Veerle Van Harten, Carlos Hernandez Ganan, Michel Van Eeten, Simon Parkin (2025), "All Sorts of Other Reasons to Do It": Explaining the Persistence of Sub-optimal IoT Security Advice, Naomi Yamashita, Vanessa Evers, Koji Yatani, Xianghua (Sharon) Ding, Bongshin Lee, Marshini Chetty, Phoebe Toups-Dugas (Eds.), In CHI '25: Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, Association for Computing Machinery (ACM).

Arwa Abdulkarim Al Alsadi, Mathew Vermeer, Takayuki Sasaki, Katsunari Yoshioka, Michel Van Eeten, Carlos Gañán (2025), Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation, In ASIA CCS '25: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security p.1032-1049, Association for Computing Machinery (ACM).

Kotaiba Alachkar, Dirk Gaastra, Eduardo Barbaro, Michel van Eeten, Yury Zhauniarovich (2025), EvilEDR: Repurposing EDR as an Offensive Tool, In Proceedings of the 34th USENIX Security Symposium p.587-606.

Max van der Horst, Ricky Kho, Olga Gadyatskaya, Michel Mollema, Michel van Eeten, Yury Zhauniarovich (2025), High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution, In USENIX Security '25.

Cécile Volten, Michel van Eeten, Rolf van Wegberg (2025), Money for Nothing, Supervision for a Fee: Investigating the Effects of the 5th Anti-Money Laundering Directive on Cryptocurrency Exchanges in the Netherlands, In European Journal on Criminal Policy and Research.

Szu-Chun Huang, Harm Griffioen, Max van der Horst, Georgios Smaragdakis, Michel van Eeten, Yury Zhauniarovich (2025), Trust but Verify: An Assessment of Vulnerability Tagging Services, In USENIX Security Symposium p.823-842.

Qingxin Mao, Daisuke Makita, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto (2024), Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot, In Journal of Information Processing Volume 32 p.731-747.

Tom-Martijn Roelofs, Eduardo Barbaro, Svetlana Pekarskikh, Katarzyna Orzechowska, Marta Kwapień, Jakub Tyrlik, Dinu Smadu, Michel van Eeten, Yury Zhauniarovich (2024), Finding Harmony in the Noise: Blending Security Alerts for Attack Detection, In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing p.1385-1394.

Hilmy Hanif, J.E. Constantino Torres, M.T. Sekwenz, M.J.G. van Eeten, J. Ubacht, Ben Wagner, Y. Zhauniarovich (2024), Navigating the EU AI Act Maze using a Decision-Tree Approach, In ACM Journal on Responsible Computing.

Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten (2024), The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts, In Proceedings of the 33rd USENIX Security Symposium p.7049-7066.