Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss T Meurs, M Junger, E Tews, A Abhishta Symposium on Electronic Crime Research, eCrime 2022, 2022 | 15 | 2022 |
Deception in double extortion ransomware attacks: An analysis of profitability and credibility T Meurs, E Cartwright, A Cartwright, M Junger, A Abhishta Computers & Security 138, 103670, 2024 | 7 | 2024 |
Ransomware economics: a two-step approach to model ransom paid T Meurs, E Cartwright, A Cartwright, M Junger, R Hoheisel, E Tews, ... 2023 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2023 | 6 | 2023 |
COORDINATE: A model to analyse the benefits and costs of coordinating cybercrime T Meurs, M Junger, A Abhishta, E Tews, E Ratia | 3 | 2022 |
Double-sided information asymmetry in double extortion ransomware T Meurs, E Cartwright, A Cartwright International Conference on Decision and Game Theory for Security, 311-328, 2023 | 2 | 2023 |
NAS-ransomware: hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen T Meurs, M Junger, E Tews, A Abhishta Tijdschrift voor veiligheid 21 (3-4), 69-88, 2022 | 2 | 2022 |
POSTER: How Attackers Determine the Ransom in Ransomware Attacks T Meurs, M Junger, A Abhishta, E Tews | 1 | 2022 |
Estimating the Number of Ransomware Attacks T Meurs, M Junger, M Cruyff, PGM Van Der Heijden Available at SSRN 4942706, 2024 | | 2024 |
Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users R Hoheisel, T Meurs, M Junger, E Tews, A Abhishta | | 2024 |
How Attackers Determine the Ransom in Ransomware Attacks T Meurs, M Junger, A Abhishta, E Tews 7th IEEE European Symposium on Security and Privacy 2022, 2022 | | 2022 |