Publications

publications by categories in reversed chronological order.

2026

  1. Analysing the affect of Control, Accountability and Transparency on the Consumer Behaviour of Software as a Service (SaaS) to Prioritise Digital Sovereignty
    Siraj Anand, Tijmen Heuvelman, Jan-Willem Bullée, and 2 more authors
    Mar 2026
    2nd India Conference on Information Systems, InCIS 2026 : Digital Public Infrastructure for a Sustainable and Sovereign Digital Future, InCIS 2026 ; Conference date: 05-03-2026 Through 07-03-2026
  2. Assessing Crime Disclosure Patterns in a Large-Scale Cybercrime Forum
    Raphael Hoheisel, Tom Meurs, Jai Wientjes, and 3 more authors
    Mar 2026
  3. Digital Sovereignty and the means to European digital security: Identification of the goals related to digital sovereignty from legal texts published by the European Union
    Siraj Anand, Shawn Donnelly, Michel Ehrenhard, and 2 more authors
    European Security, Mar 2026

2025

  1. Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users
    Raphael Hoheisel, Tom Meurs, Marianne Junger, and 2 more authors
    In 2024 APWG Symposium on Electronic Crime Research (eCrime), Feb 2025
    Publisher Copyright: \textcopyright 2024 IEEE.; Symposium on Electronic Crime Research, eCrime 2024, eCrime 2024 ; Conference date: 24-09-2024 Through 26-09-2024
  2. How Does AI Transform Cyber Risk Management?
    Sander Zeijlemaker, {Yaphet K.} Lemiesa, {Saskia Laura} Schröer, and 2 more authors
    Systems, Sep 2025
    Publisher Copyright: \textcopyright 2025 by the authors.
  3. NAS ransomware: ransomware targeting NAS devices
    Tom Meurs, Raphael Hoheisel, Marianne Junger, and 1 more author
    Global crime, Nov 2025
    Publisher Copyright: \textcopyright 2025 Informa UK Limited, trading as Taylor & Francis Group.
  4. Understanding Digital Sovereignty from the lens of EU legal documents
    Siraj Anand, Abhishta Abhishta, Bart Nieuwenhuis, and 1 more author
    2025
  5. Victimization in DDoS attacks: The role of popularity and industry sector
    {Muhammad Yasir Muzayan} Haq, Antonia Affinito, Alessio Botta, and 4 more authors
    Journal of information security and applications, Nov 2025
    Publisher Copyright: \textcopyright 2025 The Authors
  6. What To Do Against Ransomware? Evaluating Law Enforcement Interventions
    Tom Meurs, Raphael Hoheisel, Marianne Junger, and 2 more authors
    In 2024 APWG Symposium on Electronic Crime Research (eCrime), Feb 2025
    Symposium on Electronic Crime Research, eCrime 2024, eCrime 2024 ; Conference date: 24-09-2024 Through 26-09-2024

