Eeten, Michel van
101  results:
Search for persons X
?
1

VT-SOS: A Cost-effective URL Warning utilizing VirusTotal a..:

, In: NOMS 2024-2024 IEEE Network Operations and Management Symposium,
Takao, Kyohei ; Hiraishi, Chika ; Tanabe, Rui... - p. 1-5 , 2024
 
?
2

Finding Harmony in the Noise: Blending Security Alerts for ..:

, In: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing,
 
?
3

Bin there, target that: Analyzing the target selection of I..:

, In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses,
 
?
4

An Attacker's Dream? Exploring the Capabilities of ChatGPT ..:

, In: Proceedings of the 16th Cyber Security Experimentation and Test Workshop,
 
?
 
?
6

Alert Alchemy: SOC Workflows and Decisions in the Managemen..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Vermeer, Mathew ; Kadenko, Natalia ; van Eeten, Michel.. - p. 2770-2784 , 2023
 
?
7

No One Drinks From the Firehose: How Organizations Filter a..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
de Smale, Stephanie ; van Dijk, Rik ; Bouwman, Xander.. - p. 1980-1996 , 2023
 
?
8

Difficult for Thee, But Not for Me: Measuring the Difficult..:

, In: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P),
Rodriguez, Elsa ; Fukkink, Max ; Parkin, Simon.. - p. 392-409 , 2022
 
?
9

Ruling the Rules : Quantifying the Evolution of Rulesets..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
 
?
10

Disposable Botnets: Long-term Analysis of IoT Botnet Infras..:

Tanabe, Rui ; Watanabe, Tsuyufumi ; Fujita, Akira...
Journal of Information Processing.  30 (2022)  0 - p. 577-590 , 2022
 
?
12

Exposed Infrastructures: Discovery, Attacks and Remediation..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Sasaki, Takayuki ; Fujita, Akira ; Ganan, Carlos H.... - p. 2379-2396 , 2022
 
?
13

Deployment of Source Address Validation by Network Operator..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Lone, Qasim ; Frik, Alisa ; Luckie, Matthew... - p. 2361-2378 , 2022
 
?
14

No Spring Chicken : Quantifying the Lifespan of Exploits..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
 
1-15