Expertise

  • Computer Science

    • Attack
    • Malware
    • Attackers
    • Data Exfiltration
    • Models
  • Social Sciences

    • Extortion
    • Analysis
    • Crime

Organisations

Publications

2024

Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2024)[Working paper › Preprint] (Submitted). Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.Ransomware Economics: A Two-Step Approach To Model Ransom Paid (2024)In 2023 APWG Symposium on Electronic Crime Research (eCrime) (eCrime Researchers Summit, eCrime). IEEE. Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime61234.2023.10485506Deception in double extortion ransomware attacks: An analysis of profitability and credibility (2024)Computers & Security, 138. Article 103670. Meurs, T., Cartwright, E., Cartwright, A., Junger, M. & Abhishta, A.https://doi.org/10.1016/j.cose.2023.103670

2023

Double-sided Information Asymmetry in Double Extortion Ransomware (2023)In 14th International Conference on Decision and Game Theory for Security (GameSec). Meurs, T., Cartwright, E. & Cartwright, A.

2022

NAS-ransomware: Hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen (2022)Tijdschrift voor veiligheid, 21(3-4), 69-88. Article 21. Meurs, T., Junger, M., Tews, E. & Abhishta, A.https://doi.org/10.5553/TvV/.000044Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss (2022)In Symposium on Electronic Crime Research, eCrime 2022. Meurs, T., Junger, M., Tews, E. & Abhishta, A.COORDINATE: A model to analyse the benefits and costs of coordinating cybercrime (2022)Journal of internet services and information security, 12(4). Meurs, T., Junger, M., Abhishta, A., Tews, E. & Ratia, E.https://doi.org/10.58346/JISIS.2022.I4.001How Attackers Determine the Ransom in Ransomware Attacks (2022)[Dataset Types › Dataset]. Zenodo. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.5281/zenodo.7068711How Attackers Determine the Ransom in Ransomware Attacks (2022)In 7th IEEE European Symposium on Security and Privacy (Euro S&P 2022). ResearchGate. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.13140/RG.2.2.34435.58400

Research profiles

Address

University of Twente

Ravelijn (building no. 10)
Hallenweg 17
7522 NH Enschede
Netherlands

Navigate to location

Organisations

Scan the QR code or
Download vCard