![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Wolter Pieters
Person information
- affiliation: Delft University of Technology, Netherlands
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Sabarathinam Chockalingam
, Wolter Pieters, André M. H. Teixeira
, Pieter H. A. J. M. van Gelder:
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures. J. Inf. Secur. Appl. 75: 103497 (2023) - 2022
- [c41]Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets:
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. USENIX Security Symposium 2022: 3433-3450 - 2021
- [j22]Nick Ho-Sam-Sooi, Wolter Pieters, Maarten Kroesen:
Investigating the effect of security and privacy on IoT device purchase behaviour. Comput. Secur. 102: 102132 (2021) - [j21]Sabarathinam Chockalingam
, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates. Cybersecur. 4(1): 29 (2021) - 2020
- [j20]Tom Tervoort
, Marcela T. de Oliveira
, Wolter Pieters
, Pieter H. A. J. M. van Gelder, Sílvia Delgado Olabarriaga
, Henk A. Marquering
:
Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review. IEEE Access 8: 84352-84361 (2020) - [j19]Raditya Arief, Nima Khakzad, Wolter Pieters:
Mitigating cyberattack related domino effects in process plants via ICS segmentation. J. Inf. Secur. Appl. 51: 102450 (2020) - [j18]Michelle Cayford, Wolter Pieters, Pieter H. A. J. M. van Gelder:
Wanting it all - public perceptions of the effectiveness, cost, and privacy of surveillance technology. J. Inf. Commun. Ethics Soc. 18(1): 10-27 (2020)
2010 – 2019
- 2019
- [c40]Wolter Pieters:
Everything-as-a-hack: claims-making for access to digital and social resources. NSPW 2019: 92-102 - [e3]Marco Carvalho, Wolter Pieters, Elizabeth Stobert:
NSPW '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019. ACM 2019, ISBN 978-1-4503-7647-1 [contents] - [i4]David Ríos Insua, Aitor Couce Vieira, José Antonio Rubio, Wolter Pieters, Katsiaryna Labunets, Daniel Garcia Rasines:
An Adversarial Risk Analysis Framework for Cybersecurity. CoRR abs/1903.07727 (2019) - 2018
- [j17]Eric J. E. Molin, Kirsten Meeuwisse, Wolter Pieters, Caspar G. Chorus:
Secure or usable computers? Revealing employees' perceptions and trade-offs by means of a discrete choice experiment. Comput. Secur. 77: 65-78 (2018) - [j16]Michelle Cayford, Wolter Pieters:
The effectiveness of surveillance technology: What intelligence officials are saying. Inf. Soc. 34(2): 88-103 (2018) - [c39]Sabarathinam Chockalingam
, Wolter Pieters, André Teixeira, Nima Khakzad
, Pieter H. A. J. M. van Gelder:
Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures. GraMSec@FLoC 2018: 31-50 - [c38]Clara Maathuis, Wolter Pieters, Jan van den Berg:
Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations. MILCOM 2018: 1-6 - [c37]Wolter Pieters:
On Security Singularities. NSPW 2018: 80-88 - [e2]Marco Carvalho, Matt Bishop, Anil Somayaji, Wolter Pieters, Mohammad Mannan:
Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018. ACM 2018, ISBN 978-1-4503-6597-0 [contents] - 2017
- [j15]Christian Klemm, Wolter Pieters
:
Game mechanics and technological mediation: an ethical perspective on the effects of MMORPG's. Ethics Inf. Technol. 19(2): 81-93 (2017) - [j14]Wolter Pieters:
Beyond individual-centric privacy: Information technology in social systems. Inf. Soc. 33(5): 271-281 (2017) - [c36]Sabarathinam Chockalingam
, Wolter Pieters, André Teixeira
, Pieter H. A. J. M. van Gelder:
Bayesian Network Models in Cyber Security: A Systematic Review. NordSec 2017: 105-122 - [i3]Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. CoRR abs/1707.02140 (2017) - 2016
- [j13]Wolter Pieters, Jeroen Barendse, Margaret Ford, Claude P. R. Heath, Christian W. Probst
, Ruud Verbij:
The Navigation Metaphor in Security Economics. IEEE Secur. Priv. 14(3): 14-21 (2016) - [j12]Wolter Pieters, Dina Hadziosmanovic, Francien Dechesne
