Follow
Tom Meurs
Tom Meurs
Verified email at utwente.nl
Title
Cited by
Cited by
Year
Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss
T Meurs, M Junger, E Tews, A Abhishta
Symposium on Electronic Crime Research, eCrime 2022, 2022
152022
Deception in double extortion ransomware attacks: An analysis of profitability and credibility
T Meurs, E Cartwright, A Cartwright, M Junger, A Abhishta
Computers & Security 138, 103670, 2024
72024
Ransomware economics: a two-step approach to model ransom paid
T Meurs, E Cartwright, A Cartwright, M Junger, R Hoheisel, E Tews, ...
2023 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2023
62023
COORDINATE: A model to analyse the benefits and costs of coordinating cybercrime
T Meurs, M Junger, A Abhishta, E Tews, E Ratia
32022
Double-sided information asymmetry in double extortion ransomware
T Meurs, E Cartwright, A Cartwright
International Conference on Decision and Game Theory for Security, 311-328, 2023
22023
NAS-ransomware: hoe ransomware-aanvallen tegen NAS-apparaten verschillen van reguliere ransomware-aanvallen
T Meurs, M Junger, E Tews, A Abhishta
Tijdschrift voor veiligheid 21 (3-4), 69-88, 2022
22022
POSTER: How Attackers Determine the Ransom in Ransomware Attacks
T Meurs, M Junger, A Abhishta, E Tews
12022
Estimating the Number of Ransomware Attacks
T Meurs, M Junger, M Cruyff, PGM Van Der Heijden
Available at SSRN 4942706, 2024
2024
Dark Web Dialogues: Analyzing Communication Platform Choices of Underground Forum Users
R Hoheisel, T Meurs, M Junger, E Tews, A Abhishta
2024
How Attackers Determine the Ransom in Ransomware Attacks
T Meurs, M Junger, A Abhishta, E Tews
7th IEEE European Symposium on Security and Privacy 2022, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–10