary principle in a world of digital dependencies
W Pieters, A Van Cleeff
Computer 42 (6), 50-56, 2009
422009
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20