Expertise

  • Computer Science

    • Business Models
    • Distributed Denial of Service Attack
    • Service
    • Attack
    • Models
  • Social Sciences

    • Enterprises
    • Business Model
    • Mathematical Model

Organisations

Publications

2025

Measuring Security and Resilience in Cloud Outsourcing for Data-Driven Risk Management (2025)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Haq, M. Y. M.https://doi.org/10.3990/1.9789036564847Understanding Digital Sovereignty from the lens of EU legal documents (2025)[Working paper › Preprint] (In preparation). Anand, S., Abhishta, A., Nieuwenhuis, B. & Ehrenhard, M.

2024

Victimization in DDoS Attacks: The Role of Popularity and Industry Sector (2024)Computers & Security (E-pub ahead of print/First online). Haq, M. Y. M., Affinito, A., Botta, A., Sperotto, A., Nieuwenhuis, L. J. M., Jonker, M. & Abhishta, A.https://doi.org/10.2139/ssrn.4970423Measuring Malware Detection Capability for Security Decision Making (2024)[Contribution to conference › Paper] 9th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2024. Haq, M. Y. M., Abhishta, A., Zeijlemaker, S., Chau, A., Siegel, M. & Nieuwenhuis, L. J. M.Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics (2024)In TMA 2024 - Proceedings of the 8th Network Traffic Measurement and Analysis Conference. IEEE. Jaw, E., Müller, M., Hesselman, C. & Nieuwenhuis, L.https://doi.org/10.23919/TMA62044.2024.10559067Servitization in inter-organizational constellations: A multi-perspective approach: Investigating the role of agile innovation approaches (2024)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Stegehuis, X.https://doi.org/10.3990/1.9789036560368Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review (2024)ACM computing surveys (Submitted). Haq, M. Y. M., Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.Poster: Quantifying the Proportion of Hijacked Prefixes Among the Identified Prefix Hijackers (2024)In 2024 IEEE 32nd International Conference on Network Protocols, ICNP 2024 (Proceedings - International Conference on Network Protocols, ICNP). IEEE. Jaw, E., Müller, M., Hesselman, C. & Nieuwenhuis, L.https://doi.org/10.1109/ICNP61940.2024.10858587Understanding Digital Sovereignty: A Textual Analysis Of EU Policy Documents (2024)In Proceedings of the 32nd European Conference on Information Systems (ECIS) (ECIS 2024 TREOS). Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.https://aisel.aisnet.org/treos_ecis2024/8

Research profiles

Scan the QR code or
Download vCard