Michel van Eeten

Michel van Eeten

Technische Universiteit Delft

H-index: 38

Europe-Netherlands

About Michel van Eeten

Michel van Eeten, With an exceptional h-index of 38 and a recent h-index of 26 (since 2020), a distinguished researcher at Technische Universiteit Delft, specializes in the field of Cybersecurity, Internet Measurement, Governance, Security Economics, Critical Infrastructure Protection.

His recent articles reflect a diverse array of research interests and contributions to the field:

Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network

Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors

To trust or to restrict?–mapping professional perspectives on intelligence powers and oversight in the Netherlands using Q-methodology

Finding Harmony in the Noise: Blending Security Alerts for Attack Detection

No one drinks from the firehose: How organizations filter and prioritize vulnerability information

Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries

Tough Decisions? Supporting System Classification According to the AI Act

Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices

Michel van Eeten Information

University

Position

Professor Governance of Cybersecurity

Citations(all)

6551

Citations(since 2020)

2871

Cited By

4772

hIndex(all)

38

hIndex(since 2020)

26

i10Index(all)

98

i10Index(since 2020)

62

Email

University Profile Page

Technische Universiteit Delft

Google Scholar

View Google Scholar Profile

Michel van Eeten Skills & Research Interests

Cybersecurity

Internet Measurement

Governance

Security Economics

Critical Infrastructure Protection

Top articles of Michel van Eeten

Title

Journal

Author(s)

Publication Date

Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network

Takayuki Sasaki

Takaya Noma

Yudai Morii

Toshiya Shimura

Michel van Eeten

...

2024/2/1

Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors

Sandra Rivera Pérez

Michel van Eeten

Carlos H Gañán

2024/2/1

To trust or to restrict?–mapping professional perspectives on intelligence powers and oversight in the Netherlands using Q-methodology

Intelligence and National Security

EC Oomens

RS van Wegberg

AJ Klievink

MJG van Eeten

2024/1/2

Finding Harmony in the Noise: Blending Security Alerts for Attack Detection

Tom-Martijn Roelofs

Eduardo Barbaro

Svetlana Pekarskikh

Katarzyna Orzechowska

Marta Kwapień

...

2024

No one drinks from the firehose: How organizations filter and prioritize vulnerability information

Stephanie de Smale

Rik van Dijk

Xander Bouwman

Jeroen van der Ham

Michel van Eeten

2023/5/21

Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries

Arwa Abdulkarim Al Alsadi

Kaichi Sameshima

Katsunari Yoshioka

Michel van Eeten

Carlos H Gañán

2023/10

Tough Decisions? Supporting System Classification According to the AI Act

Hilmy Hanif

Jorge Constantino

Marie-Therese Sekwenz

Michel Van Eeten

Jolien Ubacht

...

2023

Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices

arXiv preprint arXiv:2310.00942

Veerle van Harten

Carlos Hernández Gañán

Michel van Eeten

Simon Parkin

2023/10/2

Two Sides of the Shield: Understanding Protective {DNS} adoption factors

Elsa Rodríguez

Radu Anghel

Simon Parkin

Michel Van Eeten

Carlos Gañán

2023

Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions

Government Information Quarterly

Bernardus Jansen

Natalia Kadenko

Dennis Broeders

Michel van Eeten

Kevin Borgolte

...

2023/10/1

Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding {IoT} Manufacturers Legally Responsible

Lorenz Kustosch

Carlos Gañán

Mattis van’t Schip

Michel van Eeten

Simon Parkin

2023/8

The magazine archive includes every article published in Communications of the ACM for over the past 50 years.

Communications of the ACM

Gary Lewandowski

Dennis J Bouvier

Tzu-Yi Chen

Robert McCartney

Kate Sanders

...

2010/7

Examining consumer reviews to understand security and privacy issues in the market of smart home devices

Simon Vetrivel

Swaathi and van Harten

Veerle and Ganan

Carlos H and van Eeten

Michel and Parkin

2023/6

An attacker’s dream? exploring the capabilities of chatgpt for developing malware

Yin Minn Pa Pa

Shunsuke Tanizaki

Tetsui Kou

Michel Van Eeten

Katsunari Yoshioka

...

2023/8/7

Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules

Mathew Vermeer

Natalia Kadenko

Michel van Eeten

Carlos Gañán

Simon Parkin

2023/11/15

Domainprio: Prioritizing domain name investigations to improve SOC efficiency

IEEE Access

Daiki Chiba

Mitsuaki Akiyama

Yuto Otsuki

Hiroki Hada

Takeshi Yagi

...

2022/3/23

No spring chicken: quantifying the lifespan of exploits in iot malware using static and dynamic analysis

Arwa Abdulkarim Al Alsadi

Kaichi Sameshima

Jakob Bleier

Katsunari Yoshioka

Martina Lindorfer

...

2022/5/30

Disposable botnets: long-term analysis of IoT botnet infrastructure

Journal of Information Processing

Rui Tanabe

Tsuyufumi Watanabe

Akira Fujita

Ryoichi Isawa

Carlos Gañán

...

2022

Ruling the rules: Quantifying the evolution of rulesets, alerts and incidents in network intrusion detection

Mathew Vermeer

Michel van Eeten

Carlos Gañán

2022

Helping hands: Measuring the impact of a large threat intelligence sharing community

Xander Bouwman

Victor Le Pochat

Pawel Foremski

Tom Van Goethem

Carlos H Gañán

...

2022

See List of Professors in Michel van Eeten University(Technische Universiteit Delft)

Co-Authors

H-index: 87
Stefan Savage

Stefan Savage

University of California, San Diego

H-index: 83
Ross Anderson

Ross Anderson

University of Cambridge

H-index: 63
Arjen Boin

Arjen Boin

Universiteit Leiden

H-index: 52
Rainer Böhme

Rainer Böhme

Universität Innsbruck

H-index: 37
Milton Mueller

Milton Mueller

Georgia Institute of Technology

H-index: 36
Johannes M. Bauer

Johannes M. Bauer

Michigan State University

academic-engine