1. 2018
  2. 2017
  3. The Right of Access as a Tool for Privacy Governance: Findings from Individual Requests & Proposal for a Crowd-sourced Dataset of Privacy Practices

    Asghari, H., Mahieu, R., Mittal, P. & Greenstadt, R. 18 Jul 2017 Proceedings of 17th Privacy Enhancing Technologies Symposium. p. 1-2

    Research output: Scientific - peer-reviewConference contribution

  4. Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications

    Bisogni, F., Asghari, H. & van Eeten, M. 27 Jun 2017 Proceedings of 16th Annual Workshop on the Economics of Information Security 2017. 29 p. 54

    Research output: Scientific - peer-reviewConference contribution

  5. 2016
  6. A Time-dependent SIS-model for Long-term Computer Worm Evolution

    Märtens, M., Asghari, H., van Eeten, M. & Van Mieghem, P. 2016 IEEE Conference on Communications and Network Security 2016. Piscataway, NJ: IEEE, p. 1-9 9 p.

    Research output: Scientific - peer-reviewConference contribution

  7. Economics of cybersecurity

    Asghari, H., van Eeten, M. & Bauer, J. M. 2016 Handbook on the Economics of the Internet. Edgar Elgar Publishing, p. 262-287

    Research output: ScientificChapter

  8. Evaluating the Impact of AbuseHUB on Botnet Mitigation

    van Eeten, M., Lone, Q., Moreira Moura, G., Asghari, H. & Korczynski, M. 2016 Cornell University Library - arXiv.org. 64 p.

    Research output: ScientificReport

  9. 2015
  10. Economics of fighting botnets: Lessons from a decade of mitigation

    Asghari, H., van Eeten, M. J. G. & Bauer, J. M. 2015 In : IEEE Security & Privacy Magazine: building confidence in a networked world. 13, 5, p. 16-23 8 p.

    Research output: Scientific - peer-reviewArticle

  11. How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation

    Moura, G. C. M., Ganan, C., Lone, Q. B., Poursaied Esfahani, P., Asghari, H. & van Eeten, M. J. G. 2015 Proceedings of the 14th IFIP Networking Conference. Kacimi, R. & Mammeri, Z. (eds.). Piscataway, NJ, USA: IEEE Society, p. 1-9 9 p.

    Research output: Scientific - peer-reviewConference contribution

  12. Post-mortem of a Zombie: Conficker cleanup after six years

    Asghari, H., Ciere, M. & van Eeten, M. J. G. 2015 Proceedings of the 24th USENIX Security Symposium. Jung, J. (ed.). USENIX Association, p. 1-16 16 p.

    Research output: Scientific - peer-reviewConference contribution

Previous 1 2 3 Next

ID: 94636