1. 2018
  2. Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

    van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Hernandez Ganan, C., Klievink, B., Christin, N. & van Eeten, M. 15 Aug 2018 Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1009-1026 18 p.

    Research output: Scientific - peer-reviewConference contribution

  3. Rotten apples or bad harvest? What we are measuring when we are measuring abuse

    Tajalizadehkhoob, S., Böhme, R., Gañán, C., Korczyński, M. & Van Eeten, M. 1 Apr 2018 In : ACM Transactions on Internet Technology. 18, 4, 49

    Research output: Scientific - peer-reviewArticle

  4. Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens

    Cetin, O., Altena, E. M., Hernandez Ganan, C. & van Eeten, M. 2018 Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, p. 251-263

    Research output: Scientific - peer-reviewConference contribution

  5. 2017
  6. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

    Tajalizadehkhoob, S., Van Goethem, T., Korczynski, M., Noroozian, A., Böhme, R., Moore, T., Joosen, W. & van Eeten, M. 3 Nov 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery (ACM), p. 553-567

    Research output: Scientific - peer-reviewConference contribution

  7. Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs

    Korczynski, M., Tajalizadehkhoob, S., Noroozian, A., Wullink, M., Hesselman, C. & Eeten, M. V. 28 Jun 2017 Proceedings of 2nd IEEE European Symposium on Security and Privacy (EuroS&P) 2017. Institute of Electrical and Electronics Engineers Inc., p. 579-594 16 p. 7962004

    Research output: Scientific - peer-reviewConference contribution

  8. Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications

    Bisogni, F., Asghari, H. & van Eeten, M. 27 Jun 2017 Proceedings of 16th Annual Workshop on the Economics of Information Security 2017. 29 p. 54

    Research output: Scientific - peer-reviewConference contribution

  9. The role of hosting providers in fighting command and control infrastructure of financial malware

    Tajalizadehkhoob, S., Hernandez Ganan, C., Noroozian, A. & Van Eeten, M. 2 Apr 2017 Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017. Association for Computing Machinery (ACM), p. 575-586 12 p.

    Research output: Scientific - peer-reviewConference contribution

  10. Discerning Novel Value Chains in Financial Malware: On the Economic Incentives and Criminal Business Models in Financial Malware Schemes

    van Wegberg, R. S., Klievink, A. J. & van Eeten, M. J. G. Feb 2017 In : European Journal on Criminal Policy and Research. p. 1-20 20 p.

    Research output: Scientific - peer-reviewArticle

  11. Abuse reporting and the fight against cybercrime

    Jhaveri, M. H., Cetin, F., Gañán, C., Moore, T. & Eeten, M. V. 2017 In : ACM Computing Surveys (CSUR). 49, 4, p. 1-27 27 p., 68

    Research output: Scientific - peer-reviewArticle

  12. Beyond the pretty penny: the Economic Impact of Cybercrime

    Gañán, C. H., Ciere, M. & van Eeten, M. 2017 Proceedings of the 2017 New Security Paradigms Workshop on ZZZ. Association for Computing Machinery (ACM), p. 35-45 11 p.

    Research output: Scientific - peer-reviewConference contribution

Previous 1 2 3 4 5 6 7 8 ...13 Next

ID: 105447