Search dblp for Publications

export results for "toc:db/journals/cybersecurity/cybersecurity9.bht:"

 download as .bib file

@article{DBLP:journals/cybersecurity/BarreraBO23,
  author       = {David Barrera and
                  Christopher Bellman and
                  Paul C. van Oorschot},
  title        = {A close look at a systematic method for analyzing sets of security
                  advice},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad013},
  doi          = {10.1093/CYBSEC/TYAD013},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/BarreraBO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/BousteadK23,
  author       = {Anne E. Boustead and
                  Matthew B. Kugler},
  title        = {Juror interpretations of metadata and content information: implications
                  for the going dark debate},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad002},
  doi          = {10.1093/CYBSEC/TYAD002},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/BousteadK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/BrayJK23,
  author       = {Sergi D. Bray and
                  Shane D. Johnson and
                  Bennett Kleinberg},
  title        = {Testing human ability to detect 'deepfake' images of human faces},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad011},
  doi          = {10.1093/CYBSEC/TYAD011},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/BrayJK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/CableFPS23,
  author       = {Jack Cable and
                  Andr{\'{e}}s F{\'{a}}brega and
                  Sunoo Park and
                  Michael A. Specter},
  title        = {A systematization of voter registration security},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad008},
  doi          = {10.1093/CYBSEC/TYAD008},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/CableFPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/CsenkeyB23,
  author       = {Kristen Csenkey and
                  Nina Bindel},
  title        = {Post-quantum cryptographic assemblages and the governance of the quantum
                  threat},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad001},
  doi          = {10.1093/CYBSEC/TYAD001},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/CsenkeyB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/DykstraGLZ23,
  author       = {Josiah Dykstra and
                  Lawrence A. Gordon and
                  Martin P. Loeb and
                  Lei Zhou},
  title        = {Maximizing the benefits from sharing cyber threat intelligence by
                  government agencies and departments},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad003},
  doi          = {10.1093/CYBSEC/TYAD003},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/DykstraGLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/EtudoWYY23,
  author       = {Ugochukwu O. Etudo and
                  Christopher Whyte and
                  Victoria Y. Yoon and
                  Niam Yaraghi},
  title        = {From Russia with fear: fear appeals and the patterns of cyber-enabled
                  influence operations},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad016},
  doi          = {10.1093/CYBSEC/TYAD016},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/EtudoWYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/FlemingEBS23,
  author       = {Piers Fleming and
                  S. Gareth Edwards and
                  Andrew P. Bayliss and
                  Charles R. Seger},
  title        = {Tell me more, tell me more: repeated personal data requests increase
                  disclosure},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad005},
  doi          = {10.1093/CYBSEC/TYAD005},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/FlemingEBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/GillardDMM23,
  author       = {S{\'{e}}bastien Gillard and
                  Dimitri Percia David and
                  Alain Mermoud and
                  Thomas Maillart},
  title        = {Efficient collective action for tackling time-critical cybersecurity
                  threats},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad021},
  doi          = {10.1093/CYBSEC/TYAD021},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/GillardDMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/GohWHT23,
  author       = {Jing Rong Goh and
                  Shaun S. Wang and
                  Yaniv Harel and
                  Gabriel Toh},
  title        = {Predictive Taxonomy Analytics {(LASSO):} Predicting Outcome Types
                  of Cyber Breach},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad015},
  doi          = {10.1093/CYBSEC/TYAD015},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/GohWHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Haas23,
  author       = {Timothy C. Haas},
  title        = {Adapting cybersecurity practice to reduce wildlife cybercrime},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad004},
  doi          = {10.1093/CYBSEC/TYAD004},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Haas23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/IkwuGJBW23,
  author       = {Ruth Ikwu and
                  Luca Giommoni and
                  Amir Javed and
                  Pete Burnap and
                  Matthew L. Williams},
  title        = {Digital fingerprinting for identifying malicious collusive groups
                  on Twitter},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad014},
  doi          = {10.1093/CYBSEC/TYAD014},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/IkwuGJBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/JoinsonDCB23,
  author       = {Adam N. Joinson and
                  Matt Dixon and
