​
Login / Signup
Abhishta Abhishta
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 14
Top Topics
Poses Unique Challenges
Ddos Attacks
Service Providers
Denial Of Service Attacks
Top Venues
CoRR
EuroS&P Workshops
eCrime
SIGCOMM Posters and Demos
</>
Publications
</>
Tom Meurs
,
Edward J. Cartwright
,
Anna Cartwright
,
Marianne Junger
,
Abhishta Abhishta
Deception in double extortion ransomware attacks: An analysis of profitability and credibility.
Comput. Secur.
138 (2024)
Konstantinos Kotzias
,
Faiza Allah Bukhsh
,
Jeewanie Jayasinghe Arachchige
,
Maya Daneva
,
Abhishta Abhishta
Industry 4.0 and healthcare: Context, applications, benefits and challenges.
IET Softw.
17 (3) (2023)
Tom Meurs
,
Edward J. Cartwright
,
Anna Cartwright
,
Marianne Junger
,
Raphael Hoheisel
,
Erik Tews
,
Abhishta Abhishta
Ransomware Economics: A Two-Step Approach To Model Ransom Paid.
eCrime
(2023)
Muhammad Yasir Muzayan Haq
,
Abhishta Abhishta
,
Raffaele Sommese
,
Mattijs Jonker
,
Lambert J. M. Nieuwenhuis
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict.
EuroS&P Workshops
(2023)
Muhammad Yasir Muzayan Haq
,
Abhishta Abhishta
,
Raffaele Sommese
,
Mattijs Jonker
,
Lambert J. M. Nieuwenhuis
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict.
CoRR
(2023)
Muhammad Yasir Muzayan Haq
,
Mattijs Jonker
,
Roland van Rijswijk-Deij
,
kc claffy
,
Lambert J. M. Nieuwenhuis
,
Abhishta Abhishta
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers.
EuroS&P Workshops
(2022)
Muhammad Yasir Muzayan Haq
,
Mattijs Jonker
,
Roland van Rijswijk-Deij
,
Kimberly C. Claffy
,
Lambert J. M. Nieuwenhuis
,
Abhishta Abhishta
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers.
CoRR
(2022)
Tom Meurs
,
Marianne Junger
,
Erik Tews
,
Abhishta Abhishta
Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss.
eCrime
(2022)
Muhammad Yasir Muzayan Haq
,
Abhishta Abhishta
,
Lambert J. M. Nieuwenhuis
The effect of consumer portfolio on the risk profile of cloud provider.
SIGCOMM Posters and Demos
(2021)
Abhishta Abhishta
,
Wouter van Heeswijk
,
Marianne Junger
,
Lambert J. M. Nieuwenhuis
,
Reinoud Joosten
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
11 (2) (2020)
Abhishta Abhishta
,
Reinoud Joosten
,
Sergey Dragomiretskiy
,
Lambert J. M. Nieuwenhuis
Impact of Successful DDoS Attacks on a Major Crypto-Currency Exchange.
PDP
(2019)
Abhishta Abhishta
,
Marianne Junger
,
Reinoud Joosten
,
Lambert J. M. Nieuwenhuis
Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network.
IEEE Symposium on Security and Privacy Workshops
(2019)
Abhishta Abhishta
,
Marianne Junger
,
Reinoud Joosten
,
Lambert J. M. Nieuwenhuis
A Note on Analysing the Attacker Aims Behind DDoS Attacks.
IDC
(2019)
Abhishta Abhishta
,
Roland van Rijswijk-Deij
,
Lambert J. M. Nieuwenhuis
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers.
Comput. Commun. Rev.
48 (5) (2018)