BMS-HBE-IEBIS

Expertises

  • Computer Science

    • Attack
    • Distributed Denial of Service Attack
    • Malware
    • Attackers
    • Models
    • Network Infrastructure
    • Events
    • Provider Service

Organisaties

Publicaties

2024

Victimization in DDoS Attacks: The Role of Popularity and Industry Sector (2024)Computers & Security (Submitted). Haq, M. Y. M., Affinito, A., Botta, A., Sperotto, A., Nieuwenhuis, L. J. M., Jonker, M. & Abhishta, A.Measuring Malware Detection Capability for Security Decision Making (2024)[Contribution to conference › Paper] 9th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2024. Haq, M. Y. M., Abhishta, A., Zeijlemaker, S., Chau, A., Siegel, M. & Nieuwenhuis, L. J. M.Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2024)[Working paper › Preprint] (Submitted). Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.Poster: Empirical Cybersecurity Investment Decision-Making: Bridging the Gap Between Intuition and Metric-Driven Strategy (2024)[Contribution to conference › Poster] 8th European Symposium on Security and Privacy, Euro S&P 2024. Niyonsaba, N. L., Abhishta, A., van der Ham, J. & Spierdijk, L.https://doi.org/10.5281/zenodo.12648767Poster: Empirical Cybersecurity InvestmentDecision-Making: Bridging the Gap BetweenIntuition and Metric-Driven Strategy: Proceedings of the 2024 Poster Session of the 8th IEEE European Symposium on Security and Privacy (2024)[Contribution to conference › Poster]. Niyonsaba, N. L., Abhishta, A., Vos, J. v. d. H.-d. & Spierdijk, L.https://doi.org/10.5281/ZENODO.12648767Group Workshop as a “Human-Centered Approach” for Identification and Selection of Business Processes for Robotic Process Automation (2024)In Towards Digital and Sustainable Organisations - People, Platforms, and Ecosystems (pp. 103-122) (Lecture Notes in Information Systems and Organisation; Vol. 65 LNISO). Springer. Berghuis, L., Abhishta, A., van Heeswijk, W. & Tursunbayeva, A.https://doi.org/10.1007/978-3-031-52880-4_7Ransomware Economics: A Two-Step Approach To Model Ransom Paid (2024)In 2023 APWG Symposium on Electronic Crime Research (eCrime) (eCrime Researchers Summit, eCrime). IEEE. Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime61234.2023.10485506Deception in double extortion ransomware attacks: An analysis of profitability and credibility (2024)Computers & Security, 138. Article 103670. Meurs, T., Cartwright, E., Cartwright, A., Junger, M. & Abhishta, A.https://doi.org/10.1016/j.cose.2023.103670Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review (2024)ACM computing surveys (Submitted). Haq, M. Y. M., Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.Understanding Digital Sovereignty: A Textual Analysis Of EU Policy Documents (2024)In Proceedings of the 32nd European Conference on Information Systems (ECIS) (ECIS 2024 TREOS). Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.https://aisel.aisnet.org/treos_ecis2024/8

Onderzoeksprofielen

Verbonden aan opleidingen

Vakken collegejaar 2024/2025

Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.

Vakken collegejaar 2023/2024

Scan de QR-code of
Download vCard