Michel van Eeten
Person information
- affiliation: Delft University of Technology, Netherlands
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [c28]Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks. EuroS&P 2019: 326-339 - [c27]Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots. IM 2019: 134-143 - [c26]Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten:
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. NDSS 2019 - [c25]Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. USENIX Security Symposium 2019: 1341-1356 - 2018
- [j10]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. ACM Trans. Internet Techn. 18(4): 49:1-49:25 (2018) - [c24]Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. SOUPS @ USENIX Security Symposium 2018: 251-263 - [c23]Qasim Lone, Matthew J. Luckie, Maciej Korczynski, Hadi Asghari, Mobin Javed, Michel van Eeten:
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer. TMA 2018: 1-8 - [c22]Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Gañán, Bram Klievink, Nicolas Christin, Michel van Eeten:
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. USENIX Security Symposium 2018: 1009-1026 - 2017
- [j9]Mohammad Hanif Jhaveri, Orçun Çetin, Carlos Gañán, Tyler Moore, Michel van Eeten:
Abuse Reporting and the Fight Against Cybercrime. ACM Comput. Surv. 49(4): 68:1-68:27 (2017) - [c21]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. ACM Conference on Computer and Communications Security 2017: 553-567 - [c20]Samaneh Tajalizadehkhoob, Carlos Gañán
, Arman Noroozian, Michel van Eeten:
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware. AsiaCCS 2017: 575-586 - [c19]Maciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten:
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs. EuroS&P 2017: 579-594 - [c18]Carlos Hernandez Gañán, Michael Ciere, Michel van Eeten:
Beyond the pretty penny: the Economic Impact of Cybercrime. NSPW 2017: 35-45 - [c17]Qasim Lone, Matthew J. Luckie, Maciej Korczynski, Michel van Eeten:
Using Loops Observed in Traceroute to Infer the Ability to Spoof. PAM 2017: 229-241 - [c16]Michael Ciere, Carlos Gañán, Michel van Eeten:
Partial Device Fingerprints. ECML/PKDD (2) 2017: 222-237 - [i5]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. CoRR abs/1702.01624 (2017) - [i4]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - 2016
- [j8]Tyler Moore, David J. Pym, Michel van Eeten:
Introduction. J. Cybersecurity 2(1): 1-2 (2016) - [j7]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the role of sender reputation in abuse reporting and cleanup. J. Cybersecurity 2(1): 83-98 (2016) - [c15]Marcus Märtens, Hadi Asghari, Michel van Eeten, Piet Van Mieghem:
A time-dependent SIS-model for long-term computer worm evolution. CNS 2016: 207-215 - [c14]Maciej Korczynski, Michal Król, Michel van Eeten:
Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates. Internet Measurement Conference 2016: 271-278 - [c13]Samaneh Tajalizadehkhoob, Maciej Korczynski, Arman Noroozian, Carlos Gañán, Michel van Eeten:
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market. NOMS 2016: 289-297 - [c12]Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten:
Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service. RAID 2016: 368-389 - [c11]Yosuke Kikuchi, Hiroshi Mori, Hiroki Nakano, Katsunari Yoshioka, Tsutomu Matsumoto, Michel van Eeten:
Evaluating Malware Mitigation by Android Market Operators. CSET @ USENIX Security Symposium 2016 - [i3]Michel van Eeten, Qasim Lone, Giovane C. M. Moura, Hadi Asghari, Maciej Korczynski:
Evaluating the Impact of AbuseHUB on Botnet Mitigation. CoRR abs/1612.03101 (2016) - [i2]Arman Noroozian, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten:
Developing Security Reputation Metrics for Hosting Providers. CoRR abs/1612.03641 (2016) - [i1]Tyler W. Moore, Christian W. Probst, Kai Rannenberg, Michel van Eeten:
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). Dagstuhl Reports 6(11): 63-89 (2016) - 2015
- [j6]Hadi Asghari, Michel J. G. van Eeten, Johannes M. Bauer:
Economics of Fighting Botnets: Lessons from a Decade of Mitigation. IEEE Security & Privacy 13(5): 16-23 (2015) - [c10]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten:
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. ACSAC 2015: 391-400 - [c9]Carlos Gañán, Orçun Çetin, Michel van Eeten:
An Empirical Analysis of ZeuS C&C Lifetime. AsiaCCS 2015: 97-108 - [c8]Giovane C. M. Moura, Carlos Gañán, Qasim Lone, Payam Poursaied, Hadi Asghari, Michel van Eeten:
How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation. Networking 2015: 1-9 - [c7]Hadi Asghari, Michael Ciere, Michel J. G. van Eeten:
Post-Mortem of a Zombie: Conficker Cleanup After Six Years. USENIX Security Symposium 2015: 1-16 - [c6]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup. WEIS 2015 - 2014
- [j5]Axel Arnbak, Hadi Asghari, Michel van Eeten, Nico Van Eijk:
Security collapse in the HTTPS market. Commun. ACM 57(10): 47-55 (2014) - [j4]George N. Dafermos, Michel J. G. van Eeten:
Images of innovation in discourses of free and open source software. First Monday 19(12) (2014) - [c5]Qasim Lone, Giovane C. M. Moura, Michel van Eeten:
Towards Incentivizing ISPs to Mitigate Botnets. AIMS 2014: 57-62 - 2013
- [j3]Michel van Eeten, Milton Mueller:
Where is the governance in Internet governance? New Media & Society 15(5): 720-736 (2013) - [c4]Hadi Asghari, Michel van Eeten, Milton L. Mueller:
Internet Measurements and Public Policy: Mind the Gap. CSET 2013 - [p1]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - 2012
- [c3]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - 2010
- [c2]Michel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, Dave Rand:
The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. WEIS 2010
2000 – 2009
- 2008
- [c1]Eric A. M. Luiijf
, Albert Nieuwenhuijs, Marieke H. A. Klaver, Michel van Eeten, Edite Cruz:
Empirical Findings on Critical Infrastructure Dependencies in Europe. CRITIS 2008: 302-310 - 2006
- [j2]Mark de Bruijne, Michel van Eeten, Emery Roe, Paul Schulman:
Assuring high reliability of service provision in critical infrastructures. IJCIS 2(2/3): 231-246 (2006) - [j1]Michel van Eeten, Hans de Bruijn, Mirjam Kars, Haiko Van Der Voort, Jaap Van Till:
The governance of cybersecurity: a framework for policy. IJCIS 2(4): 357-378 (2006)
Coauthor Index
aka: Carlos Hernandez Gañán

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-10-02 05:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint