M.J.G. van Eeten
Please Note
71 records found
1
Understanding public acceptance of data collection by intelligence services in the Netherlands
A factorial survey experiment
Bits and Pieces
Piecing Together Factors of IoT Vulnerability Exploitation
Money for Nothing, Supervision for a Fee
Investigating the Effects of the 5th Anti-Money Laundering Directive on Cryptocurrency Exchanges in the Netherlands
"All Sorts of Other Reasons to Do It"
Explaining the Persistence of Sub-optimal IoT Security Advice
Finding Harmony in the Noise
Blending Security Alerts for Attack Detection
The Unpatchables
Why Municipalities Persist in Running Vulnerable Hosts
Bin there, target that
Analyzing the target selection of IoT vulnerabilities in malware binaries
Pushing boundaries
An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
Alert Alchemy
SOC Workflows and Decisions in the Management of NIDS Rules
No One Drinks From the Firehose
How Organizations Filter and Prioritize Vulnerability Information