Michel van Eeten
Michel van Eeten
Professor, Governance of Cybersecurity, TU Delft
Verified email at - Homepage
Cited by
Cited by
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
The resilient organization
A Boin, MJG Van Eeten
Public Management Review 15 (3), 429-445, 2013
Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment
M De Bruijne, M Van Eeten
Journal of contingencies and crisis management 15 (1), 18-29, 2007
Dialogues of the deaf: defining new agendas for environmental deadlocks
M Eeten
Resilience. Exploring the concept and its meaning
MLC De Bruijne, A Boin, MJG van Eeten
Designing resilience. Preparing for extreme events, 13-32, 2010
Where is the governance in Internet governance?
MJG Van Eeten, M Mueller
New media & society 15 (5), 720-736, 2013
Cybersecurity: Stakeholder incentives, externalities, and policy options
JM Bauer, MJG Van Eeten
Telecommunications Policy 33 (10-11), 706-719, 2009
High reliability and the management of critical infrastructures
P Schulman, E Roe, M van Eeten, M de Bruijne
The Routledge Companion to Strategic Risk Management, 483-501, 2015
Narrative policy analysis
MMJ Van Eeten
Handbook of public policy analysis, 277-296, 2017
Recasting intractable policy issues: the wider implications of the Netherlands civil aviation controversy
MJG Van Eeten
Journal of Policy Analysis and Management: The Journal of the Association …, 2001
Empirical findings on critical infrastructure dependencies in Europe
E Luiijf, A Nieuwenhuijs, M Klaver, M van Eeten, E Cruz
International Workshop on Critical Information Infrastructures Security, 302-310, 2008
The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports
M Van Eeten, A Nieuwenhuijs, E Luiijf, M Klaver, E Cruz
Public Administration 89 (2), 381-400, 2011
The role of internet service providers in botnet mitigation an empirical analysis based on spam data
M Van Eeten, JM Bauer, H Asghari, S Tabatabaie, D Rand
TPRC, 2010
Economics of malware: Security decisions, incentives and externalities
MJG Van Eeten, JM Bauer
OECD, 2008
‘Dialogues of the deaf’on science in policy controversies
MJG van Eeten
Science and Public Policy 26 (3), 185-192, 1999
Plug and prey? measuring the commoditization of cybercrime via online anonymous markets
R Van Wegberg, S Tajalizadehkhoob, K Soska, U Akyazi, CH Ganan, ...
27th USENIX security symposium (USENIX security 18), 1009-1026, 2018
Threshold-based resource management: a framework for comprehensive ecosystem management
E Roe, M Van Eeten
Environmental Management 27, 195-214, 2001
Ecology, engineering, and management: reconciling ecosystem rehabilitation and service reliability
MJG Van Eeten, E Roe
Oxford University Press, 2002
A different cup of {TI}? the added value of commercial threat intelligence
X Bouwman, H Griffioen, J Egbers, C Doerr, B Klievink, M Van Eeten
29th USENIX security symposium (USENIX security 20), 433-450, 2020
When fiction conveys truth and authority: The Netherlands Green Heart planning controversy
MV Eeten, E Roe
Journal of the American Planning Association 66 (1), 58-67, 2000
The system can't perform the operation now. Try again later.
Articles 1–20