default search action
Search dblp for Publications
export results for "toc:db/journals/cybersecurity/cybersecurity9.bht:"
@article{DBLP:journals/cybersecurity/BarreraBO23, author = {David Barrera and Christopher Bellman and Paul C. van Oorschot}, title = {A close look at a systematic method for analyzing sets of security advice}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad013}, doi = {10.1093/CYBSEC/TYAD013}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/BarreraBO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/BousteadK23, author = {Anne E. Boustead and Matthew B. Kugler}, title = {Juror interpretations of metadata and content information: implications for the going dark debate}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad002}, doi = {10.1093/CYBSEC/TYAD002}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/BousteadK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/BrayJK23, author = {Sergi D. Bray and Shane D. Johnson and Bennett Kleinberg}, title = {Testing human ability to detect 'deepfake' images of human faces}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad011}, doi = {10.1093/CYBSEC/TYAD011}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/BrayJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CableFPS23, author = {Jack Cable and Andr{\'{e}}s F{\'{a}}brega and Sunoo Park and Michael A. Specter}, title = {A systematization of voter registration security}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad008}, doi = {10.1093/CYBSEC/TYAD008}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/CableFPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CsenkeyB23, author = {Kristen Csenkey and Nina Bindel}, title = {Post-quantum cryptographic assemblages and the governance of the quantum threat}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad001}, doi = {10.1093/CYBSEC/TYAD001}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/CsenkeyB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/DykstraGLZ23, author = {Josiah Dykstra and Lawrence A. Gordon and Martin P. Loeb and Lei Zhou}, title = {Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad003}, doi = {10.1093/CYBSEC/TYAD003}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/DykstraGLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/EtudoWYY23, author = {Ugochukwu O. Etudo and Christopher Whyte and Victoria Y. Yoon and Niam Yaraghi}, title = {From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad016}, doi = {10.1093/CYBSEC/TYAD016}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/EtudoWYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/FlemingEBS23, author = {Piers Fleming and S. Gareth Edwards and Andrew P. Bayliss and Charles R. Seger}, title = {Tell me more, tell me more: repeated personal data requests increase disclosure}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad005}, doi = {10.1093/CYBSEC/TYAD005}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/FlemingEBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/GillardDMM23, author = {S{\'{e}}bastien Gillard and Dimitri Percia David and Alain Mermoud and Thomas Maillart}, title = {Efficient collective action for tackling time-critical cybersecurity threats}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad021}, doi = {10.1093/CYBSEC/TYAD021}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/GillardDMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/GohWHT23, author = {Jing Rong Goh and Shaun S. Wang and Yaniv Harel and Gabriel Toh}, title = {Predictive Taxonomy Analytics {(LASSO):} Predicting Outcome Types of Cyber Breach}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad015}, doi = {10.1093/CYBSEC/TYAD015}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/GohWHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Haas23, author = {Timothy C. Haas}, title = {Adapting cybersecurity practice to reduce wildlife cybercrime}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad004}, doi = {10.1093/CYBSEC/TYAD004}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Haas23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/IkwuGJBW23, author = {Ruth Ikwu and Luca Giommoni and Amir Javed and Pete Burnap and Matthew L. Williams}, title = {Digital fingerprinting for identifying malicious collusive groups on Twitter}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad014}, doi = {10.1093/CYBSEC/TYAD014}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/IkwuGJBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/JoinsonDCB23, author = {Adam N. Joinson and Matt Dixon and Lynne M. Coventry and Pam Briggs}, title = {Development of a new 'human cyber-resilience scale'}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad007}, doi = {10.1093/CYBSEC/TYAD007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/JoinsonDCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/KormychZ23, author = {Liudmyla Kormych and Yuliia Zavhorodnia}, title = {The concept of modern political confrontation in cyber space}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad017}, doi = {10.1093/CYBSEC/TYAD017}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/KormychZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/LonerganS23, author = {Erica D. Lonergan and Jacquelyn Schneider}, title = {The Power of Beliefs in {US} Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad006}, doi = {10.1093/CYBSEC/TYAD006}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/LonerganS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/MahmudSKJHSM23, author = {Md. Redowan Mahmud and Joshua D. Scarsbrook and Ryan K. L. Ko and Omar Jarkas and Josh Hall and Stuart Smith and Jonathan Marshall}, title = {Realizing credible remote agricultural auditing with trusted video technology}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad012}, doi = {10.1093/CYBSEC/TYAD012}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/MahmudSKJHSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/MardiantoHAFUM23, author = {Mardianto Mardianto and Niken Hartati and Farah Aulia and Zulian Fikry and Rahayu Hardianti Utami and Elrisfa Magistarina}, title = {Contribution Threat Perception, School Climate and Prejudice as Mediator to Student's Cyber Aggression}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyac017}, doi = {10.1093/CYBSEC/TYAC017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/MardiantoHAFUM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/MbonaE23, author = {Innocent Mbona and Jan H. P. Eloff}, title = {Classifying social media bots as malicious or benign using semi-supervised machine learning}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyac015}, doi = {10.1093/CYBSEC/TYAC015}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/MbonaE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/ParkinKS23, author = {Simon Parkin and Kristen Kuhn and Siraj Ahmed Shaikh}, title = {Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad018}, doi = {10.1093/CYBSEC/TYAD018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/ParkinKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/PiazzaVC23, author = {Anna Piazza and Srinidhi Vasudevan and Madeline Carr}, title = {Cybersecurity in {UK} Universities: mapping (or managing) threat intelligence sharing within the higher education sector}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad019}, doi = {10.1093/CYBSEC/TYAD019}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/PiazzaVC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/PrebotDG23, author = {Baptiste Pr{\'{e}}bot and Yinuo Du and Cleotilde Gonzalez}, title = {Learning about simulated adversaries from human defenders using interactive cyber-defense games}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad022}, doi = {10.1093/CYBSEC/TYAD022}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/PrebotDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/SchmitzBerndt23, author = {Sandra Schmitz{-}Berndt}, title = {Defining the reporting threshold for a cybersecurity incident under the {NIS} Directive and the {NIS} 2 Directive}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad009}, doi = {10.1093/CYBSEC/TYAD009}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/SchmitzBerndt23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/SchoenmakersGSLP23, author = {Koen Schoenmakers and Daniel Greene and Sarah Stutterheim and Herbert Lin and Megan J. Palmer}, title = {The security mindset: characteristics, development, and consequences}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad010}, doi = {10.1093/CYBSEC/TYAD010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/SchoenmakersGSLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/ShevchenkoJMPST23, author = {Pavel V. Shevchenko and Jiwook Jang and Matteo Malavasi and Gareth W. Peters and Georgy Sofronov and Stefan Tr{\"{u}}ck}, title = {The nature of losses from cyber-related events: risk categories and business sectors}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyac016}, doi = {10.1093/CYBSEC/TYAC016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/ShevchenkoJMPST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.