Follow
Michel van Eeten
Michel van Eeten
Professor, Governance of Cybersecurity, TU Delft
Verified email at tudelft.nl - Homepage
Title
Cited by
Cited by
Year
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
8552013
The resilient organization
A Boin, MJG Van Eeten
Public Management Review 15 (3), 429-445, 2013
6242013
Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment
M De Bruijne, M Van Eeten
Journal of contingencies and crisis management 15 (1), 18-29, 2007
3522007
Dialogues of the deaf: defining new agendas for environmental deadlocks
M Eeten
2971999
Resilience. Exploring the concept and its meaning
MLC De Bruijne, A Boin, MJG van Eeten
Designing resilience. Preparing for extreme events, 13-32, 2010
2412010
Where is the governance in Internet governance?
MJG Van Eeten, M Mueller
New media & society 15 (5), 720-736, 2013
2302013
Cybersecurity: Stakeholder incentives, externalities, and policy options
JM Bauer, MJG Van Eeten
Telecommunications Policy 33 (10-11), 706-719, 2009
2082009
High reliability and the management of critical infrastructures
P Schulman, E Roe, M van Eeten, M de Bruijne
The Routledge Companion to Strategic Risk Management, 483-501, 2015
2022015
Narrative policy analysis
MMJ Van Eeten
Handbook of public policy analysis, 277-296, 2017
1892017
Recasting intractable policy issues: the wider implications of the Netherlands civil aviation controversy
MJG Van Eeten
Journal of Policy Analysis and Management: The Journal of the Association …, 2001
1822001
The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports
M Van Eeten, A Nieuwenhuijs, E Luiijf, M Klaver, E Cruz
Public Administration 89 (2), 381-400, 2011
1642011
Empirical findings on critical infrastructure dependencies in Europe
E Luiijf, A Nieuwenhuijs, M Klaver, M van Eeten, E Cruz
International Workshop on Critical Information Infrastructures Security, 302-310, 2008
1612008
The role of internet service providers in botnet mitigation an empirical analysis based on spam data
M Van Eeten, JM Bauer, H Asghari, S Tabatabaie, D Rand
TPRC, 2010
1322010
Economics of malware: Security decisions, incentives and externalities
MJG Van Eeten, JM Bauer
OECD, 2008
1222008
Plug and prey? measuring the commoditization of cybercrime via online anonymous markets
R Van Wegberg, S Tajalizadehkhoob, K Soska, U Akyazi, CH Ganan, ...
27th USENIX security symposium (USENIX security 18), 1009-1026, 2018
1182018
‘Dialogues of the deaf’on science in policy controversies
MJG van Eeten
Science and Public Policy 26 (3), 185-192, 1999
1181999
A different cup of {TI}? the added value of commercial threat intelligence
X Bouwman, H Griffioen, J Egbers, C Doerr, B Klievink, M Van Eeten
29th USENIX security symposium (USENIX security 20), 433-450, 2020
972020
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ...
NDSS, 2019
802019
Ecology, engineering, and management: reconciling ecosystem rehabilitation and service reliability
MJG Van Eeten, E Roe
Oxford University Press, 2002
802002
Invisible trade-offs of public values: Inside Dutch railways
B Steenhuisen, M van Eeten
Public Money and Management 28 (3), 147-152, 2008
792008
The system can't perform the operation now. Try again later.
Articles 1–20