Expertise
Computer Science
- Business Models
- Distributed Denial of Service Attack
- Service
- Attack
- Models
Social Sciences
- Enterprises
- Business Model
- Mathematical Model
Organisations
Publications
2025
Measuring Security and Resilience in Cloud Outsourcing for Data-Driven Risk Management (2025)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Haq, M. Y. M.https://doi.org/10.3990/1.9789036564847Understanding Digital Sovereignty from the lens of EU legal documents (2025)[Working paper › Preprint] (In preparation). Anand, S., Abhishta, A., Nieuwenhuis, B. & Ehrenhard, M.
2024
Victimization in DDoS Attacks: The Role of Popularity and Industry Sector (2024)Computers & Security (E-pub ahead of print/First online). Haq, M. Y. M., Affinito, A., Botta, A., Sperotto, A., Nieuwenhuis, L. J. M., Jonker, M. & Abhishta, A.https://doi.org/10.2139/ssrn.4970423Measuring Malware Detection Capability for Security Decision Making (2024)[Contribution to conference › Paper] 9th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2024. Haq, M. Y. M., Abhishta, A., Zeijlemaker, S., Chau, A., Siegel, M. & Nieuwenhuis, L. J. M.Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics (2024)In TMA 2024 - Proceedings of the 8th Network Traffic Measurement and Analysis Conference. IEEE. Jaw, E., Müller, M., Hesselman, C. & Nieuwenhuis, L.https://doi.org/10.23919/TMA62044.2024.10559067Servitization in inter-organizational constellations: A multi-perspective approach: Investigating the role of agile innovation approaches (2024)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Stegehuis, X.https://doi.org/10.3990/1.9789036560368Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review (2024)ACM computing surveys (Submitted). Haq, M. Y. M., Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.Poster: Quantifying the Proportion of Hijacked Prefixes Among the Identified Prefix Hijackers (2024)In 2024 IEEE 32nd International Conference on Network Protocols, ICNP 2024 (Proceedings - International Conference on Network Protocols, ICNP). IEEE. Jaw, E., Müller, M., Hesselman, C. & Nieuwenhuis, L.https://doi.org/10.1109/ICNP61940.2024.10858587Understanding Digital Sovereignty: A Textual Analysis Of EU Policy Documents (2024)In Proceedings of the 32nd European Conference on Information Systems (ECIS) (ECIS 2024 TREOS). Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.https://aisel.aisnet.org/treos_ecis2024/8
2023
Inter-organizational tensions in servitization: A dialectic process model (2023)Industrial marketing management, 109, 204-220. Stegehuis, X., von Raesfeld Meijer, A. & Nieuwenhuis, B.https://doi.org/10.1016/j.indmarman.2023.01.004
Research profiles
Courses academic year 2025/2026
Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.
Courses academic year 2024/2025
Courses academic year 2023/2024
- 192399979 - Final Project BIT
- 201300058 - Research Topics BIT
- 201300059 - Internship BIT
- 201500101 - Master Thesis Research Proposal
- 201500102 - Master Thesis Research Project
- 201500371 - Capita Selecta BIT
- 202001521 - Capita Selecta EngD (external course)
- 202001522 - Capita Selecta EngD (in-company tr.)
- 202300363 - Internship BIT - CS
Address

University of Twente
Ravelijn (building no. 10), room 2202
Hallenweg 17
7522 NH Enschede
Netherlands
University of Twente
Ravelijn 2202
P.O. Box 217
7500 AE Enschede
Netherlands