Hadi Asghari, Michel van Eeten, Johannes M. Bauer (2016), Economics of cybersecurity, In Handbook on the Economics of the Internet p.262-287.
Markus Riek, Rainer Boehme, Michael Ciere, Carlos Hernandez Ganan, Michel van Eeten (2016), Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six EU countries, In Proceedings of Workshop of Economics of Information Security p.1-43.
Michel van Eeten, Qasim Lone, Giovane Moreira Moura, Hadi Asghari, Maciej Korczynski (2016), Evaluating the Impact of AbuseHUB on Botnet Mitigation.
Willem van Driel, Carlos Hernandez Ganan, M Lobbezoo, Michel van Eeten (2016), Risk Management for Third Party Payment Networks, In Proceedings of Workshop of Economics of Information Security 2016 p.1-10.
F.O. Cetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore (2016), Understanding the role of sender reputation in abuse reporting and cleanup, In Journal of Cybersecurity Volume 2 p.83-98.
Arman Noroozian, Maciej Korczynski, Carlos Hernandez Ganan, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten (2016), Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service, In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, Springer.
Maciej Korczynski, Michał Król, Michel Van Eeten (2016), Zone poisoning: The how and where of non-secure DNS dynamic updates, In IMC 2016 - Proceedings of the 2016 ACM Internet Measurement Conference Volume 14-16-November-2016 p.271-278.
Carlos Gañán, F.O. Cetin, Michel van Eeten (2015), An empirical analysis of ZeuS CC lifetime, In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security p.97-108.
A Noroozian, MT Korczynski, ST Tajalizadehkhoob, MJG van Eeten (2015), Developing Security Reputation Metrics for Hosting Providers, In Proceedings of the 8th Usenix Workshop on Cyber Security Experimentation and Test (CSET 15) p.-.
H Asghari, MJG van Eeten, JM Bauer (2015), Economics of fighting botnets: Lessons from a decade of mitigation, In IEEE Security & Privacy Magazine: building confidence in a networked world Volume 13 p.16-23.