Samaneh Tajalizadehkhoob, C. Hernandez Ganan, Arman Noroozian, Michel Van Eeten (2017), The role of hosting providers in fighting command and control infrastructure of financial malware, In Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017 p.575-586, ACM.

Qasim Lone, Matthew Luckie, Maciej Korczyński, Michel Van Eeten (2017), Using loops observed in traceroute to infer the ability to spoof, Steve Uhlig, Johanna Amann, Mohamed Ali Kaafar (Eds.), In Passive and Active Measurement - 18th International Conference, PAM 2017, Proceedings p.229-241, Springer.

Marcus Märtens, Hadi Asghari, Michel van Eeten, Piet Van Mieghem (2016), A Time-dependent SIS-model for Long-term Computer Worm Evolution, In IEEE Conference on Communications and Network Security 2016 p.1-9, IEEE.

Samaneh Tajalizadehkhoob, Maciej Korczyński, Arman Noroozian, Carlos Gañán, Michel Van Eeten (2016), Apples, oranges and hosting providers: Heterogeneity and security in the hosting market, In Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium p.289-297, IEEE.

Hadi Asghari, Michel van Eeten, Johannes M. Bauer (2016), Economics of cybersecurity, In Handbook on the Economics of the Internet p.262-287, Edward Elgar Publishing.

Markus Riek, Rainer Boehme, Michael Ciere, Carlos Hernandez Ganan, Michel van Eeten (2016), Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six EU countries, In Proceedings of Workshop of Economics of Information Security p.1-43.

Michel van Eeten, Qasim Lone, Giovane Moreira Moura, Hadi Asghari, Maciej Korczynski (2016), Evaluating the Impact of AbuseHUB on Botnet Mitigation, Cornell University Press.

Willem van Driel, Carlos Hernandez Ganan, M Lobbezoo, Michel van Eeten (2016), Risk Management for Third Party Payment Networks, In Proceedings of Workshop of Economics of Information Security 2016 p.1-10.

F.O. Cetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore (2016), Understanding the role of sender reputation in abuse reporting and cleanup, In Journal of Cybersecurity Volume 2 p.83-98.

Arman Noroozian, Maciej Korczynski, Carlos Hernandez Ganan, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten (2016), Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service, In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, Springer.