BMS-HBE-IEBIS

Expertises

  • Computer Science

    • Attack
    • Distributed Denial of Service Attack
    • Malware
    • Attackers
    • Models
    • Network Infrastructure
    • Events
    • Provider Service

Organisaties

Publicaties

2024

Victimization in DDoS Attacks: The Role of Popularity and Industry Sector (2024)Computers & Security (Submitted). Haq, M. Y. M., Affinito, A., Botta, A., Sperotto, A., Nieuwenhuis, L. J. M., Jonker, M. & Abhishta, A.Measuring Malware Detection Capability for Security Decision Making (2024)[Contribution to conference › Paper] 9th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2024. Haq, M. Y. M., Abhishta, A., Zeijlemaker, S., Chau, A., Siegel, M. & Nieuwenhuis, L. J. M.Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2024)[Working paper › Preprint] (Submitted). Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.Group Workshop as a “Human-Centered Approach” for Identification and Selection of Business Processes for Robotic Process Automation (2024)In Towards Digital and Sustainable Organisations - People, Platforms, and Ecosystems (pp. 103-122) (Lecture Notes in Information Systems and Organisation; Vol. 65 LNISO). Springer. Berghuis, L., Abhishta, A., van Heeswijk, W. & Tursunbayeva, A.https://doi.org/10.1007/978-3-031-52880-4_7Ransomware Economics: A Two-Step Approach To Model Ransom Paid (2024)In 2023 APWG Symposium on Electronic Crime Research (eCrime) (eCrime Researchers Summit, eCrime). IEEE. Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime61234.2023.10485506Deception in double extortion ransomware attacks: An analysis of profitability and credibility (2024)Computers & Security, 138. Article 103670. Meurs, T., Cartwright, E., Cartwright, A., Junger, M. & Abhishta, A.https://doi.org/10.1016/j.cose.2023.103670Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review (2024)ACM computing surveys (Submitted). Haq, M. Y. M., Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.Understanding Digital Sovereignty: A Textual Analysis Of EU Policy Documents (2024)In Proceedings of the 32nd European Conference on Information Systems (ECIS) (ECIS 2024 TREOS). Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.https://aisel.aisnet.org/treos_ecis2024/8

2023

Coded Dataset of Neuroscience Studies (2023)[Dataset Types › Dataset]. 4TU.Centre for Research Data. Alvino, L., Pavone, L., Abhishta , A. & Robben , H.https://doi.org/10.4121/ee851e3f-163e-40b9-8318-0fc6c20aebec.v1Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict (2023)In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 487-494). Article 10190662. IEEE. Haq, M. Y. M., Abhishta, A., Sommese, R., Jonker, M. & Nieuwenhuis, L. J. M.https://doi.org/10.1109/EuroSPW59978.2023.00060

Onderzoeksprofielen

Verbonden aan opleidingen

Vakken collegejaar 2024/2025

Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.

Vakken collegejaar 2023/2024

Scan de QR-code of
Download vCard