:
Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Sci. Eng. Ethics 22(3): 831-850 (2016) - [c35]Sabarathinam Chockalingam
, Dina Hadziosmanovic, Wolter Pieters, André Teixeira
, Pieter H. A. J. M. van Gelder:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. CRITIS 2016: 50-62 - [c34]Clara Maathuis, Wolter Pieters, Jan van den Berg:
Cyber weapons: a profiling framework. CyCon U.S. 2016: 94-101 - [c33]Maarten van Wieren, Christian Doerr, Vivian Jacobs, Wolter Pieters:
Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. DPM/QASA@ESORICS 2016: 19-33 - [c32]Laura Fichtner, Wolter Pieters, André Teixeira
:
Cybersecurity as a Politikum: implications of security discourses for infrastructures. NSPW 2016: 36-48 - 2015
- [j11]Marlies Van de Voort, Wolter Pieters, Luca Consoli:
Refining the ethics of computer-made decisions: a classification of moral mediation by ubiquitous machines. Ethics Inf. Technol. 17(1): 41-56 (2015) - [j10]Wolter Pieters, Julian A. Padget
, Francien Dechesne
, Virginia Dignum
, Huib Aldewereld:
Effectiveness of qualitative and quantitative security obligations. J. Inf. Secur. Appl. 22: 3-16 (2015) - [c31]Christian W. Probst
, Jan Willemson, Wolter Pieters:
The Attack Navigator. GraMSec@CSF 2015: 1-17 - [c30]Dan Ionita
, Roel J. Wieringa, Lars Wolos, Jaap Gordijn
, Wolter Pieters:
Using Value Models for Business Risk Analysis in e-Service Networks. PoEM 2015: 239-253 - [c29]Cormac Herley, Wolter Pieters:
"If you were attacked, you'd be sorry": Counterfactuals as security arguments. NSPW 2015: 112-123 - [c28]Jan-Willem Bullee
, Lorena Montoya
, Wolter Pieters, Marianne Junger, Pieter H. Hartel
:
Regression Nodes: Extending Attack Trees with Data from Social Sciences. STAST 2015: 17-23 - 2014
- [j9]Francien Dechesne
, Dina Hadziosmanovic, Wolter Pieters:
Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Secur. Priv. 12(6): 59-66 (2014) - [j8]Wolter Pieters, Zofia Lukszo, Dina Hadziosmanovic, Jan van den Berg:
Reconciling Malicious and Accidental Risk in Cyber Security. J. Internet Serv. Inf. Secur. 4(2): 4-26 (2014) - [c27]Wolter Pieters, Mohsen Davarynejad
:
Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. DPM/SETOP/QASA 2014: 201-215 - [c26]Wolter Pieters, Dina Hadziosmanovic, Francien Dechesne
:
Cyber Security as Social Experiment. NSPW 2014: 15-24 - [e1]Barbara Kordy, Sjouke Mauw
, Wolter Pieters:
Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014. EPTCS 148, 2014 [contents] - [i2]Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse:
Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports 4(12): 1-28 (2014) - 2013
- [j7]Wolter Pieters, Trajce Dimkov, Dusko Pavlovic
:
Security Policy Alignment: A Formal Approach. IEEE Syst. J. 7(2): 275-287 (2013) - [c25]Florian Arnold, Wolter Pieters, Mariëlle Stoelinga
:
Quantitative penetration testing with item response theory. IAS 2013: 49-54 - [c24]Wolter Pieters:
Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. CloudCom (2) 2013: 39-44 - [c23]Sören Bleikertz, Toni Mastelic
, Sebastian Pape
, Wolter Pieters, Trajce Dimkov:
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers. IC2E 2013: 78-87 - [c22]Wolter Pieters, Julian A. Padget
, Francien Dechesne
, Virginia Dignum
, Huib Aldewereld:
Obligations to enforce prohibitions: on the adequacy of security policies. SIN 2013: 54-61 - 2012
- [c21]Olga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters:
Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information. CyberSecurity 2012: 103-112 - [c20]Wolter Pieters, Sanne H. G. van der Ven, Christian W. Probst:
A move in the security measurement stalemate: elo-style ratings to quantify vulnerability. NSPW 2012: 1-14 - [p3]Christian W. Probst
, Martina Angela Sasse, Wolter Pieters, Trajce Dimkov, Erik Luysterborg, Michel Arnaud:
Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. European Data Protection 2012: 251-265 - 2011
- [j6]André van Cleeff, Wolter Pieters, Roel J. Wieringa, Frits van Tiel:
Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Inf. Secur. Tech. Rep. 16(3-4): 142-149 (2011) - [j5]Wolter Pieters:
Representing Humans in System Security Models: An Actor-Network Approach. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 75-92 (2011) - [j4]Wolter Pieters:
The (Social) Construction of Information Security. Inf. Soc. 27(5): 326-335 (2011) - [c19]André van Cleeff, Trajce Dimkov, Wolter Pieters, Roel J. Wieringa:
Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. ICITCS 2011: 51-67 - [c18]Wolter Pieters, Lizzie Coles-Kemp:
Reducing normative conflicts in information security. NSPW 2011: 11-24 - [c17]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Training students to steal: a practical assignment in computer security education. SIGCSE 2011: 21-26 - [p2]Wolter Pieters:
Security and Privacy in the Clouds: A Bird's Eye View. Computers, Privacy and Data Protection 2011: 445-457 - [i1]Sabrina De Capitani di Vimercati, Wolter Pieters, Christian W. Probst:
Secure Architectures in the Cloud (Dagstuhl Seminar 11492). Dagstuhl Reports 1(12): 11-26 (2011) - 2010
- [c16]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Two methodologies for physical penetration testing using social engineering. ACSAC 2010: 399-408 - [c15]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations. CCS 2010: 666-668 - [c14]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations. GreenCom/CPSCom 2010: 727-732 - [c13]André van Cleeff, Wolter Pieters, Roel J. Wieringa:
Benefits of Location-Based Access Control: A Literature Study. GreenCom/CPSCom 2010: 739-746 - [c12]Lucie Langer, Hugo Jonker, Wolter Pieters:
Anonymity and Verifiability in Voting: Understanding (Un)Linkability. ICICS 2010: 296-310 - [c11]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain. ARSPA-WITS 2010: 112-129 - [c10]Hugo Jonker, Wolter Pieters:
Anonymity in Voting Revisited. Towards Trustworthy Elections 2010: 216-230 - [p1]Wolter Pieters:
Verifiability of Electronic Voting: Between Confidence and Trust. Data Protection in a Profiled World 2010: 157-175
2000 – 2009
- 2009
- [j3]Wolter Pieters, André van Cleeff:
The Precautionary Principle in a World of Digital Dependencies. Computer 42(6): 50-56 (2009) - [j2]Wolter Pieters, Luca Consoli:
Vulnerabilities and responsibilities: dealing with monsters in computer security. J. Inf. Commun. Ethics Soc. 7(4): 243-257 (2009) - [c9]André van Cleeff, Wolter Pieters, Roel J. Wieringa:
Security Implications of Virtualization: A Literature Study. CSE (3) 2009: 353-358 - [c8]Wolter Pieters, Qiang Tang:
Data Is Key: Introducing the Data-Based Access Control Paradigm. DBSec 2009: 240-251 - [c7]Wolter Pieters:
Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond. VoteID 2009: 172-190 - 2008
- [c6]Bart Jacobs, Wolter Pieters:
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. FOSAD 2008: 121-144 - 2007
- [j1]Wolter Pieters, Robert van Haren:
Temptations of turnout and modernisation: E-voting discourses in the UK and The Netherlands. J. Inf. Commun. Ethics Soc. 5(4): 276-292 (2007) - 2006
- [c5]Wolter Pieters:
Internet Voting: A Conceptual Challenge to Democracy. Social Inclusion 2006: 89-103 - [c4]Wolter Pieters:
Acceptance of Voting Technology: Between Confidence and Trust. iTrust 2006: 283-297 - 2005
- [c3]Flavio D. Garcia, Ichiro Hasuo
, Wolter Pieters, Peter van Rossum:
Provable anonymity. FMSE 2005: 63-72 - [c2]Engelbert Hubbers, Bart Jacobs, Wolter Pieters:
RIES - Internet Voting in Action. COMPSAC (1) 2005: 417-424 - [c1]Bart Jacobs, Wolter Pieters, Martijn Warnier
:
Statically checking confidentiality via dynamic labels. WITS 2005: 50-56
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint