![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Cybersecurity, Volume 8
Volume 8, Number 1, January 2022
- Zhang Hao Goh
, Minzheng Hou, Hichang Cho:
The impact of a cause-effect elaboration procedure on information security risk perceptions: a construal fit perspective. - Agne Brilingaite
, Linas Bukauskas
, Ausrius Juozapavicius
, Eduardas Kutka
:
Overcoming information-sharing challenges in cyber defence exercises. - Panagiotis Chatzigiannis
, Foteini Baldimtsi, Igor Griva, Jiasun Li:
Diversification across mining pools: optimal mining strategies under PoW. - Yuxuan (Cicilia) Zhang
, Richard Frank, Noelle Warkentin, Naomi Zakimi:
Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure. - Miguel Alberto Gomez
, Christopher Whyte
:
Unpacking strategic behavior in cyberspace: a schema-driven approach. - Sunil Chaudhary
, Vasileios Gkioulos, Sokratis K. Katsikas:
Developing metrics to assess the effectiveness of cybersecurity awareness program. - Yudhistira Nugraha
, Andrew Martin
:
Cybersecurity service level agreements: understanding government data confidentiality requirements. - Nori Katagiri
:
Two explanations for the paucity of cyber-military, cross-domain operations. - James Pavur
, Ivan Martinovic:
Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight. - Masarah Paquet-Clouston
, Serge-Olivier Paquette, Sebastián García, María José Erquiaga:
Entanglement: cybercrime connections of a public forum population. - Rogier Creemers
:
China's emerging data protection framework. - Andrew Tomlinson
, Simon Parkin
, Siraj Ahmed Shaikh
:
Drivers and barriers for secure hardware adoption across ecosystem stakeholders. - Justin Key Canfil
:
The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay. - Carly E. Beckerman
:
Is there a cyber security dilemma? - Mohamed Rasslan
, Mahmoud M. Nasreldin, Heba Kamal Aslan:
An IoT Privacy-Oriented selective disclosure credential system. - Fran Casino
, Claudia Pina, Pablo López-Aguilar
, Edgar Batista, Agusti Solanas, Constantinos Patsakis:
SoK: cross-border criminal investigations and digital evidence.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.