Searched for: author%3A%22Van+Goethem%2C+Tom%22
(1 - 3 of 3)
Bouwman, X.B. (author), Le Pochat, Victor (author), Foremski, Pawel (author), Van Goethem, Tom (author), Hernandez Ganan, C. (author), Moura, Giovane C.M. (author), Tajalizadehkhoob, Samaneh (author), Joosen, Wouter (author), van Eeten, M.J.G. (author)
We tracked the largest volunteer security information sharing community known to date: the COVID-19 Cyber Threat Coalition, with over 4,000 members. This enabled us to address long-standing questions on threat information sharing. First, does collaboration at scale lead to better coverage? And second, does making threat data freely available...
conference paper 2022
Le Pochat, Victor (author), Van Goethem, Tom (author), Tajalizadehkhoob, S. (author), Joosen, Wouter (author)
In order to evaluate the prevalence of security and privacy practices on a representative sample of the Web, researchers rely on website popularity rankings such as the Alexa list. While the validity and representativeness of these rankings are rarely questioned, our findings show the contrary: we show for four main rankings how their inherent...
conference paper 2019
Tajalizadehkhoob, S. (author), Van Goethem, Tom (author), Korczynski, M.T. (author), Noroozian, A. (author), Böhme, Rainer (author), Moore, Tyler (author), Joosen, Wouter (author), van Eeten, M.J.G. (author)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical...
conference paper 2017