Qingxin Mao, Daisuke Makita, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto (2024), Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot, In Journal of Information Processing Volume 32 p.731-747.

Hilmy Hanif, J.E. Constantino Torres, M.T. Sekwenz, M.J.G. van Eeten, J. Ubacht, Ben Wagner, Y. Zhauniarovich (2024), Navigating the EU AI Act Maze using a Decision-Tree Approach, In ACM Journal on Responsible Computing.

Mathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin (2023), Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules, In CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security p.2770–2784, Association for Computing Machinery (ACM).

Yin Minn Pa Pa, Shunsuke Tanizaki, Tetsui Kou, Michel Van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto (2023), An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware, In Proceedings of CSET 2023 - 16th Cyber Security Experimentation and Test Workshop p.10-18, Association for Computing Machinery (ACM).

Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos H. Gañán (2023), Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries, In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023 p.513-526, Association for Computing Machinery (ACM).

S. de Smale, Rik van Dijk, X.B. Bouwman, Jeroen van der Ham, M.J.G. van Eeten (2023), No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information, In Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023 p.1980-1996, IEEE.

Bernardus Jansen, Natalia Kadenko, Dennis Broeders, Michel van Eeten, Kevin Borgolte, Tobias Fiebig (2023), Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions, In Government Information Quarterly Volume 40.

E. C. Oomens, R. S. van Wegberg, A. J. Klievink, M. J.G. van Eeten (2023), To trust or to restrict?–mapping professional perspectives on intelligence powers and oversight in the Netherlands using Q-methodology, In Intelligence and National Security Volume 39 p.40-63.

Hilmy Hanif, Jorge Constantino, Marie Therese Sekwenz, Michel Van Eeten, Jolien Ubacht, Ben Wagner, Yury Zhauniarovich (2023), Tough Decisions? Supporting System Classification According to the AI Act, Giovanni Sileno, Jerry Spanakis, Gijs van Dijck (Eds.), In Legal Knowledge and Information Systems - JURIX 2023 p.353-358, IOS Press.

Q.B. Lone, Alisa Frik, Matthew Luckie, MacIej Korczyński, M.J.G. van Eeten, C. Hernandez Ganan (2022), Deployment of Source Address Validation by Network Operators: A Randomized Control Trial, In Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022 p.2361-2378, IEEE.