关注
Michel van Eeten
Michel van Eeten
Professor, Governance of Cybersecurity, TU Delft
在 tudelft.nl 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
8412013
The resilient organization
A Boin, MJG Van Eeten
Public Management Review 15 (3), 429-445, 2013
5932013
Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment
M De Bruijne, M Van Eeten
Journal of contingencies and crisis management 15 (1), 18-29, 2007
3492007
Dialogues of the deaf: defining new agendas for environmental deadlocks
M Eeten
2961999
Resilience. Exploring the concept and its meaning
MLC De Bruijne, A Boin, MJG van Eeten
Designing resilience. Preparing for extreme events, 13-32, 2010
2322010
Where is the governance in Internet governance?
MJG Van Eeten, M Mueller
New media & society 15 (5), 720-736, 2013
2252013
Cybersecurity: Stakeholder incentives, externalities, and policy options
JM Bauer, MJG Van Eeten
Telecommunications Policy 33 (10-11), 706-719, 2009
2072009
High reliability and the management of critical infrastructures
P Schulman, E Roe, M van Eeten, M de Bruijne
The Routledge Companion to Strategic Risk Management, 483-501, 2015
1992015
Narrative policy analysis
MMJ Van Eeten
Handbook of public policy analysis, 277-296, 2017
1872017
Recasting intractable policy issues: the wider implications of the Netherlands civil aviation controversy
MJG Van Eeten
Journal of Policy Analysis and Management: The Journal of the Association …, 2001
1822001
The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports
M Van Eeten, A Nieuwenhuijs, E Luiijf, M Klaver, E Cruz
Public Administration 89 (2), 381-400, 2011
1612011
Empirical findings on critical infrastructure dependencies in Europe
E Luiijf, A Nieuwenhuijs, M Klaver, M van Eeten, E Cruz
International Workshop on Critical Information Infrastructures Security, 302-310, 2008
1592008
The role of internet service providers in botnet mitigation an empirical analysis based on spam data
M Van Eeten, JM Bauer, H Asghari, S Tabatabaie, D Rand
TPRC, 2010
1342010
Economics of malware: Security decisions, incentives and externalities
MJG Van Eeten, JM Bauer
OECD, 2008
1222008
‘Dialogues of the deaf’on science in policy controversies
MJG van Eeten
Science and Public Policy 26 (3), 185-192, 1999
1181999
Plug and prey? measuring the commoditization of cybercrime via online anonymous markets
R Van Wegberg, S Tajalizadehkhoob, K Soska, U Akyazi, CH Ganan, ...
27th USENIX security symposium (USENIX security 18), 1009-1026, 2018
1112018
A different cup of {TI}? the added value of commercial threat intelligence
X Bouwman, H Griffioen, J Egbers, C Doerr, B Klievink, M Van Eeten
29th USENIX security symposium (USENIX security 20), 433-450, 2020
932020
Ecology, engineering, and management: reconciling ecosystem rehabilitation and service reliability
MJG Van Eeten, E Roe
Oxford University Press, 2002
792002
Threshold-based resource management: a framework for comprehensive ecosystem management
E Roe, M Van Eeten
Environmental Management 27, 195-214, 2001
782001
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ...
NDSS, 2019
772019
系统目前无法执行此操作,请稍后再试。
文章 1–20