default search action
Journal of Cybersecurity, Volume 4
Volume 4, Number 1, 2018
- Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis:
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. tyy001
- Frankie E. Catota, M. Granger Morgan, Douglas C. Sicker:
Cybersecurity incident response capabilities in the Ecuadorian financial sector. tyy002 - Samvit Jain, Edward W. Felten, Steven Goldfeder:
Determining an optimal threshold on the online reserves of a bitcoin exchange. tyy003 - Markus Riek, Rainer Böhme:
The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates†. tyy004 - Tarun Chaudhary, Jenna Jordan, Michael Salomone, Phil Baxter:
Patchwork of confusion: the cybersecurity coordination problem. tyy005
- Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. tyy006
- Jonathan Z. Bakdash, Steve E. Hutchinson, Erin G. Zaroukian, Laura R. Marusich, Saravanan Thirumuruganathan, Charmaine Sample, Blaine Hoffman, Gautam Das:
Malware in the future? Forecasting of analyst detection of cyber events. tyy007 - Aviram Zrahia:
Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views. tyy008 - Daniel G. Arce:
Malware and market share. tyy010
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.