EEMCS-CS-SCS

I'm a security researcher who spent most of his academic life at Technische Universität Darmstadt, Germany. Previously I was working for the University of Birmingham, UK and since 2017, I'm at the University of Twente.

Expertise

  • Computer Science

    • Attack
    • Malware
    • Standards
    • User
    • Privacy Preserving
    • Functionality
    • Models
    • Attackers

Organisations

I'm currently interested in:

  • The Internet of Things
  • Privacy preserving technologies and the World Wide Web
  • Applied Cryptanalysis including side channel attacks
  • Railway signalling systems
  • Security of critical infrastructures
  • Security of wireless protocols

Publications

2024

Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2024)[Working paper › Preprint] (Submitted). Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.Ransomware Economics: A Two-Step Approach To Model Ransom Paid (2024)In 2023 APWG Symposium on Electronic Crime Research (eCrime) (eCrime Researchers Summit, eCrime). IEEE. Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime61234.2023.10485506

2022

NAS-ransomware: Hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen (2022)Tijdschrift voor veiligheid, 21(3-4), 69-88. Article 21. Meurs, T., Junger, M., Tews, E. & Abhishta, A.https://doi.org/10.5553/TvV/.000044Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss (2022)In Symposium on Electronic Crime Research, eCrime 2022. Meurs, T., Junger, M., Tews, E. & Abhishta, A.COORDINATE: A model to analyse the benefits and costs of coordinating cybercrime (2022)Journal of internet services and information security, 12(4). Meurs, T., Junger, M., Abhishta, A., Tews, E. & Ratia, E.https://doi.org/10.58346/JISIS.2022.I4.001How Attackers Determine the Ransom in Ransomware Attacks (2022)[Dataset Types › Dataset]. Zenodo. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.5281/zenodo.7068711How Attackers Determine the Ransom in Ransomware Attacks (2022)In 7th IEEE European Symposium on Security and Privacy (Euro S&P 2022). ResearchGate. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.13140/RG.2.2.34435.58400

2020

Lost and found: Stopping bluetooth finders from leaking private information (2020)In WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 184-194). Association for Computing Machinery. Weller, M., Classen, J., Ullrich, F., Waßmann, D. & Tews, E.https://doi.org/10.1145/3395351.3399422In-depth evaluation of redirect tracking and link usage (2020)Proceedings on Privacy Enhancing Technologies, 2020(4), 394-413. Koop, M., Tews, E. & Katzenbeisser, S.https://doi.org/10.2478/popets-2020-0079

Research profiles

I'm currently teaching Operating Systems for BSc students as well as Systems Security for MSc students.

Courses academic year 2024/2025

Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.

Courses academic year 2023/2024

Address

University of Twente

Zilverling (building no. 11), room 2027
Hallenweg 19
7522 NH Enschede
Netherlands

Navigate to location

Organisations

Scan the QR code or
Download vCard