default search action
Michel van Eeten
Person information
- affiliation: Delft University of Technology, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Qingxin Mao, Daisuke Makita, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot. J. Inf. Process. 32: 731-747 (2024) - [c54]Kyohei Takao, Chika Hiraishi, Rui Tanabe, Kazuki Takada, Akira Fujita, Daisuke Inoue, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service. NOMS 2024: 1-5 - [c53]Tom-Martijn Roelofs, Eduardo Barbaro, Svetlana Pekarskikh, Katarzyna Orzechowska, Marta Kwapien, Jakub Tyrlik, Dinu Smadu, Michel van Eeten, Yury Zhauniarovich:
Finding Harmony in the Noise: Blending Security Alerts for Attack Detection. SAC 2024: 1385-1394 - [c52]Sandra Rivera Pérez, Michel van Eeten, Carlos Hernandez Gañán:
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors. SP 2024: 1198-1216 - [c51]Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network. SP 2024: 2291-2309 - [c50]Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten:
The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts. USENIX Security Symposium 2024 - [c49]Swaathi Vetrivel, Brennen Bouwmeester, Michel van Eeten, Carlos Hernandez Gañán:
IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their Interactions. USENIX Security Symposium 2024 - 2023
- [j18]Bernardus Jansen, Natalia Kadenko, Dennis Broeders, Michel van Eeten, Kevin Borgolte, Tobias Fiebig:
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions. Gov. Inf. Q. 40(4): 101862 (2023) - [c48]Mathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin:
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules. CCS 2023: 2770-2784 - [c47]Hilmy Hanif, Jorge Constantino, Marie-Therese Sekwenz, Michel van Eeten, Jolien Ubacht, Ben Wagner, Yury Zhauniarovich:
Tough Decisions? Supporting System Classification According to the AI Act. JURIX 2023: 353-358 - [c46]Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán:
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. RAID 2023: 513-526 - [c45]Stephanie de Smale, Rik van Dijk, Xander Bouwman, Jeroen van der Ham, Michel van Eeten:
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information. SP 2023: 1980-1996 - [c44]Yin Minn Pa Pa, Shunsuke Tanizaki, Tetsui Kou, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware. CSET @ USENIX Security Symposium 2023: 10-18 - [c43]Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin:
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible. USENIX Security Symposium 2023: 1487-1504 - [c42]Swaathi Vetrivel, Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin:
Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices. USENIX Security Symposium 2023: 1523-1540 - [c41]Elsa Turcios Rodriguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán:
Two Sides of the Shield: Understanding Protective DNS adoption factors. USENIX Security Symposium 2023: 3135-3152 - [i8]Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin:
Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices. CoRR abs/2310.00942 (2023) - 2022
- [j17]Daiki Chiba, Mitsuaki Akiyama, Yuto Otsuki, Hiroki Hada, Takeshi Yagi, Tobias Fiebig, Michel van Eeten:
DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency. IEEE Access 10: 34352-34368 (2022) - [j16]Rui Tanabe, Tsuyufumi Watanabe, Akira Fujita, Ryoichi Isawa, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure. J. Inf. Process. 30: 577-590 (2022) - [c40]Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán:
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. AsiaCCS 2022: 309-321 - [c39]Mathew Vermeer, Michel van Eeten, Carlos Gañán:
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection. AsiaCCS 2022: 799-814 - [c38]Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán:
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware. EuroS&P 2022: 392-409 - [c37]Qasim Lone, Alisa Frik, Matthew Luckie, Maciej Korczynski, Michel van Eeten, Carlos Gañán:
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial. SP 2022: 2361-2378 - [c36]Takayuki Sasaki, Akira Fujita, Carlos Hernandez Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices. SP 2022: 2379-2396 - [c35]Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium 2022: 1149-1165 - [i7]Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán:
