BMS-HBE-IEBIS

Abhishta is an assistant professor at the Industrial Engineering and Business Information Systems group at University of Twente.

His research focuses on empirically measuring the economic/financial impact of cyber attacks. In order to do so he devices/adapts data-driven economic impact assessment techniques. He looks to help organisations make well-measured investments in security.

His doctoral research was funded under NWO project D3 ā€“ Distributed Denial-of-Service Defense: protecting schools and other public organizations. You can access a copy of his doctoral thesis here.

Other than finding (un)cool methods of finding the ā€œdevilā€ in financial details he is also involved in teaching and guiding students. From time to time he also delivers lectures to executives and collaborates with companies to help them with security decision making. He is also a member of behavioural data science incubator at the faculty of BMS at the university, where he contributes to solving social science problems using data science.

Expertise

  • Computer Science

    • Attack
    • Distributed Denial of Service Attack
    • Malware
    • Attackers
    • Models
    • Network Infrastructure
    • Events
    • Provider Service

Organisations

Abhishta is an assistant professor at theĀ Industrial Engineering and Business Information SystemsĀ group atĀ University of Twente.

His research focuses on empirically measuring the economic/financial impact of cyber attacks. In order to do so he devices/adapts data-driven economic impact assessment techniques. He looks to help organisations make well-measured investments in security.

His doctoral research was funded under NWO projectĀ D3 ā€“ Distributed Denial-of-Service Defense: protecting schools and other public organizations. You can access a copy of his doctoral thesisĀ here.

Ā Other than finding (un)cool methods of finding the ā€œdevilā€ in financial details he is also involved in teaching and guiding students. From time to time he also delivers lectures to executives and collaborates with companies to help them with security decision making. He is also a member of behavioural data science incubator at the faculty of BMS at the university, where he contributes to solving social science problems using data science.

Publications

2024

Victimization in DDoS Attacks: The Role of Popularity and Industry Sector (2024)Computers & Security (Submitted). Haq, M. Y. M., Affinito, A., Botta, A., Sperotto, A., Nieuwenhuis, L. J. M., Jonker, M. & Abhishta, A.Measuring Malware Detection Capability for Security Decision Making (2024)[Contribution to conference › Paper] 9th International Workshop on Traffic Measurements for Cybersecurity, WTMC 2024. Haq, M. Y. M., Abhishta, A., Zeijlemaker, S., Chau, A., Siegel, M. & Nieuwenhuis, L. J. M.Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2024)[Working paper › Preprint] (Submitted). Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.Group Workshop as a ā€œHuman-Centered Approachā€ for Identification and Selection of Business Processes for Robotic Process Automation (2024)In Towards Digital and Sustainable Organisations - People, Platforms, and Ecosystems (pp. 103-122) (Lecture Notes in Information Systems and Organisation; Vol. 65 LNISO). Springer. Berghuis, L., Abhishta, A., van Heeswijk, W. & Tursunbayeva, A.https://doi.org/10.1007/978-3-031-52880-4_7Ransomware Economics: A Two-Step Approach To Model Ransom Paid (2024)In 2023 APWG Symposium on Electronic Crime Research (eCrime) (eCrime Researchers Summit, eCrime). IEEE. Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime61234.2023.10485506Deception in double extortion ransomware attacks: An analysis of profitability and credibility (2024)Computers & Security, 138. Article 103670. Meurs, T., Cartwright, E., Cartwright, A., Junger, M. & Abhishta, A.https://doi.org/10.1016/j.cose.2023.103670Cloud Outsourcing Risk Management for Cloud Consumers: A Systematic Literature Review (2024)ACM computing surveys (Submitted). Haq, M. Y. M., Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.Understanding Digital Sovereignty: A Textual Analysis Of EU Policy Documents (2024)In Proceedings of the 32nd European Conference on Information Systems (ECIS) (ECIS 2024 TREOS). Anand, S., Abhishta, A. & Nieuwenhuis, L. J. M.https://aisel.aisnet.org/treos_ecis2024/8

2023

Coded Dataset of Neuroscience Studies (2023)[Dataset Types › Dataset]. 4TU.Centre for Research Data. Alvino, L., Pavone, L., Abhishta , A. & Robben , H.https://doi.org/10.4121/ee851e3f-163e-40b9-8318-0fc6c20aebec.v1Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict (2023)In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 487-494). Article 10190662. IEEE. Haq, M. Y. M., Abhishta, A., Sommese, R., Jonker, M. & Nieuwenhuis, L. J. M.https://doi.org/10.1109/EuroSPW59978.2023.00060

Research profiles

Affiliated study programs

Courses academic year 2024/2025

Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.

Courses academic year 2023/2024

In the press

  • Inside the business model for botnets ([link])
  • Building Botnets For Fun & Profit with Abhishta ([link])
Scan the QR code or
Download vCard