M.J.G. van Eeten
Please Note
71 records found
1
"All Sorts of Other Reasons to Do It"
Explaining the Persistence of Sub-optimal IoT Security Advice
Understanding public acceptance of data collection by intelligence services in the Netherlands
A factorial survey experiment
Bits and Pieces
Piecing Together Factors of IoT Vulnerability Exploitation
Money for Nothing, Supervision for a Fee
Investigating the Effects of the 5th Anti-Money Laundering Directive on Cryptocurrency Exchanges in the Netherlands
The Unpatchables
Why Municipalities Persist in Running Vulnerable Hosts
Finding Harmony in the Noise
Blending Security Alerts for Attack Detection
Bin there, target that
Analyzing the target selection of IoT vulnerabilities in malware binaries
Pushing boundaries
An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions
Alert Alchemy
SOC Workflows and Decisions in the Management of NIDS Rules
No One Drinks From the Firehose
How Organizations Filter and Prioritize Vulnerability Information