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware. CoRR abs/2203.01683 (2022) - 2021
- [j15]Elsa Turcios Rodriguez, Susanne Verstegen, Arman Noroozian, Daisuke Inoue, Takahiro Kasama, Michel van Eeten, Carlos Hernandez Gañán:
User compliance and remediation success after IoT malware notifications. J. Cybersecur. 7(1) (2021) - [c34]Arman Noroozian, Elsa Turcios Rodriguez, Elmer Lastdrager, Takahiro Kasama, Michel van Eeten, Carlos Gañán:
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts. EuroS&P 2021: 337-352 - [c33]Mathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. EuroS&P 2021: 440-456 - [c32]Brennen Bouwmeester, Elsa Turcios Rodriguez, Carlos Gañán, Michel van Eeten, Simon Parkin:
"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security. SOUPS @ USENIX Security Symposium 2021: 493-512 - [i6]Mannat Kaur, Michel van Eeten, Marijn Janssen, Kevin Borgolte, Tobias Fiebig:
Human Factors in Security Research: Lessons Learned from 2008-2018. CoRR abs/2103.13287 (2021) - 2020
- [j14]Pierantonia Sterlini, Fabio Massacci, Natalia Kadenko, Tobias Fiebig, Michel van Eeten:
Governance Challenges for European Cybersecurity Policies: Stakeholder Views. IEEE Secur. Priv. 18(1): 46-54 (2020) - [j13]Takayuki Sasaki, Carlos Hernandez Gañán, Katsunari Yoshioka, Michel van Eeten, Tsutomu Matsumoto:
Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers. IEICE Trans. Commun. 103-B(4): 389-404 (2020) - [c31]Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten:
Disposable botnets: examining the anatomy of IoT botnet infrastructure. ARES 2020: 7:1-7:10 - [c30]Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten:
A different cup of TI? The added value of commercial threat intelligence. USENIX Security Symposium 2020: 433-450 - [c29]Rolf van Wegberg, Fieke Miedema, Ugur Akyazi, Arman Noroozian, Bram Klievink, Michel van Eeten:
Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics. WWW 2020: 816-826
2010 – 2019
- 2019
- [c28]Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks. EuroS&P 2019: 326-339 - [c27]Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots. IM 2019: 134-143 - [c26]Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten:
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. NDSS 2019 - [c25]Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. USENIX Security Symposium 2019: 1341-1356 - 2018
- [j12]René L. P. Mahieu, Hadi Asghari, Michel van Eeten:
Collectively exercising the right of access: individual effort, societal effect. Internet Policy Rev. 7(3) (2018) - [j11]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. ACM Trans. Internet Techn. 18(4): 49:1-49:25 (2018) - [c24]Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. SOUPS @ USENIX Security Symposium 2018: 251-263 - [c23]Qasim Lone, Matthew J. Luckie, Maciej Korczynski, Hadi Asghari, Mobin Javed, Michel van Eeten:
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer. TMA 2018: 1-8 - [c22]Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Gañán, Bram Klievink, Nicolas Christin, Michel van Eeten:
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. USENIX Security Symposium 2018: 1009-1026 - 2017
- [j10]Mohammad Hanif Jhaveri, Orçun Çetin, Carlos Gañán, Tyler Moore, Michel van Eeten:
Abuse Reporting and the Fight Against Cybercrime. ACM Comput. Surv. 49(4): 68:1-68:27 (2017) - [c21]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567 - [c20]Samaneh Tajalizadehkhoob, Carlos Gañán, Arman Noroozian, Michel van Eeten:
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware. AsiaCCS 2017: 575-586 - [c19]Maciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten:
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs. EuroS&P 2017: 579-594 - [c18]Carlos Hernandez Gañán, Michael Ciere, Michel van Eeten:
Beyond the pretty penny: the Economic Impact of Cybercrime. NSPW 2017: 35-45 - [c17]Qasim Lone, Matthew J. Luckie, Maciej Korczynski, Michel van Eeten:
Using Loops Observed in Traceroute to Infer the Ability to Spoof. PAM 2017: 229-241 - [c16]Michael Ciere, Carlos Gañán, Michel van Eeten:
Partial Device Fingerprints. ECML/PKDD (2) 2017: 222-237 - [i5]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. CoRR abs/1702.01624 (2017) - [i4]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - 2016
- [j9]Tyler Moore, David J. Pym, Michel van Eeten:
Introduction. J. Cybersecur. 2(1): 1-2 (2016) - [j8]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the role of sender reputation in abuse reporting and cleanup. J. Cybersecur. 2(1): 83-98 (2016) - [c15]Marcus Märtens, Hadi Asghari, Michel van Eeten, Piet Van Mieghem:
A time-dependent SIS-model for long-term computer worm evolution. CNS 2016: 207-215 - [c14]Maciej Korczynski, Michal Król, Michel van Eeten:
Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates. Internet Measurement Conference 2016: 271-278 - [c13]Samaneh Tajalizadehkhoob, Maciej Korczynski, Arman Noroozian, Carlos Gañán, Michel van Eeten:
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market. NOMS 2016: 289-297 - [c12]Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten:
Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service. RAID 2016: 368-389 - [c11]Yosuke Kikuchi, Hiroshi Mori, Hiroki Nakano, Katsunari Yoshioka, Tsutomu Matsumoto, Michel van Eeten:
Evaluating Malware Mitigation by Android Market Operators. CSET @ USENIX Security Symposium 2016 - [i3]Michel van Eeten, Qasim Lone, Giovane C. M. Moura, Hadi Asghari, Maciej Korczynski:
Evaluating the Impact of AbuseHUB on Botnet Mitigation. CoRR abs/1612.03101 (2016) - [i2]Arman Noroozian, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten:
Developing Security Reputation Metrics for Hosting Providers. CoRR abs/1612.03641 (2016) - [i1]Tyler W. Moore, Christian W. Probst, Kai Rannenberg, Michel van Eeten:
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). Dagstuhl Reports 6(11): 63-89 (2016) - 2015
- [j7]Hadi Asghari, Michel J. G. van Eeten, Johannes M. Bauer:
Economics of Fighting Botnets: Lessons from a Decade of Mitigation. IEEE Secur. Priv. 13(5): 16-23 (2015) - [c10]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten:
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. ACSAC 2015: 391-400 - [c9]Carlos Gañán, Orçun Çetin, Michel van Eeten:
An Empirical Analysis of ZeuS C&C Lifetime. AsiaCCS 2015: 97-108 - [c8]Giovane C. M. Moura, Carlos Gañán, Qasim Lone, Payam Poursaied, Hadi Asghari, Michel van Eeten:
How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation. Networking 2015: 1-9 - [c7]Hadi Asghari, Michael Ciere, Michel J. G. van Eeten:
Post-Mortem of a Zombie: Conficker Cleanup After Six Years. USENIX Security Symposium 2015: 1-16 - [c6]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup. WEIS 2015 - 2014
- [j6]Axel Arnbak, Hadi Asghari, Michel van Eeten, Nico Van Eijk:
Security collapse in the HTTPS market. Commun. ACM 57(10): 47-55 (2014) - [j5]George N. Dafermos, Michel J. G. van Eeten:
Images of innovation in discourses of free and open source software. First Monday 19(12) (2014) - [c5]Qasim Lone, Giovane C. M. Moura, Michel van Eeten:
Towards Incentivizing ISPs to Mitigate Botnets. AIMS 2014: 57-62 - 2013
- [j4]Michel van Eeten, Milton Mueller:
Where is the governance in Internet governance? New Media Soc. 15(5): 720-736 (2013) - [c4]Hadi Asghari, Michel van Eeten, Milton L. Mueller:
Internet Measurements and Public Policy: Mind the Gap. CSET 2013 - [p1]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - 2012
- [c3]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - 2010
- [j3]H. A. M. (Eric) Luiijf, Albert Nieuwenhuijs, Marieke H. A. Klaver, Michel J. G. van Eeten, Edite Cruz:
Empirical findings on European critical infrastructure dependencies. Int. J. Syst. Syst. Eng. 2(1): 3-18 (2010) - [c2]Michel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, Dave Rand:
The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. WEIS 2010
2000 – 2009
- 2008
- [c1]Eric A. M. Luiijf, Albert Nieuwenhuijs, Marieke H. A. Klaver, Michel van Eeten, Edite Cruz:
Empirical Findings on Critical Infrastructure Dependencies in Europe. CRITIS 2008: 302-310 - 2006
- [j2]Mark de Bruijne, Michel van Eeten, Emery Roe, Paul Schulman:
Assuring high reliability of service provision in critical infrastructures. Int. J. Crit. Infrastructures 2(2/3): 231-246 (2006) - [j1]Michel van Eeten, Hans de Bruijn, Mirjam Kars, Haiko Van Der Voort, Jaap Van Till:
The governance of cybersecurity: a framework for policy. Int. J. Crit. Infrastructures 2(4): 357-378 (2006)
Coauthor Index
aka: Carlos Hernandez Gañán
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint