Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
security Social Sciences
Security of data Engineering & Materials Science
voting Social Sciences
Testing Engineering & Materials Science
Personnel Engineering & Materials Science
Cloud computing Engineering & Materials Science
system Social Sciences
data security Social Sciences

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2001 2017

Adversarial risks in social experiments with new technologies

Pieters, W. & Dechesne, F. 2017 Experimentation beyond the laboratory: new perspectives on technology. van der Poel, I., Asveld, L. & Mehos, D. C. (eds.). Oxford, UK: Routledge

Research output: ScientificChapter

new technology
experiment
risk
security
action

Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures

Fichtner, L., Pieters, W. & Texeira, A. Sep 2016 New Security Paradigms Workshop (NSPW). New York: ACM, p. -

Research output: Scientific - peer-reviewConference contribution

security
infrastructure
paradigm
system
politicization

Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

Chockalingam, S., Hadziosmanovic, D., Pieters, W., Texeira, A. & van Gelder, P. Oct 2016 11th International Conference on Critical Information Infrastructures Security (CRITIS). London: Springer, p. - (Lecture Notes in Computer Science)

Research output: Scientific - peer-reviewConference contribution

Risk assessment
Security systems
2 Citations

Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Pieters, W., Hadziosmanovic, D. & Dechesne, F. Jun 2016 22, 3, p. 831-850 20 p.

Research output: Scientific - peer-reviewArticle

Technology
Experiments
3 Citations

The Attack Navigator (Invited)

Probst, C. W., Willemson, J. & Pieters, W. 6 Feb 2016 Graphical Models for Security - Revised Selected Papers. Mauw, S., Kordy, B. & Jajodia, S. (eds.). Berlin: Springer Verlag, p. 1-17 17 p. (Lecture Notes in Computer Science; vol. 9390, no. 9390)

Research output: Scientific - peer-reviewChapter

Navigation systems
Risk assessment