2024

  1. Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review
    {Muhammad Yasir Muzayan} Haq, Siraj Anand, Abhishta Abhishta, and 1 more author
    ACM computing surveys, Feb 2024
  2. Corrigendum: Picking your brains: where and how neuroscience tools can enhance marketing research(Front. Neurosci., (2020), 14, (577666), 10.3389/fnins.2020.577666)
    Letizia Alvino, Luigi Pavone, Abhishta Abhishta, and 1 more author
    Frontiers in Neuroscience, 2024
    Publisher Copyright: Copyright \textcopyright 2024 Alvino, Pavone, Abhishta and Robben.
  3. Deception in double extortion ransomware attacks: An analysis of profitability and credibility
    Tom Meurs, Edward Cartwright, Anna Cartwright, and 2 more authors
    Computers and Security, Mar 2024
    Publisher Copyright: \textcopyright 2023 The Author(s)
  4. Group Workshop as a “Human-Centered Approach” for Identification and Selection of Business Processes for Robotic Process Automation
    Lars Berghuis, Abhishta Abhishta, Wouter Heeswijk}, and 1 more author
    In Towards Digital and Sustainable Organisations - People, Platforms, and Ecosystems, May 2024
    Publisher Copyright: \textcopyright The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.; 19th Annual conference of the Italian Chapter of AIS, ItAIS 2022, ItAIS 2022 ; Conference date: 14-10-2022 Through 15-10-2022
  5. Measuring Malware Detection Capability for Security Decision Making
    {Muhammad Yasir Muzayan} Haq, Abhishta Abhishta, Sander Zeijlemaker, and 3 more authors
    Jul 2024
    9th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2024, WTMC 2024 ; Conference date: 08-07-2024 Through 08-07-2024
  6. Measuring Malware Detection Capability for Security Decision Making
    {Muhammad Yasir} {Muzayan Haq}, Abhishta Abhishta, Sander Zeijlemaker, and 3 more authors
    In 9th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024, Jul 2024
    Publisher Copyright: \textcopyright 2024 IEEE.; 9th IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2024, EuroS&PW 2024 ; Conference date: 08-07-2024 Through 12-07-2024
  7. Poster: Empirical Cybersecurity Investment Decision-Making: Bridging the Gap Between Intuition and Metric-Driven Strategy
    {Nadia Lorraine} Niyonsaba, Abhishta Abhishta, Jeroen Ham}, and 1 more author
    Jul 2024
    8th European Symposium on Security and Privacy, Euro S&P 2024, Euro S&P 2024 ; Conference date: 03-07-2024 Through 07-07-2024
  8. Ransomware Economics: A Two-Step Approach To Model Ransom Paid
    Tom Meurs, Edward Cartwright, Anna Cartwright, and 4 more authors
    In 2023 APWG Symposium on Electronic Crime Research (eCrime), Apr 2024
    18th Symposium on Electronic Crime Research, eCrime 2023, eCrime 2023 ; Conference date: 15-11-2023 Through 17-11-2023
  9. Understanding Digital Sovereignty: A Textual Analysis Of EU Policy Documents
    Siraj Anand, Abhishta Abhishta, and {Lambert J. M.} Nieuwenhuis
    In Proceedings of the 32nd European Conference on Information Systems (ECIS), 2024
    32nd European Conference of Information Systems, ECIS 2024 : People First: Constructing Digital Futures Together, ECIS 2024 ; Conference date: 13-06-2024 Through 19-06-2024
  10. Victimization in DDoS Attacks: The Role of Popularity and Industry Sector
    {Muhammad Yasir Muzayan} Haq, Antonia Affinito, Alessio Botta, and 4 more authors
    Sep 2024

2023

  1. Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict
    {Muhammad Yasir Muzayan} Haq, Abhishta Abhishta, Raffaele Sommese, and 2 more authors
    2023
    8th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2023, WTMC 2023 ; Conference date: 07-07-2023 Through 07-07-2023
  2. Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict
    {Muhammad Yasir Muzayan} Haq, Abhishta Abhishta, Raffaele Sommese, and 2 more authors
    In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Jul 2023
    8th IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2023, EuroS&PW 2023 ; Conference date: 03-07-2023 Through 07-07-2023
  3. Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict
    {Muhammad Yasir Muzayan} Haq, Abhishta Abhishta, Raffaele Sommese, and 2 more authors
    May 2023
  4. Industry 4.0 and healthcare: Context, applications, benefits and challenges
    Konstantinos Kotzias, {Faiza A.} Bukhsh, {Jeewanie Jayasinghe} Arachchige, and 2 more authors
    IET software, Jun 2023
    Publisher Copyright: \textcopyright 2022 The Authors. IET Software published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. Financial transaction number: 2500030781
  5. Methodology for Evaluating the Appropriateness of a Business Process for Robotic Process Automation
    Abhishta Abhishta, Lars Berghuis, Wouter Heeswijk}, and 1 more author
    Jan 2023
    Publisher Copyright: \textcopyright 2024 selection and editorial matter, Francesco Paolo Appio, Davide La Torre, Francesca Lazzeri, Hatem Masri, Francesco Schiavone; individual chapters, the contributors.
  6. Preface
    Jos Hillegersberg}, Jörg Osterrieder, Fethi Rabhi, and 3 more authors
    In Enterprise Applications, Markets and Services in the Finance Industry, Apr 2023
    Funding Information: This year, the conference was also supported by the European Union under the COST (Cooperation in Science and Technology) scheme, the longest-running European intergovernmental framework for cooperation in science and technology. The COST Action CA19130 Fintech and Artificial Intelligence is a research network connecting 270+ researchers from 49 countries globally.; 11th International Workshop on Enterprise Applications, Markets and Services in the Finance Industry, FinanceCom 2022, FinanceCom 2022 ; Conference date: 22-08-2022 Through 24-08-2022
  7. Role of Culture in Customer Acceptance of Neobanks
    Koen Meijer, Abhishta Abhishta, and Reinoud Joosten
    In Enterprise Applications, Markets and Services in the Finance Industry, Apr 2023
    Publisher Copyright: \textcopyright 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.; 11th International Workshop on Enterprise Applications, Markets and Services in the Finance Industry, FinanceCom 2022, FinanceCom 2022 ; Conference date: 22-08-2022 Through 24-08-2022
  8. Towards a Digitally Sovereign Internet: An Architectural Proposal for a Secure-by-Design System
    Siraj Anand, Abhishta Abhishta, Michel Ehrenhard, and 1 more author
    2023

