Maciej Korczynski, Michał Król, Michel Van Eeten (2016), Zone poisoning: The how and where of non-secure DNS dynamic updates, In IMC 2016 - Proceedings of the 2016 ACM Internet Measurement Conference Volume 14-16-November-2016 p.271-278, ACM.

Carlos Gañán, F.O. Cetin, Michel van Eeten (2015), An empirical analysis of ZeuS CC lifetime, In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security p.97-108, ACM.

A Noroozian, MT Korczynski, ST Tajalizadehkhoob, MJG van Eeten (2015), Developing Security Reputation Metrics for Hosting Providers, In Proceedings of the 8th Usenix Workshop on Cyber Security Experimentation and Test (CSET 15) p.-, USENIX Association.

H Asghari, MJG van Eeten, JM Bauer (2015), Economics of fighting botnets: Lessons from a decade of mitigation, In IEEE Security & Privacy Magazine: building confidence in a networked world Volume 13 p.16-23.

GCM Moura, C Ganan, QB Lone, P Poursaied Esfahani, H Asghari, MJG van Eeten (2015), How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation, R Kacimi, Z Mammeri (Eds.), In Proceedings of the 14th IFIP Networking Conference p.1-9, IEEE.

H Asghari, M Ciere, MJG van Eeten (2015), Post-mortem of a Zombie: Conficker cleanup after six years, J Jung (Eds.), In Proceedings of the 24th USENIX Security Symposium p.1-16, USENIX Association.

A Arnbak, H Asghari, MJG van Eeten (2014), Assessing legal and technical solutions to secure HTTPS, In ACM Queue: tomorrow's computing today Volume 12 p.1-15.

G Dafermos, MJG van Eeten (2014), Images of innovation in discourses of free and open source software, In First Monday Volume 19.

A Arnbak, H Asghari, MJG van Eeten, NANM van Eijk (2014), Security collapse in the HTTPS market, In Communications of the ACM Volume 57 p.47-55.

ST Tajalizadehkhoob, H Asghari, C Ganan, MJG van Eeten (2014), Why them? Extracting intelligence about target selection from zeus financial malware, s.n. (Eds.), In proceedings of the 13th annual workshop on the economics of information security, WEIS 2014 p.1-26, WEIS.