                  Lynne M. Coventry and
                  Pam Briggs},
  title        = {Development of a new 'human cyber-resilience scale'},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad007},
  doi          = {10.1093/CYBSEC/TYAD007},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/JoinsonDCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/KormychZ23,
  author       = {Liudmyla Kormych and
                  Yuliia Zavhorodnia},
  title        = {The concept of modern political confrontation in cyber space},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad017},
  doi          = {10.1093/CYBSEC/TYAD017},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/KormychZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/LonerganS23,
  author       = {Erica D. Lonergan and
                  Jacquelyn Schneider},
  title        = {The Power of Beliefs in {US} Cyber Strategy: The Evolving Role of
                  Deterrence, Norms, and Escalation},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad006},
  doi          = {10.1093/CYBSEC/TYAD006},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/LonerganS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/MahmudSKJHSM23,
  author       = {Md. Redowan Mahmud and
                  Joshua D. Scarsbrook and
                  Ryan K. L. Ko and
                  Omar Jarkas and
                  Josh Hall and
                  Stuart Smith and
                  Jonathan Marshall},
  title        = {Realizing credible remote agricultural auditing with trusted video
                  technology},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad012},
  doi          = {10.1093/CYBSEC/TYAD012},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/MahmudSKJHSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/MardiantoHAFUM23,
  author       = {Mardianto Mardianto and
                  Niken Hartati and
                  Farah Aulia and
                  Zulian Fikry and
                  Rahayu Hardianti Utami and
                  Elrisfa Magistarina},
  title        = {Contribution Threat Perception, School Climate and Prejudice as Mediator
                  to Student's Cyber Aggression},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyac017},
  doi          = {10.1093/CYBSEC/TYAC017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/MardiantoHAFUM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/MbonaE23,
  author       = {Innocent Mbona and
                  Jan H. P. Eloff},
  title        = {Classifying social media bots as malicious or benign using semi-supervised
                  machine learning},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyac015},
  doi          = {10.1093/CYBSEC/TYAC015},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/MbonaE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/ParkinKS23,
  author       = {Simon Parkin and
                  Kristen Kuhn and
                  Siraj Ahmed Shaikh},
  title        = {Executive decision-makers: a scenario-based approach to assessing
                  organizational cyber-risk perception},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad018},
  doi          = {10.1093/CYBSEC/TYAD018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/ParkinKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/PiazzaVC23,
  author       = {Anna Piazza and
                  Srinidhi Vasudevan and
                  Madeline Carr},
  title        = {Cybersecurity in {UK} Universities: mapping (or managing) threat intelligence
                  sharing within the higher education sector},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad019},
  doi          = {10.1093/CYBSEC/TYAD019},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/PiazzaVC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/PrebotDG23,
  author       = {Baptiste Pr{\'{e}}bot and
                  Yinuo Du and
                  Cleotilde Gonzalez},
  title        = {Learning about simulated adversaries from human defenders using interactive
                  cyber-defense games},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad022},
  doi          = {10.1093/CYBSEC/TYAD022},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/PrebotDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/SchmitzBerndt23,
  author       = {Sandra Schmitz{-}Berndt},
  title        = {Defining the reporting threshold for a cybersecurity incident under
                  the {NIS} Directive and the {NIS} 2 Directive},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad009},
  doi          = {10.1093/CYBSEC/TYAD009},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/SchmitzBerndt23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/SchoenmakersGSLP23,
  author       = {Koen Schoenmakers and
                  Daniel Greene and
                  Sarah Stutterheim and
                  Herbert Lin and
                  Megan J. Palmer},
  title        = {The security mindset: characteristics, development, and consequences},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad010},
  doi          = {10.1093/CYBSEC/TYAD010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/SchoenmakersGSLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/ShevchenkoJMPST23,
  author       = {Pavel V. Shevchenko and
                  Jiwook Jang and
                  Matteo Malavasi and
                  Gareth W. Peters and
                  Georgy Sofronov and
                  Stefan Tr{\"{u}}ck},
  title        = {The nature of losses from cyber-related events: risk categories and
                  business sectors},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyac016},
  doi          = {10.1093/CYBSEC/TYAC016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/ShevchenkoJMPST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}