Michel van Eeten
Technische Universiteit Delft
H-index: 38
Europe-Netherlands
Top articles of Michel van Eeten
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network | Takayuki Sasaki Takaya Noma Yudai Morii Toshiya Shimura Michel van Eeten | 2024/2/1 | |
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors | Sandra Rivera Pérez Michel van Eeten Carlos H Gañán | 2024/2/1 | |
To trust or to restrict?–mapping professional perspectives on intelligence powers and oversight in the Netherlands using Q-methodology | Intelligence and National Security | EC Oomens RS van Wegberg AJ Klievink MJG van Eeten | 2024/1/2 |
Finding Harmony in the Noise: Blending Security Alerts for Attack Detection | Tom-Martijn Roelofs Eduardo Barbaro Svetlana Pekarskikh Katarzyna Orzechowska Marta Kwapień | 2024 | |
No one drinks from the firehose: How organizations filter and prioritize vulnerability information | Stephanie de Smale Rik van Dijk Xander Bouwman Jeroen van der Ham Michel van Eeten | 2023/5/21 | |
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries | Arwa Abdulkarim Al Alsadi Kaichi Sameshima Katsunari Yoshioka Michel van Eeten Carlos H Gañán | 2023/10 | |
Tough Decisions? Supporting System Classification According to the AI Act | Hilmy Hanif Jorge Constantino Marie-Therese Sekwenz Michel Van Eeten Jolien Ubacht | 2023 | |
Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices | arXiv preprint arXiv:2310.00942 | Veerle van Harten Carlos Hernández Gañán Michel van Eeten Simon Parkin | 2023/10/2 |
Two Sides of the Shield: Understanding Protective {DNS} adoption factors | Elsa Rodríguez Radu Anghel Simon Parkin Michel Van Eeten Carlos Gañán | 2023 | |
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions | Government Information Quarterly | Bernardus Jansen Natalia Kadenko Dennis Broeders Michel van Eeten Kevin Borgolte | 2023/10/1 |
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding {IoT} Manufacturers Legally Responsible | Lorenz Kustosch Carlos Gañán Mattis van’t Schip Michel van Eeten Simon Parkin | 2023/8 | |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. | Communications of the ACM | Gary Lewandowski Dennis J Bouvier Tzu-Yi Chen Robert McCartney Kate Sanders | 2010/7 |
Examining consumer reviews to understand security and privacy issues in the market of smart home devices | Simon Vetrivel Swaathi and van Harten Veerle and Ganan Carlos H and van Eeten Michel and Parkin | 2023/6 | |
An attacker’s dream? exploring the capabilities of chatgpt for developing malware | Yin Minn Pa Pa Shunsuke Tanizaki Tetsui Kou Michel Van Eeten Katsunari Yoshioka | 2023/8/7 | |
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules | Mathew Vermeer Natalia Kadenko Michel van Eeten Carlos Gañán Simon Parkin | 2023/11/15 | |
Domainprio: Prioritizing domain name investigations to improve SOC efficiency | IEEE Access | Daiki Chiba Mitsuaki Akiyama Yuto Otsuki Hiroki Hada Takeshi Yagi | 2022/3/23 |
No spring chicken: quantifying the lifespan of exploits in iot malware using static and dynamic analysis | Arwa Abdulkarim Al Alsadi Kaichi Sameshima Jakob Bleier Katsunari Yoshioka Martina Lindorfer | 2022/5/30 | |
Disposable botnets: long-term analysis of IoT botnet infrastructure | Journal of Information Processing | Rui Tanabe Tsuyufumi Watanabe Akira Fujita Ryoichi Isawa Carlos Gañán | 2022 |
Ruling the rules: Quantifying the evolution of rulesets, alerts and incidents in network intrusion detection | Mathew Vermeer Michel van Eeten Carlos Gañán | 2022 | |
Helping hands: Measuring the impact of a large threat intelligence sharing community | Xander Bouwman Victor Le Pochat Pawel Foremski Tom Van Goethem Carlos H Gañán | 2022 |