Picking your brains: Where and how neuroscience tools can enhance marketing research L Alvino, L Pavone, A Abhishta, H Robben Frontiers in neuroscience 14, 577666, 2020 | 103 | 2020 |
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers A Abhishta, R van Rijswijk-Deij, LJM Nieuwenhuis ACM SIGCOMM Computer Communication Review 48 (5), 70-76, 2018 | 57 | 2018 |
Impact of successful ddos attacks on a major crypto-currency exchange A Abhishta, R Joosten, S Dragomiretskiy, LJM Nieuwenhuis 2019 27th Euromicro International Conference on Parallel, Distributed and …, 2019 | 50* | 2019 |
A responsible internet: increasing trust in the foundation of digital societies C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ... Privacy & Informatie Magazine, 2021 | 47* | 2021 |
Business Model of a Botnet CGJ Putman, Abhishta, LJM Nieuwenhuis 26th Euromicro International Conference on Parallel, Distributed and Network …, 2018 | 47* | 2018 |
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks. A Abhishta, W van Heeswijk, M Junger, LJM Nieuwenhuis, R Joosten J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (2), 3-22, 2020 | 46 | 2020 |
Analysing the impact of a DDoS attack announcement on victim stock prices Abhishta, R Joosten, LJM Nieuwenhuis 2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017 | 25* | 2017 |
Industry 4.0 and healthcare: Context, applications, benefits and challenges K Kotzias, FA Bukhsh, JJ Arachchige, M Daneva, A Abhishta Iet Software 17 (3), 195-248, 2023 | 18 | 2023 |
The blind man and the elephant: Measuring economic impacts of ddos attacks A Abhishta | 12 | 2019 |
Ransomware: How attacker’s effort, victim characteristics and context influence ransom requested, payment and financial loss T Meurs, M Junger, E Tews, A Abhishta 2022 APWG symposium on electronic crime research (eCrime), 1-13, 2022 | 11 | 2022 |
Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices Abhishta, R Joosten, LJM Nieuwenhuis Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017 | 9* | 2017 |
Role of culture in customer acceptance of Neobanks K Meijer, A Abhishta, R Joosten International Workshop on Enterprise Applications, Markets and Services in …, 2022 | 8* | 2022 |
Victim Routine Influences the Number of DDoS Attacks A Abhishta, M Junger, R Joosten, LJM Nieuwenhuis 2019 IEEE Security and Privacy Workshops (SPW), 2019 | 7 | 2019 |
Crime chain: het verband tussen DDoS-aanvallen en Phishing M Junger, A Abhishta, B Nieuwenhuis Politie & Wetenschap, 2021 | 6* | 2021 |
Poster: Collecting Contextual Information About a DDoS Attack Event Using Google Alerts A Abhishta, R Joosten, M Jonker, W Kamerman, LJM Nieuwenhuis 40th IEEE Symposium on Security and Privacy 2019, 2019 | 6 | 2019 |
Methodology for Evaluating the Appropriateness of a Business Process for Robotic Process Automation A Abhishta, L Berghuis, W van Heeswijk, A Tursunbayeva Impact of Artificial Intelligence in Business and Society, 105-133, 2023 | 5* | 2023 |
Ransomware economics: a two-step approach to model ransom paid T Meurs, E Cartwright, A Cartwright, M Junger, R Hoheisel, E Tews, ... 2023 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2023 | 4 | 2023 |
A note on analysing the attacker aims behind ddos attacks A Abhishta, M Junger, R Joosten, LJM Nieuwenhuis Intelligent Distributed Computing XIII, 255-265, 2020 | 4 | 2020 |
The Impact of the COVID-19 Pandemic on Phishing Frequency and Content. The Impact of Routine Activities Theory and a Rational Choice Model of Crime J Laan, M Junger, A Abhishta, M Jonker The Impact of Routine Activities Theory and a Rational Choice Model of Crime …, 2023 | 3* | 2023 |
Deception in double extortion ransomware attacks: An analysis of profitability and credibility T Meurs, E Cartwright, A Cartwright, M Junger, A Abhishta Computers & Security 138, 103670, 2024 | 2 | 2024 |