2022

  1. COORDINATE: A model to analyse the benefits and costs of coordinating cybercrime
    Tom Meurs, Marianne Junger, Abhishta Abhishta, and 2 more authors
    Journal of internet services and information security, Nov 2022
  2. Enterprise Applications, Markets and Services in the Finance Industry: 11th International Workshop, FinanceCom 2022, Twente, The Netherlands, August 23–24, 2022, Revised Selected Papers
    Jos Hillegersberg}, Jörg Osterrieder, Fethi Rabhi, and 3 more authors
    2022
    11th International Workshop on Enterprise Applications, Markets and Services in the Finance Industry, FinanceCom 2022, FinanceCom 2022 ; Conference date: 22-08-2022 Through 24-08-2022
  3. How Attackers Determine the Ransom in Ransomware Attacks
    Tom Meurs, Marianne Junger, Abhishta Abhishta, and 1 more author
    In 7th IEEE European Symposium on Security and Privacy (Euro S&P 2022), Jun 2022
    7th IEEE European Symposium on Security and Privacy 2022 ; Conference date: 06-06-2022 Through 10-06-2022
  4. NAS-ransomware: Hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen
    Tom Meurs, Marianne Junger, Erik Tews, and 1 more author
    Tijdschrift voor veiligheid, Dec 2022
  5. No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers
    {Muhammad Yasir Muzayan} Haq, Mattijs Jonker, Roland Rijswijk-Deij}, and 3 more authors
    May 2022
  6. No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers
    {Muhammad Yasir Muzayan} Haq, Mattijs Jonker, {Roland Martijn} Rijswijk - Deij}, and 3 more authors
    Jun 2022
    Funding Information: This work is part of the NWO: MASCOT project, which is funded by the Netherlands Organization for Scientific Research (CS.014). This material is based on research sponsored by the National Science Foundation (NSF) grant OAC-1724853 and OAC-2131987. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of NSF. Publisher Copyright: \textcopyright 2022 IEEE.; 7th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2022, WTMC’22 ; Conference date: 06-06-2022 Through 06-06-2022
  7. Ransomware: How attacker’s effort, victim characteristics and context influence ransom requested, payment and financial loss
    Tom Meurs, Marianne Junger, Erik Tews, and 1 more author
    In Symposium on Electronic Crime Research, eCrime 2022, Dec 2022
    Symposium on Electronic Crime Research, eCrime 2022, eCrime 2022 ; Conference date: 30-11-2022 Through 02-12-2022

2021

  1. A message from the program chairs of TAURIN 2021
    R. Holz and A. Abhishta
    In TAURIN 2021 - Proceedings of the 2021 ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet, 2021
    ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet, TAURIN 2021, TAURIN 2021 ; Conference date: 23-08-2021 Through 23-08-2021
  2. Crime chain: het verband tussen DDoS-aanvallen en Phishing
    Marianne Junger, Abhishta Abhishta, and Bart Nieuwenhuis
    Jun 2021
  3. The Effect of Consumer Portfolio on the Risk Profile of Cloud Provider
    {Muhammad Yasir Muzayan} Haq, Abhishta Abhishta, and {Lambert J.M.} Nieuwenhuis
    In SIGCOMM ’21, Aug 2021
    Funding Information: This work is funded by the Nederlandse Organisatie voor Weten-schappelijk Onderzoek (NWO) MeAsuring Security in Cloud OuTsourcing (MASCOT) project. Publisher Copyright: \textcopyright 2021 Owner/Author.; ACM SIGCOMM Conference 2021, SIGCOMM 2021 ; Conference date: 23-08-2021 Through 27-08-2021

