Qingxin Mao, Daisuke Makita, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto (2024), Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot, In Journal of Information Processing Volume 32 p.731-747.
Tom-Martijn Roelofs, Eduardo Barbaro, Svetlana Pekarskikh, Katarzyna Orzechowska, Marta Kwapień, Jakub Tyrlik, Dinu Smadu, Michel van Eeten, Yury Zhauniarovich (2024), Finding Harmony in the Noise: Blending Security Alerts for Attack Detection, In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing p.1385-1394, ACM.
Hilmy Hanif, J.E. Constantino Torres, M.T. Sekwenz, M.J.G. van Eeten, J. Ubacht, Ben Wagner, Y. Zhauniarovich (2024), Navigating the EU AI Act Maze using a Decision-Tree Approach, In ACM Journal on Responsible Computing.
Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten (2024), The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts, In Proceedings of the 33rd USENIX Security Symposium p.7049-7066, USENIX Association.
Mathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin (2023), Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules, In CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security p.2770–2784, ACM.
Yin Minn Pa Pa, Shunsuke Tanizaki, Tetsui Kou, Michel Van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto (2023), An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware, In Proceedings of CSET 2023 - 16th Cyber Security Experimentation and Test Workshop p.10-18, ACM.
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos H. Gañán (2023), Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries, In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023 p.513-526, ACM.
S. de Smale, Rik van Dijk, X.B. Bouwman, Jeroen van der Ham, M.J.G. van Eeten (2023), No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information, In Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023 p.1980-1996, IEEE.
Bernardus Jansen, Natalia Kadenko, Dennis Broeders, Michel van Eeten, Kevin Borgolte, Tobias Fiebig (2023), Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions, In Government Information Quarterly Volume 40.
E. C. Oomens, R. S. van Wegberg, A. J. Klievink, M. J.G. van Eeten (2023), To trust or to restrict?–mapping professional perspectives on intelligence powers and oversight in the Netherlands using Q-methodology, In Intelligence and National Security Volume 39 p.40-63.