Explanation and trust: what to tell the user in security and AI? W Pieters Ethics and information technology 13, 53-64, 2011 | 211 | 2011 |
The persuasion and security awareness experiment: reducing the success of social engineering attacks JH Bullée, L Montoya, W Pieters, M Junger, PH Hartel Journal of experimental criminology 11 (1), 97, 2015 | 149 | 2015 |
Privacy and Information Technology J van den Hoven, M Blaauw, W Pieters, M Warnier The Stanford Encyclopedia of Philosophy (Winter 2014 Edition), 2014 | 116 | 2014 |
Provable anonymity FD Garcia, I Hasuo, W Pieters, P van Rossum Proceedings of the 2005 ACM workshop on Formal methods in security …, 2005 | 115 | 2005 |
Two methodologies for physical penetration testing using social engineering T Dimkov, A Van Cleeff, W Pieters, P Hartel Proceedings of the 26th annual computer security applications conference …, 2010 | 92 | 2010 |
Security implications of virtualization: A literature study A van Cleeff, W Pieters, RJ Wieringa 2009 International conference on computational science and engineering 3 …, 2009 | 91 | 2009 |
An adversarial risk analysis framework for cybersecurity D Rios Insua, A Couce‐Vieira, JA Rubio, W Pieters, K Labunets, ... Risk Analysis 41 (1), 16-36, 2021 | 90 | 2021 |
Electronic Voting in the Netherlands: from early Adoption to early Abolishment B Jacobs, W Pieters International School on Foundations of Security Analysis and Design, 121-144, 2007 | 90 | 2007 |
From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks W van der Wagen, W Pieters British Journal of Criminology 55 (3), 578-595, 2015 | 89 | 2015 |
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018 | 83 | 2018 |
The effectiveness of surveillance technology: What intelligence officials are saying M Cayford, W Pieters The Information Society 34 (2), 88-103, 2018 | 77 | 2018 |
Integrated safety and security risk assessment methods: a survey of key characteristics and applications S Chockalingam, D Hadžiosmanović, W Pieters, A Teixeira, P van Gelder Critical Information Infrastructures Security: 11th International Conference …, 2017 | 76 | 2017 |
Bayesian network models in cyber security: a systematic review S Chockalingam, W Pieters, A Teixeira, P van Gelder Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia …, 2017 | 74 | 2017 |
Portunes: representing attack scenarios spanning through the physical, digital and social domain T Dimkov, W Pieters, P Hartel Automated Reasoning for Security Protocol Analysis and Issues in the Theory …, 2011 | 72 | 2011 |
Representing humans in system security models: An actor-network approach W Pieters Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011 | 67 | 2011 |
RIES-internet voting in action E Hubbers, B Jacobs, W Pieters 29th Annual International Computer Software and Applications Conference …, 2005 | 64 | 2005 |
Acceptance of voting technology: between confidence and trust W Pieters International Conference on Trust Management, 283-297, 2006 | 53 | 2006 |
Benefits of location-based access control: A literature study A Van Cleeff, W Pieters, R Wieringa 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010 | 49 | 2010 |
Receipt-freeness as a special case of anonymity in epistemic logic HL Jonker, W Pieters IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006 | 49 | 2006 |
The precautionary principle in a world of digital dependencies W Pieters, A Van Cleeff Computer 42 (6), 50-56, 2009 | 46 | 2009 |