2020

  1. A Note on Analysing the Attacker Aims Behind DDoS Attacks
    Abhishta Abhishta, Marianne Junger, Reinoud Joosten, and 1 more author
    In Intelligent Distributed Computing XIII, IDC 2019, Jan 2020
    13th International Symposium on Intelligent Distributed Computing, IDC 2019, IDC 2019 ; Conference date: 07-10-2019 Through 10-10-2019
  2. A simulation-based procedure to estimate base rates from Covid-19 antibody test results I: Deterministic test reliabilities
    Reinoud Joosten and Abhishta Abhishta
    Apr 2020
  3. Picking Your Brains: Where and How Neuroscience Tools Can Enhance Marketing Research
    Letizia Alvino, Luigi Pavone, Abhishta Abhishta, and 1 more author
    Frontiers in Neuroscience, Dec 2020
  4. Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks
    Abhishta Abhishta, Wouter Heeswijk}, Marianne Junger, and 2 more authors
    Journal of wireless mobile networks, ubiquitous computing, and dependable applications, Jun 2020

2019

  1. Collecting Contextual Information About a DDoS Attack Event Using Google Alerts
    Abhishta Abhishta, Reinoud Joosten, Mattijs Jonker, and 2 more authors
    May 2019
    40th IEEE Symposium on Security and Privacy 2019 ; Conference date: 20-05-2019 Through 22-05-2019
  2. Impact of Successful DDoS Attacks on a Major Crypto-Currency Exchange
    Abhishta Abhishta, {Reinoud A.M.G.} Joosten, Sergey Dragomiretskiy, and 1 more author
    In 2019 27th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), Mar 2019
    27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing 2019, PDP 2019 ; Conference date: 13-02-2019 Through 15-02-2019
  3. The Blind Man and The Elephant: Measuring Economic Impacts of DDoS Attacks
    Abhishta Abhishta
    Dec 2019
  4. Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network
    Abhishta Abhishta, Marianne Junger, Reinoud Joosten, and 1 more author
    In 2019 IEEE Security and Privacy Workshops, SPW 2019, Sep 2019
    IEEE Security and Privacy Workshops, SPW 2019, SPW 2019 ; Conference date: 23-05-2019 Through 23-05-2019

2018

  1. Analysing The Impact Of A DDoS Attack Announcement On Victim Stock Prices
    Abhishta, Reinoud Joosten, and L.J.M. Nieuwenhuis
    May 2018
  2. Business Model of a Botnet
    C.G.J. Putman, Abhishta, and L.J.M. Nieuwenhuis
    In 2018 26th Euromicro International conference on Parallel, Distributed, and Network-Based Processing (PDP), Jun 2018
    26th Euromicro International Conference on Parallel, Distributed and Network-based Processing 2018, PDP 2018 ; Conference date: 21-03-2018 Through 23-03-2018
  3. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices
    Abhishta, Reinoud Joosten, and {Lambert J.M.} Nieuwenhuis
    May 2018
    The final version of this paper has been published in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 8, Number 4.
  4. Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers
    Abhishta Abhishta, Roland {Van Rijswijk-Deij}, and {Lambert J.M.} Nieuwenhuis
    Computer communication review, Oct 2018
  5. Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers
    Abhishta, Roland Rijswijk-Deij}, and L.J.M. Nieuwenhuis
    In WTMC ’18, 2018
    ACM SIGCOMM Workshop on Traffic Measurements for Cybersecurity, WTMC 2018, WTMC 2018 ; Conference date: 20-08-2018 Through 23-08-2018

2017

  1. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices
    Abhishta, Reinoud Joosten, and L.J.M. Nieuwenhuis
    In 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), Apr 2017
    25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2017, PDP ; Conference date: 06-03-2017 Through 08-03-2017
  2. Characteristics of DDoS attacks: An analysis of the most reported attack events of 2016
    Abhishta Abhishta, {Lambertus Johannes Maria} Nieuwenhuis, Marianne Junger, and 1 more author
    2017
  3. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices
    Abhishta Abhishta, Reinoud Joosten, and {Lambert J.M.} Nieuwenhuis
    Journal of wireless mobile networks, ubiquitous computing, and dependable applications, Dec 2017