M.J.G. van Eeten
18 records found
1
Beyond Accuracy: A Mixed-Method Exploration of Hash Database Verification
Focusing on the Detection of Child Sexual Abuse Material and Terrorist Content Online
Adoption of AI in Cybersecurity
Bridging the Gap Between Innovation and Application
Despite the increased importance, not all organisations have the same resources and knowledge when it c ...
The Risks and Regulation of Decentralized Finance
A Recommendation to Policy Makers
Exploring the practice of organisational Security Patch Management from a socio-technical perspective
Using a Mixed Methods Approach to investigate IT-practitioners’ decision-making and patch activity
Behind the Botnet
Evaluating Avalanche's security controls using a reconstruction of its anatomy from forensic evidence
In this wo ...
People ignore design that ignores people
Understanding the impact of security training on the security behaviour of employees within an organisational context
Have you updated your lightbulb?
Solving IoT vulnerabilities through governance
Looking under the Streetlights
Evaluating Cyber Threat Intelligence Feeds Using Quantitative Metrics and User Appreciation Scores
CAML-IDS
A framework for the correct assessment of machine learning-based intrusion detection systems
The Network Predictors
Monitoring Network Measurements To Predict Corporate Performance Before It Is Public Knowledge
Development of Injected Code Attacks in Online Banking Fraud Incidents
An exploratory study for understanding the evolution of code used by cyber criminals in financial malware
Targeting financial organisations with DDoS: a multi-sided perspective
Comparing patterns in AmpPot data to experts view on target selection in the financial sector