M.J.G. van Eeten
161 records found
1
"All Sorts of Other Reasons to Do It"
Explaining the Persistence of Sub-optimal IoT Security Advice
Finding Harmony in the Noise
Blending Security Alerts for Attack Detection
The Unpatchables
Why Municipalities Persist in Running Vulnerable Hosts
No One Drinks From the Firehose
How Organizations Filter and Prioritize Vulnerability Information
Bin there, target that
Analyzing the target selection of IoT vulnerabilities in malware binaries
Pushing boundaries
An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
Alert Alchemy
SOC Workflows and Decisions in the Management of NIDS Rules
Difficult for Thee, But Not for Me
Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware
DomainPrio
Prioritizing Domain Name Investigations to Improve SOC Efficiency
No Spring Chicken
Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
Disposable Botnets
Long-term Analysis of IoT Botnet Infrastructure
Deployment of Source Address Validation by Network Operators
A Randomized Control Trial
Ruling the Rules
Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection