Measuring the cost of cybercrime R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ... The economics of information security and privacy, 265-300, 2013 | 809 | 2013 |
The resilient organization A Boin, MJG Van Eeten Public Management Review 15 (3), 429-445, 2013 | 553 | 2013 |
Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment M De Bruijne, M Van Eeten Journal of contingencies and crisis management 15 (1), 18-29, 2007 | 338 | 2007 |
Dialogues of the deaf: defining new agendas for environmental deadlocks M Eeten | 288 | 1999 |
Resilience. Exploring the concept and its meaning MLC De Bruijne, A Boin, MJG van Eeten Designing resilience. Preparing for extreme events, 13-32, 2010 | 224 | 2010 |
Where is the governance in Internet governance? MJG Van Eeten, M Mueller New media & society 15 (5), 720-736, 2013 | 217 | 2013 |
High reliability and the management of critical infrastructures P Schulman, E Roe, M van Eeten, M de Bruijne The Routledge Companion to Strategic Risk Management, 483-501, 2015 | 196 | 2015 |
Cybersecurity: Stakeholder incentives, externalities, and policy options JM Bauer, MJG Van Eeten Telecommunications Policy 33 (10-11), 706-719, 2009 | 196 | 2009 |
Narrative policy analysis MMJ Van Eeten Handbook of public policy analysis, 277-296, 2017 | 179 | 2017 |
Recasting intractable policy issues: the wider implications of the Netherlands civil aviation controversy MJG Van Eeten Journal of Policy Analysis and Management: The Journal of the Association …, 2001 | 171 | 2001 |
Empirical findings on critical infrastructure dependencies in Europe E Luiijf, A Nieuwenhuijs, M Klaver, M van Eeten, E Cruz International Workshop on Critical Information Infrastructures Security, 302-310, 2008 | 157 | 2008 |
The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports M Van Eeten, A Nieuwenhuijs, E Luiijf, M Klaver, E Cruz Public Administration 89 (2), 381-400, 2011 | 156 | 2011 |
The role of internet service providers in botnet mitigation an empirical analysis based on spam data M Van Eeten, JM Bauer, H Asghari, S Tabatabaie, D Rand TPRC, 2010 | 130 | 2010 |
Economics of malware: Security decisions, incentives and externalities MJG Van Eeten, JM Bauer OECD, 2008 | 117 | 2008 |
‘Dialogues of the deaf’on science in policy controversies MJG van Eeten Science and Public Policy 26 (3), 185-192, 1999 | 112 | 1999 |
Plug and prey? measuring the commoditization of cybercrime via online anonymous markets R Van Wegberg, S Tajalizadehkhoob, K Soska, U Akyazi, CH Ganan, ... 27th USENIX security symposium (USENIX security 18), 1009-1026, 2018 | 103 | 2018 |
A different cup of {TI}? the added value of commercial threat intelligence X Bouwman, H Griffioen, J Egbers, C Doerr, B Klievink, M Van Eeten 29th USENIX security symposium (USENIX security 20), 433-450, 2020 | 79 | 2020 |
Ecology, engineering, and management: reconciling ecosystem rehabilitation and service reliability MJG Van Eeten, E Roe Oxford University Press, 2002 | 78 | 2002 |
Threshold-based resource management: a framework for comprehensive ecosystem management E Roe, M Van Eeten Environmental Management 27, 195-214, 2001 | 77 | 2001 |
Invisible trade-offs of public values: Inside Dutch railways B Steenhuisen, M van Eeten Public Money and Management 28 (3), 147-152, 2008 | 74 | 2008 |