Michel van Eeten
Orcid: 0000-0002-0338-2812Affiliations:
- Delft University of Technology, Netherlands
According to our database1,
Michel van Eeten
authored at least 78 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot.
J. Inf. Process., 2024
IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their Interactions.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
2023
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions.
Gov. Inf. Q., October, 2023
Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices.
CoRR, 2023
Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Proceedings of the 32nd USENIX Security Symposium, 2023
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Legal Knowledge and Information Systems, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
J. Inf. Process., 2022
IEEE Access, 2022
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
J. Cybersecur., 2021
"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
IEICE Trans. Commun., 2020
IEEE Secur. Priv., 2020
Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Proceedings of the 28th USENIX Security Symposium, 2019
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
ACM Trans. Internet Techn., 2018
Internet Policy Rev., 2018
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
Proceedings of the 2017 New Security Paradigms Workshop, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Dagstuhl Reports, 2016
J. Cybersecur., 2016
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
IEEE Secur. Priv., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 14th IFIP Networking Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
First Monday, 2014
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014
2013
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
2010
Int. J. Syst. Syst. Eng., 2010
The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
2008
Proceedings of the Critical Information Infrastructure Security, 2008
2006
Int. J. Crit. Infrastructures, 2006
Int. J. Crit. Infrastructures, 2006