EEMCS-CS-SCS

Publicaties

2025

Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2025)In 2024 APWG Symposium on Electronic Crime Research (eCrime) (pp. 187-201) ( APWG Symposium on Electronic Crime Research (eCrime); Vol. 2024). IEEE. Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime66200.2024.00020Double-Extortion Ransomware: A Study of Cybercriminal Profit, Effort, and Risk (2025)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Meurs, T.https://doi.org/10.3990/1.9789036564182

2024

Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2024)[Working paper › Preprint]. Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.Ransomware Economics: A Two-Step Approach To Model Ransom Paid (2024)In 2023 APWG Symposium on Electronic Crime Research (eCrime) (Proceedings APWG Symposium on Electronic Crime Research (eCrime); Vol. 2023). IEEE. Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime61234.2023.10485506

2022

NAS-ransomware: Hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen (2022)Tijdschrift voor veiligheid, 21(3-4), 69-88. Article 21. Meurs, T., Junger, M., Tews, E. & Abhishta, A.https://doi.org/10.5553/TvV/.000044Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss (2022)In Symposium on Electronic Crime Research, eCrime 2022. Meurs, T., Junger, M., Tews, E. & Abhishta, A.COORDINATE: A model to analyse the benefits and costs of coordinating cybercrime (2022)Journal of internet services and information security, 12(4). Meurs, T., Junger, M., Abhishta, A., Tews, E. & Ratia, E.https://doi.org/10.58346/JISIS.2022.I4.001How Attackers Determine the Ransom in Ransomware Attacks (2022)[Dataset Types › Dataset]. Zenodo. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.5281/zenodo.7068711How Attackers Determine the Ransom in Ransomware Attacks (2022)In 7th IEEE European Symposium on Security and Privacy (Euro S&P 2022). ResearchGate. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.13140/RG.2.2.34435.58400

2020

Lost and found: Stopping bluetooth finders from leaking private information (2020)In WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 184-194). Association for Computing Machinery. Weller, M., Classen, J., Ullrich, F., Waßmann, D. & Tews, E.https://doi.org/10.1145/3395351.3399422

Onderzoeksprofielen

Vakken collegejaar 2025/2026

Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.

Vakken collegejaar 2024/2025

Vakken collegejaar 2023/2024

Scan de QR-code of
Download vCard