1. 2018
  2. Rotten Apples or Bad Harvest?: What We Are Measuring When We Are Measuring Abuse

    Tajalizadehkhoob, S., Böhme, R., Gañán, C., Korczyński, M. & van Eeten, M. 2018 (In preparation) In : ArXiv.org. p. 1-21

    Research output: ScientificArticle

  3. 2017
  4. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

    Tajalizadehkhoob, S., Van Goethem, T., Korczynski, M., Noroozian, A., Böhme, R., Moore, T., Joosen, W. & van Eeten, M. 3 Nov 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery (ACM), p. 553-567

    Research output: Scientific - peer-reviewConference contribution

  5. Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs

    Korczynski, M., Tajalizadehkhoob, S., Noroozian, A., Wullink, M., Hesselman, C. & Eeten, M. V. 28 Jun 2017 Proceedings of 2nd IEEE European Symposium on Security and Privacy (EuroS&P) 2017. Institute of Electrical and Electronics Engineers Inc., p. 579-594 16 p. 7962004

    Research output: Scientific - peer-reviewConference contribution

  6. Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications

    Bisogni, F., Asghari, H. & van Eeten, M. 27 Jun 2017 Proceedings of 16th Annual Workshop on the Economics of Information Security 2017. 29 p. 54

    Research output: Scientific - peer-reviewConference contribution

  7. The role of hosting providers in fighting command and control infrastructure of financial malware

    Tajalizadehkhoob, S., Hernandez Ganan, C., Noroozian, A. & Van Eeten, M. 2 Apr 2017 Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017. Association for Computing Machinery (ACM), p. 575-586 12 p.

    Research output: Scientific - peer-reviewConference contribution

  8. Discerning Novel Value Chains in Financial Malware: On the Economic Incentives and Criminal Business Models in Financial Malware Schemes

    van Wegberg, R. S., Klievink, A. J. & van Eeten, M. J. G. Feb 2017 In : European Journal on Criminal Policy and Research. p. 1-20 20 p.

    Research output: Scientific - peer-reviewArticle

  9. Abuse reporting and the fight against cybercrime

    Jhaveri, M. H., Cetin, F., Gañán, C., Moore, T. & Eeten, M. V. 2017 In : ACM Computing Surveys (CSUR). 49, 4, p. 1-27 27 p., 68

    Research output: Scientific - peer-reviewArticle

  10. Beyond the pretty penny: the Economic Impact of Cybercrime

    Gañán, C. H., Ciere, M. & van Eeten, M. 2017 Proceedings of the 2017 New Security Paradigms Workshop on ZZZ. Association for Computing Machinery (ACM), p. 35-45 11 p.

    Research output: Scientific - peer-reviewConference contribution

  11. Een gezamenlijke rekening?: Over digitale innovatie en samenwerking in een institutional void

    Klievink, B., van Wegberg, R. & van Eeten, M. 2017 In : Bestuurskunde. 2017, 1

    Research output: Scientific - peer-reviewArticle

  12. Inferring the Security Performance of Providers from Noisy and Heterogenous Abuse Datasets

    Noroozian, A., Ciere, M., Korczynski, M., Tajalizadehkhoob, S. & van Eeten, M. 2017 Workshop on the Economics of Information Security.

    Research output: Scientific - peer-reviewConference contribution

Previous 1 2 3 4 5 6 7 8 ...13 Next

ID: 105447