Expertise
Computer Science
- Attack
- Malware
- Attackers
- Data Exfiltration
- Models
Social Sciences
- Extortion
- Analysis
- Crime
Organisations
Publications
2024
Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users (2024)[Working paper › Preprint] (Submitted). Hoheisel, R., Meurs, T., Junger, M., Tews, E. & Abhishta, A.Ransomware Economics: A Two-Step Approach To Model Ransom Paid (2024)In 2023 APWG Symposium on Electronic Crime Research (eCrime) (eCrime Researchers Summit, eCrime). IEEE. Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A.https://doi.org/10.1109/eCrime61234.2023.10485506Deception in double extortion ransomware attacks: An analysis of profitability and credibility (2024)Computers & Security, 138. Article 103670. Meurs, T., Cartwright, E., Cartwright, A., Junger, M. & Abhishta, A.https://doi.org/10.1016/j.cose.2023.103670
2023
Double-sided Information Asymmetry in Double Extortion Ransomware (2023)In 14th International Conference on Decision and Game Theory for Security (GameSec). Meurs, T., Cartwright, E. & Cartwright, A.
2022
NAS-ransomware: Hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen (2022)Tijdschrift voor veiligheid, 21(3-4), 69-88. Article 21. Meurs, T., Junger, M., Tews, E. & Abhishta, A.https://doi.org/10.5553/TvV/.000044Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss (2022)In Symposium on Electronic Crime Research, eCrime 2022. Meurs, T., Junger, M., Tews, E. & Abhishta, A.COORDINATE: A model to analyse the benefits and costs of coordinating cybercrime (2022)Journal of internet services and information security, 12(4). Meurs, T., Junger, M., Abhishta, A., Tews, E. & Ratia, E.https://doi.org/10.58346/JISIS.2022.I4.001How Attackers Determine the Ransom in Ransomware Attacks (2022)[Dataset Types › Dataset]. Zenodo. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.5281/zenodo.7068711How Attackers Determine the Ransom in Ransomware Attacks (2022)In 7th IEEE European Symposium on Security and Privacy (Euro S&P 2022). ResearchGate. Meurs, T., Junger, M., Abhishta, A. & Tews, E.https://doi.org/10.13140/RG.2.2.34435.58400
Research profiles
Address
University of Twente
Ravelijn (building no. 10)
Hallenweg 17
7522 NH Enschede
Netherlands
University of Twente
Ravelijn
P.O. Box 217
7500 AE Enschede
Netherlands
Organisations
Scan the QR code or
Download vCard
Download vCard