Volgen
Abhishta Abhishta
Abhishta Abhishta
Andere namenA. Abhishta
Assistant Professor, Finance and Cyber Risk Management, University of Twente
Geverifieerd e-mailadres voor utwente.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Picking your brains: Where and how neuroscience tools can enhance marketing research
L Alvino, L Pavone, A Abhishta, H Robben
Frontiers in neuroscience 14, 577666, 2020
882020
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers
A Abhishta, R van Rijswijk-Deij, LJM Nieuwenhuis
ACM SIGCOMM Computer Communication Review 48 (5), 70-76, 2018
532018
Impact of successful ddos attacks on a major crypto-currency exchange
A Abhishta, R Joosten, S Dragomiretskiy, LJM Nieuwenhuis
2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019
48*2019
Business Model of a Botnet
CGJ Putman, Abhishta, LJM Nieuwenhuis
26th Euromicro International Conference on Parallel, Distributed and Network …, 2018
45*2018
A responsible internet: increasing trust in the foundation of digital societies
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Privacy & Informatie Magazine, 2021
44*2021
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks.
A Abhishta, W van Heeswijk, M Junger, LJM Nieuwenhuis, R Joosten
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (2), 3-22, 2020
442020
Analysing the impact of a DDoS attack announcement on victim stock prices
Abhishta, R Joosten, LJM Nieuwenhuis
2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017
26*2017
Industry 4.0 and healthcare: Context, applications, benefits and challenges
K Kotzias, FA Bukhsh, JJ Arachchige, M Daneva, A Abhishta
Iet Software 17 (3), 195-248, 2023
132023
The blind man and the elephant: Measuring economic impacts of DDOS attacks
A Abhishta
122019
Ransomware: How attacker’s effort, victim characteristics and context influence ransom requested, payment and financial loss
T Meurs, M Junger, E Tews, A Abhishta
2022 APWG symposium on electronic crime research (eCrime), 1-13, 2022
92022
Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices
Abhishta, R Joosten, LJM Nieuwenhuis
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017
9*2017
Victim Routine Influences the Number of DDoS Attacks
A Abhishta, M Junger, R Joosten, LJM Nieuwenhuis
2019 IEEE Security and Privacy Workshops (SPW), 2019
72019
Crime chain: het verband tussen DDoS-aanvallen en Phishing
M Junger, A Abhishta, B Nieuwenhuis
Politie & Wetenschap, 2021
6*2021
Poster: Collecting Contextual Information About a DDoS Attack Event Using Google Alerts
A Abhishta, R Joosten, M Jonker, W Kamerman, LJM Nieuwenhuis
40th IEEE Symposium on Security and Privacy 2019, 2019
62019
Role of Culture in Customer Acceptance of Neobanks
K Meijer, A Abhishta, R Joosten
International Workshop on Enterprise Applications, Markets and Services in …, 2022
5*2022
Methodology for Evaluating the Appropriateness of a Business Process for Robotic Process Automation
A Abhishta, L Berghuis, W van Heeswijk, A Tursunbayeva
Impact of Artificial Intelligence in Business and Society, 105-133, 2023
4*2023
A note on analysing the attacker aims behind ddos attacks
A Abhishta, M Junger, R Joosten, LJM Nieuwenhuis
Intelligent Distributed Computing XIII, 255-265, 2020
42020
Ransomware economics: a two-step approach to model ransom paid
T Meurs, E Cartwright, A Cartwright, M Junger, R Hoheisel, E Tews, ...
18th Symposium on Electronic Crime Research, eCrime 2023, 2023
32023
The Impact of the COVID-19 Pandemic on Phishing Frequency and Content. The Impact of Routine Activities Theory and a Rational Choice Model of Crime
J Laan, M Junger, A Abhishta, M Jonker
The Impact of Routine Activities Theory and a Rational Choice Model of Crime …, 2023
3*2023
Deception in double extortion ransomware attacks: An analysis of profitability and credibility
T Meurs, E Cartwright, A Cartwright, M Junger, A Abhishta
Computers & Security 138, 103670, 2024
22024
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20