1. 2020
  2. Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics

    van Wegberg, R., Miedema, F., Akyazi, U., Noroozian, A., Klievink, B. & van Eeten, M., 2020, Proceedings of The Web Conference (WWW). Association for Computing Machinery (ACM), p. 816-826 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  3. Pay the Piper: DDoS mitigation technique to deter financially-motivated attackers

    Sasaki, T., Hernandez Gañán, C., Yoshioka, K., Van Eeten, M. & Matsumoto, T., 2020, In : IEICE Transactions on Communications. E103B, 4, p. 389-404 16 p.

    Research output: Contribution to journalArticleScientificpeer-review

  4. 2019
  5. Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks

    Cetin, O., Ganan, C., Altena, L., Tajalizadehkhoob, S. & Van Eeten, M., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 326-339 14 p. 8806733

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  6. Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots

    Morishita, S., Hoizumi, T., Ueno, W., Tanabe, R., Hernandez Ganan, C., van Eeten, M., Yoshioka, K. & Matsumoto, T., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. IEEE, p. 134-143 10 p. 8717918

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  7. Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai

    Cetin, O., Hernandez Ganan, C., Altena, L., Kasama, T., Inoue, D., Tamiya, K., Tie, Y., Yoshioka, K. & van Eeten, M., 2019, Network and Distributed System Security Symposium (NDSS) 2019.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  8. Governance Challenges for European CyberSecurity Policies: Stakeholders Views

    Sterlini, P., Massacci, F., Kadenko, N., Fiebig, T. & van Eeten, M., 2019, In : IEEE Security and Privacy.

    Research output: Contribution to journalArticleScientificpeer-review

  9. Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting

    Noroozian, A., Koenders, J., van Veldhuizen, E., Hernandez Ganan, C., Alrwais, S., McCoy, D. & van Eeten, M., 2019, 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, p. 1341--1356

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  10. 2018
  11. Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

    van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Hernandez Ganan, C., Klievink, B., Christin, N. & van Eeten, M., 15 Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1009-1026 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  12. Collectively exercising the right of access: individual effort, societal effect

    Asghari, H., Mahieu, R. & van Eeten, M., 13 Jul 2018, In : Internet Policy Review. 7, 3, 23 p.

    Research output: Contribution to journalArticleScientificpeer-review

  13. Rotten apples or bad harvest? What we are measuring when we are measuring abuse

    Tajalizadehkhoob, S., Böhme, R., Gañán, C., Korczyński, M. & Van Eeten, M., 1 Apr 2018, In : ACM Transactions on Internet Technology. 18, 4, 49.

    Research output: Contribution to journalArticleScientificpeer-review

Previous 1 2 3 4 5 6 7 8 ...14 Next

ID: 105447